1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
3 years ago
6

When do you need to use a fully qualified url in a hyperlink?

Computers and Technology
1 answer:
Rudiy273 years ago
7 0
When you're linking to another web site.
You might be interested in
The function of the file server is to : 1. store data and software programs that can be used by client computers on the network.
mylen [45]

Answer:

1. store data and software programs that can be used by client computers on the network.

Explanation:

8 0
4 years ago
A _______ is a piece of computer hardware used for the modulation and demodulation of data between digital and analog formats.
mario62 [17]
'Modem'. A hardware that changes analogy to digital and vice versa.
5 0
3 years ago
What happen if there is no authentication??
creativ13 [48]

Answer:

anyone could access something and hack others

Explanation:

7 0
3 years ago
Read 2 more answers
A palindrome is a string that reads the same from left to right and from right to left. Design an algorithm to find the minimum
stepladder [879]

Answer:

Explanation:

The following code is written in Python. It is a recursive function that tests the first and last character of the word and keeps checking to see if each change would create the palindrome. Finally, printing out the minimum number needed to create the palindrome.

import sys

def numOfSwitches(word, start, end):

   if (start > end):

       return sys.maxsize

   if (start == end):

       return 0

   if (start == end - 1):

       if (word[start] == word[end]):

           return 0

       else:

           return 1

   if (word[start] == word[end]):

       return numOfSwitches(word, start + 1, end - 1)

   else:

       return (min(numOfSwitches(word, start, end - 1),

                   numOfSwitches(word, start + 1, end)) + 1)

word = input("Enter a Word: ")

start = 0

end = len(word)-1

print("Number of switches required for palindrome: " + str(numOfSwitches(word, start, end)))

3 0
3 years ago
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
Other questions:
  • Danny is editing the text content of a single page on a website he created a year ago. What part of the tag would he have to upd
    11·1 answer
  • Which signal types are represented by a continuous waveform?
    10·1 answer
  • Television has greatly influenced how politicians are perceived via the sound bite and ________ campaigning.
    11·1 answer
  • Materials such as copper, silver, and aluminum through which electric energy passes freely are called
    13·1 answer
  • What is related to Gamut in Adobe illustrator?
    8·1 answer
  • What is the protocol developed for the wireless network communications? explain?
    8·1 answer
  • The following are the CPU and I/O behavior of three processes, timings in seconds.
    9·1 answer
  • ¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en
    8·1 answer
  • POR FAVOR AYUDENME DIGAN SOLO 10 Ejemplos de Software de Sistema. SI NO REPRUEBO Y LE DOY CORONA
    14·2 answers
  • What is the size of BIOS?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!