1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
13

To create a link that starts an email, you code the href attribute as ________________________ followed by the email address.

Computers and Technology
1 answer:
timofeeve [1]3 years ago
5 0
Mailto, followed by the email address.

E.g.: <span><a href="mailto:[email protected]">Mail me!</a></span>
You might be interested in
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
4 years ago
Select all that apply.
Serhud [2]

Answer:

Page grouping

Page Setup grouping

Layout grouping

Schemes grouping

4 0
3 years ago
If you’d like to have multiple italicized words in your document, how would you change the font of each of these words
Alex787 [66]

Answer:

Use styles and modify the font of the default style

Explanation:

4 0
3 years ago
An IT Manager is reviewing the company’s approach to data privacy for a new project. What can happen if the company does not col
photoshop1234 [79]

Answer:

The company might not be able to satisfy their customers

5 0
2 years ago
 A network engineer is examining a configuration implemented by a new intern who attached an IP phone to a switch port and confi
lakkis [162]
Where is the answer?????????

7 0
3 years ago
Other questions:
  • Which part of the cpu stores instructions for high speed access or processing
    14·1 answer
  • Jason is computer professional who has access to sensitive information. He shares this information with another organization in
    8·1 answer
  • Match the following.
    8·2 answers
  • A vertical curve means that any change in the Aggregate Price Level will have what result?
    15·1 answer
  • You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store
    10·1 answer
  • How do u use this app?
    15·2 answers
  • Yall rachits and yall eat butt xD
    10·2 answers
  • You are creating a presentation and you have come to the last slide. You still have more information to add. What should you do?
    7·1 answer
  • To add a hyperlink to your presentation, select the text, choose Hyperlink from the Insert menu, and then
    15·1 answer
  • What are the 3 attributes of information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!