1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Orlov [11]
3 years ago
12

Please help

Computers and Technology
2 answers:
mart [117]3 years ago
4 0

Answer:

first image is: used to add  functionality to  a web page

second image: used to structure  a web page

third image: used to format  a web page

Explanation:

mario62 [17]3 years ago
3 0

Answer:

<em>Used to format a web page: </em>

<u><em>HTML- // the first picture</em></u>

<em>Used to add functionality to a web page:</em>

<em><u>3rd picture</u></em>

<em><u /></em>

<em>Used to structure a web page:</em>

<u><em>2nd picture</em></u>

You might be interested in
Ou are a web page designer and you set up a page with five different links. a user of the page can click on one of the links or
sertanlavr [38]

There are 6 possible outcomes and they are :

S={link1,link2,link3,link4,link5,leave}

this is the sample space for the outcome of a visitor to your webpage.

8 0
3 years ago
Hundreds of a bank’s customers have called the customer service call center to complain that they are receiving text messages on
Aleks [24]

Answer:

Customer enlightenment is the key. The bank should communicate with customers and inform them they never asked them to provide their personal information to such a website or an unknown source. I explain steps to take to avoid such fraudulent text messages. If they have responded to such messages, the bank should also guide the customers on steps to take to recover their stolen money.

Explanation:

Customer enlightenment is the key. The bank should communicate with customers and inform them they never asked them to provide their personal information to such a website or an unknown source. I explain steps to take to avoid such fraudulent text messages. If they have responded to such messages, the bank should also guide the customers on steps to take to recover their stolen money.

Some measures to be taken by both the banks and the customers are as follows;

  • The customers should be careful not to call any number people send to them rather they should get any information they need by going to the bank or search for such information on the bank official websites.
  • Customers should be alert and think carefully before sharing any financial details
  • For customers that responded to such messages, the banks will be proactive enough to shut it down and retrieve the customer's funds the same day.
  • Customers are advised to always report such fraudulent messages when received.
  • Banks should frequently verify transactions through telephone or text messages whenever an unusually high or out of the ordinary payments are flagged by its automated systems.
  • The bank can also prevent this fraud by blocking the customer card whenever an unusual transaction is noticed. The customer will then be contacted to confirm if the transaction was genuine or not. At times the transaction may need to be attempted again.

6 0
3 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
What is a high level language?​
vovikov84 [41]

Answer:

a high level language is any programming language that enables development of a program in a much more user friendly programming context and is generally independent of the computers hardware architecture.

8 0
3 years ago
Read 2 more answers
In what way are high-level programming languages limited? (5 points)
Nat2105 [25]

Answer: High-level computer languages must be translated into assembly or machine languages by a compiler before they can be executed, making them slightly slower to execute than raw assembly or machine language. The answer is D.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Develop an EER model for the following situation using the traditional EER notation, the Visio notation, or the subtypes inside
    8·1 answer
  • A friend knows I'm taking a technology class in college and asks me how a hard drive works. What should I say to a friend about
    10·1 answer
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • How many generations of computer languages
    10·1 answer
  • Susan's monthly goal to open five new customer
    10·1 answer
  • In addition to text with styles based on the Normal style, what text will be affected if you modify the Normal style?
    7·2 answers
  • Many inventions have enabled us to use digital cameras. The biggest difference between traditional and digital cameras is that d
    10·1 answer
  • Javier downloads an illustration from an online Image library and modifies it for his purposes. The illustration he downloads is
    12·1 answer
  • Can someone help me debug this please
    6·1 answer
  • Find the name of the professor with the maximum percentage of students that failed his course.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!