1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KiRa [710]
3 years ago
7

Allie is working on the development of a web browser and wants to make sure that the browser correctly implements the Hypertext

Markup Language (HTML) standard. What organization's documentation should she turn to for the authoritative source of information?
a) International Electrotechnical Commission (IEC)
b) National Institute of Standards and Technology (NIST)
c) World Wide Web Consortium (W3C)
d) Internet Engineering Task Force (IETF)
Computers and Technology
1 answer:
creativ13 [48]3 years ago
3 0

Answer:

The answer is "Option c"

Explanation:

The W3C is the framework for the creation of software and the online standards through which sites and webpages work, and to turn into an authoritative source of information, she will work towards getting a reliable and credible source of knowledge from the "World Wide Web Consortium", and the wrong option can be described as follows:

  • In option a, It is wrong because this organization prepares and publishes all the electronic technologies.
  • In option b, It is wrong because it is the laboratory of physics, which is not useful in web development.
  • In option d, This technology is used in TCP/IP protocol, that's why it is incorrect.
You might be interested in
Which Supreme Court case resulted in a decree issued for the Michigan Department of Corrections to provide female inmates access
SOVA2 [1]

Answer:

GLOVER v. JOHNSON December 14th 1999 at Michigan

Explanation:

The court case mentioned above is exactly the court case that has ended with a decree being issued  through the Michigan Department of Corrections for providing female inmates the access to the programming which has previously been allowed only to the male inmates. And this happened in 1999, and some big names were part of the jurisdiction. Its a very popular case definitely.

7 0
3 years ago
Electric Bill Problem 3.0 (20 Points) What is the total cost of using the following at /kWh? a. 1600 W air conditioner for 6h b.
gulaghasi [49]

Answer:

The total const is 13025 KWh

Explanation:

These are the steps to solve this problem:

  1. Convert all the powers from W to KW dividing by 1000.
  2. Convert all the times on minutes to hours dividing by 60.
  3. Then you can apply energy consumption formula Energy = Power*Time for any of the appliances. the results will be at KWh.
  4. Sum all the consumtions and you will have the total cost.

Attached you will have a spreadsheet as a guidance. Any  questions, just let me know.

Download xlsx
7 0
3 years ago
Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
IrinaVladis [17]
DHCP snooping is a mitigation technique<span> to </span>prevent rogue<span> DHCP </span>servers  <span>from </span>providing false IP configuration parameters to clients.  DHCP snooping<span> is a security feature that acts like a firewall between untrusted hosts and trusted </span>DHCP<span> servers. It is</span><span> a series of techniques applied to improve the security of a </span>DHCP<span> infrastructure. </span>
6 0
3 years ago
Read 2 more answers
Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer
NikAS [45]

Answer:

The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.

Explanation:

The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were  five generations of computer development. They were :

1. First Generation computers

   In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.

2. Second Generation computers

  These are transistors based computers. This generation ranges from 1959 to 1965.

3. Third Generation computers  

    This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.

4. Fourth Generation computers

   The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.

5. Fifth Generation computers

   The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.

4 0
2 years ago
Select the correct answer.
konstantin123 [22]
Hello!

Similar to the keyboard character keys F and J, the number 5 on the numeric keypad has a bump on it.

This is to also help position your fingers on the keypad when typing numbers.

Hope this helps!
5 0
1 year ago
Other questions:
  • The idea behind ____ is that the peripheral can simply be plugged in and turned on, and that the computer should dynamically rec
    10·1 answer
  • In fixed-width files, each record is on a separate line and the fields are separated by a special character.
    7·1 answer
  • Which PowerPoint options can users customize?
    9·1 answer
  • Many people in modern society have the notion that hard disks can be searched in an hour and files can be recovered from inciner
    10·1 answer
  • The hardware to keep the output data when finished is a
    9·1 answer
  • To implement the various placement algorithms discussed for dynamic partitioning (see Section 7.2 ), a list of the free blocks o
    11·1 answer
  • Benefits of computer in bank​
    5·1 answer
  • What is the purpose of a Post Mortem Review? (5 points)
    5·1 answer
  • What is the output of the following program? If there is any problem, how can
    13·1 answer
  • Luis saves an attachment that he received from Kevin. Where will the attachment save by default?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!