1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
11

Samantha writes technical content for a webpage and uploads it to the webpage. What should she do to ensure that the content, wh

ich includes special characters, is readable? replace special characters in the text with their respective codes replace special characters in the text with numbers replace special characters in the text with symbols replace special characters in the text with markup languages
Computers and Technology
2 answers:
LuckyWell [14K]3 years ago
8 0

replace special characters in the text with numbers

Explanation:

all i know is it is definitely not D

sergiy2304 [10]3 years ago
7 0

Answer:

replace special characters in the text with their respective codes

You might be interested in
1.<br> The correct way to use a seat belt is
Nesterboy [21]

Answer:

4 steps

Explanation:

Step 1: Pull belt across body

Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.

If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.

Step 2: Adjust lower belt

Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.

Pregnant women should wear the lap belt below their belly, not on or above it.

Step 3: Adjust shoulder belt

Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.

Step 4: Check before driving

Check that the belt is secure before driving.

4 0
3 years ago
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
3 years ago
Personal computer hard disk platters typically have storage capacities ranging from 40 gb to ____.
Doss [256]
2tb I think I'm not that sure
7 0
3 years ago
Keyword stuffing is considered to be a black hat technique for SEO and is highly suggested today by Google.
klemol [59]

Answer:

False

Explanation:

Keyword stuffing is a practice to insert an unusual large number of tag in a website to increase the page ranking in search results. This is considered an unethical Search Engine Optimization (SEO).

Google consider Keyword stuffing as unethical and it doesn't help to boost the rank of a website. More advanced algorithms are being used to filter those of the meta tags which are irrelevant or excessively out of context in a website.

3 0
3 years ago
Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept
il63 [147K]
Answer: An evil twin attack poses as a legitimate AP.<span />
7 0
3 years ago
Other questions:
  • Is frequency measured in henry.
    14·1 answer
  • dentify the type of observational study​ (cross-sectional, retrospective, or​ prospective) described below. A research company u
    5·1 answer
  • How do you write the slope-intercept form?
    5·1 answer
  • Write the proghrams for the following:
    13·1 answer
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • Discuss the difference between a broad internet search and a narrow internet search?
    12·2 answers
  • Best way to build a model bridge
    5·2 answers
  • The default for automatic replies in outlook is what?
    6·2 answers
  • The identification of the technology management framework contain?
    6·1 answer
  • Discuss five domains of Instructional technology​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!