1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
11

Samantha writes technical content for a webpage and uploads it to the webpage. What should she do to ensure that the content, wh

ich includes special characters, is readable? replace special characters in the text with their respective codes replace special characters in the text with numbers replace special characters in the text with symbols replace special characters in the text with markup languages
Computers and Technology
2 answers:
LuckyWell [14K]3 years ago
8 0

replace special characters in the text with numbers

Explanation:

all i know is it is definitely not D

sergiy2304 [10]3 years ago
7 0

Answer:

replace special characters in the text with their respective codes

You might be interested in
If a user wished to insert a triangle or a callout figure in a document, he or she should select the _____ option.
Vlada [557]
The Insert Tab option

You can add a shape your word, excel or PowerPoint document to make a drawing. To do this in MS Word, click on the Insert tab, and in the illustration group, click on the shapes option. Click the shapes or callouts that you would like to insert and then drag to place the shape anywhere in the document.






4 0
3 years ago
In order to look up ipv4 and ipv6 dhcp leases, what two files should be viewed?​
Zigmanuir [339]
The answers are  /var/lib/dhcpd/dhcpd.leases   &                                                                       /var/lib/dhcpd/dhcpd6.leases
In order to look up ipv4 and ipv6 dhcp leases, The two files that should be viewed are  /var/lib/dhcpd/dhcpd.leases &  /var/lib/dhcpd/dhcpd6.leases                                             
7 0
2 years ago
Round 74,361 to the nearest 10​
grandymaker [24]

Answer:

74,400 i think

Explanation:

8 0
3 years ago
The input nums is supposed to be an array of unique integers ranging from 1 to nums.length (inclusive). However, there is a mist
Elden [556K]

The program is an illustration of loops.

Loops are used to perform repetitive and iterative operations.

The program in Python where comments are used to explain each line is as follows:

#This intializes the list

nums = [5,4,4,2,1]

#This gets the length of the list

size = len(nums)

#This iterates through the list

for i in range(size):

   #The following if condition determines the repeating number

   if nums[abs(nums[i])-1] > 0:

       nums[abs(nums[i])-1] = -nums[abs(nums[i])-1]

   else:

       repeating = abs(nums[i])

   #The following if condition determines the missing number

   if nums[i]>0:

       missing = i + 1

   

#This calculates and prints the sum of the missing and the repeating numbers

print(repeating+missing)

Read more about similar programs at:

brainly.com/question/13549861

6 0
3 years ago
A thief has unfortunately captured your atm card number by placing a panel on top of the face of an atm, which was virtually und
Misha Larkins [42]
The item you described is a skimmer it is oftem=n placed and left for an amount of time or watched from afar than when no on is looking they run-up and extract it for its data
3 0
3 years ago
Other questions:
  • GIVING BRAINLIEST What does output allow a computer to do? Display information Receive information Do complex math problems Do m
    6·2 answers
  • In terms of object-oriented programming,after class is defined,________ can be created for that class.
    15·1 answer
  • a. Do you think the U.S. government should censor information on the Web, such as instructions for making weapons, to protect th
    12·1 answer
  • Which of the following statements are true of
    14·1 answer
  • quiz Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appear
    7·1 answer
  • What statement best describes entrepreneurship?
    7·2 answers
  • All organizations need good quality cybersecurity to ensure _____. Select 4 options.
    12·2 answers
  • GIVING OUT BRAINLIEST AND I AM ALSO WARNING EVERYONE TO NOT ANSWER A BUNCH OF rubbish just to get the points!
    7·2 answers
  • A new president has been elected. She promises to lower taxes drastically. What is most LIKELY to happen as a result of this dec
    8·1 answer
  • Question 4 A data analyst wants to include a line of code directly in their .rmd file in order to explain their process more cle
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!