1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
3 years ago
10

In the language of the World Wide Web, "this page cannot be displayed" means A. your computer's software is damaged. B. the ISP

you've chosen is going to go out of business. C. the e-mail you're trying to open has been lost. D. the browser can't find the Web site that you're seeking.
Computers and Technology
2 answers:
asambeis [7]3 years ago
7 0
The answer is d. most definitely <span />
cupoosta [38]3 years ago
5 0

The correct answer is:    [D]:  

________________________

" the browser can't find the Web site that you're seeking. "

________________________

You might be interested in
Universal Containers wants to apply different Discount Schedules depending on the currency of the Quote, how should the Admin se
Andrews [41]
A. Create a Lookup Relationship on the Quote to the Discount Schedule for the user to populate.
B. Using a Price Rule, Inject the ID of the Discount Schedule sourced from a formula field on the Quote Line.
C. Modify the Discount Schedule formula field on the Quote Line to reference the IDs of your Discount Schedules.
D. Create a Discount Schedule for each currency in the related list on the Product
3 0
3 years ago
Discuss risks associated with people in cyber threat
BARSIC [14]

Answer:

1. Hacking of personal details.

2. Cyber harassment.

3. Hacking of business details.

Moreover it is a mental trauma for the victim too

Explanation:

6 0
3 years ago
In a traditional systems development environment, security issues usually are less complex than with web-based systems, because
NikAS [45]

Answer:

The answer is "True".

Explanation:

Traditional techniques of application development were focused on pre-development stages. These control system flows through claims to design and upgrades and will then tests and repair are directional there.

  • It enables the user to create and run a machine-based data system.  
  • It uses program and device, that specifically the solutions, that enable manual information to be processed.
6 0
3 years ago
Write a pseudocode to read 10 integer numbers and find the largest number, you need to use loop in your answer.
Sophie [7]
  1. # Algorithm to find the number of integers greater than 10 in a list
  2. list = read(list of integers)
  3. n = len(list)
  4. count = 0
  5. For i = 1 to n
  6.    If list[i] > 10:
  7.        count = count + 1
  8.    Endif
  9. End
  10. Return count
<h3>Explanation:</h3>

Then the length of the list is stored in a variable n. A variable count to store the number of integers more significant than 10 is initialized to 0.

  • Then, a for-loop is used to iterate over the list. A for-loop is used in this case because every element of the inventory needs to be checked for a value greater than 10.
  • In each iteration of the for-loop, the value at the index of the list is checked. If the value is greater than 10, then the counter variable count is incremented by 1.
  • The iterations continue till the for-loop ends. At this point, the variable count will be the number of integers greater than 10.
  • Note that in case the list does not have any number greater than 10, then the count variable will be 0.

To learn more about it, refer

to brainly.com/question/25311149

#SPJ4

3 0
2 years ago
Caroline’s personal laptop was attacked by malware. When she got it fixed from the service center, the computer technician advis
Mademuasel [1]

Answer:

Antivirus Software.

Explanation:

Antivirus software is designed to identify, locate and destroy malware on a computer. It can also help to prevent malware to infect the system.

The antivirus will look for suspicious files or programs that could potentially harm your computer using several algorithms based on already known malware, suspicious behaviors on programs that could be harmful and malware that could be variants of "families" already known.

4 0
3 years ago
Other questions:
  • What is a technology that exists inside another device called
    11·1 answer
  • The 7-bit ASCII code for the character ‘&amp;’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
    5·1 answer
  • Fill in the blanks with given words:{system unit / desktop / laptop / tablet / smartphone}1. A _____ can be as powerful as a des
    11·1 answer
  • An app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve hi
    15·1 answer
  • Write the definition of a function dashedline, with one parameter , an int . if the parameter is negative or zero, the function
    15·1 answer
  • as a sales person which size hard disc would you recommend a customer who needs to use Microsoft PowerPoint application?
    8·1 answer
  • What type of app is Drake designing? Drake is designing a mobile app for an online travel blog. The app will enable browsers to
    5·1 answer
  • What's the maximum number of ad extensions that can show for a particular query or device at any given time?
    13·1 answer
  • Tại sao xe chỉ sản xuất ra 1996cc mà không phải là 2000cc?
    6·2 answers
  • What is HTML? Write some future of HTML.<br>follow for follow ​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!