1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
3 years ago
14

An online travel agency such as Travelocity is an example of a(n) _____.

Computers and Technology
1 answer:
dezoksy [38]3 years ago
3 0

An online travel agency such as Travelocity is an example of a intermediary.

You might be interested in
An engineer is designing an HTML page and wants to specify a title for the browser tab to display, along with some meta data on
Nady [450]

An HTML is made up of several individual tags and elements such as the head, body. form, frame and many more.

In an HTML page, the meta element and the title element are placed in the head element.

An illustration is as follows:

<em>< head > </em>

<em>< title > My Title < /title ></em>

<em>  < meta charset="UTF-8" > </em>

<em>< / head ></em>

<em />

The head element contains quite a number of elements and tags; some of them are:

  • meta
  • title
  • style
  • script
  • base

And so on.

Hence, in order to use a meta-data element, the meta element has to be placed within the head element.

Read more about HTML elements at:

brainly.com/question/4484498

5 0
3 years ago
What will happen to the tools and equipment, if it is not store propely?​
nikklg [1K]
This question doesn’t make any sense I guess it will rust
8 0
3 years ago
Information Governance (IG) consists of? A. the overarching policies and processes to optimize and leverage information while ke
Tems11 [23]

Answer:  A) the overarching policies and processes to optimize and leverage information while keeping it secure and meeting legal and privacy obligations in alignment with organizationally stated business objectives

Explanation: Information governance(IG) is the act for the information to store , create, archive,deleting, valuing etc.This step is used for making the information secure and optimizable when required. IG gives the control over the information with respect to particular policy.

Other options are incorrect because frameworks used for extraction of  most of IT investments is known as IT(Information technology ) governance and method used for ensuring the data for forming database is known as data governance .Thus, the correct option is option(A).

4 0
3 years ago
Suppose there are two ISPs providing WiFi service in a café. Each ISP operates its own AP and has its own IP address block. If b
Alinara [238K]

Answer:

As a design rule, access points within range of each other should be set to channel frequencies with minimal signal overlap. Users will find that roaming doesn’t work well, and performance will degrade because of interference between access points.

Explanation:

8 0
4 years ago
Consider the following class declaration: public class Square { private double sideLength; public double getArea() { return side
kipiarov [429]

Answer:

Here is the constructor:

public Square(double s) {  //constructor name is same as class name

sideLength = s;  } //s copied into sideLength field

Explanation:

The above constructor is a parameterized constructor which takes a double type variable s as argument. The name of constructor is same as the name of class.This constructor requires one parameters. This means that all declarations of Square objects must pass one argument to the Square() constructor as constructor Square() is called based on the number and types of the arguments passed and the argument passed should be one and of type double.

Here is where the constructor fits:

public class Square {

private double sideLength;

public Square(double s) {  

sideLength = s;  }

public double getArea() {

return sideLength * sideLength;}

public double getSideLength() {

return sideLength; } }

4 0
3 years ago
Other questions:
  • The process of changing data from their original form to a format that more closely fits the research objectives of the research
    9·1 answer
  • You can use the_______key if your cursor is at the end of the word. Use the______key if you place the cursor on the left side of
    11·1 answer
  • The collection of all possible vulnerabilities that could provide unauthorized access to computer resources is called the:
    12·1 answer
  • Rachel wants to post content from digital cameras on the web. Which online tool will help Rachel to post and edit content on a w
    5·1 answer
  • How can you enter Task Manager in Windows? Select 3 options. press Ctrl + Shift + Tab press Ctrl+Alt+Delete and then click Task
    8·1 answer
  • Which of these is an example of gathering secondary data?
    15·1 answer
  • Why are the social and ethical consequences of emerging technology hard to
    10·1 answer
  • What will be the output of the following code? &lt;?php $foo = 'Bob'; $bar = $foo; $bar = "My name is $bar"; print $bar; print $
    8·2 answers
  • A record is a specific piece of information state true or false​
    12·1 answer
  • Imagine that a team of scientists test a certain hypothesis, and the experimental results show that it is false.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!