1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rashid [163]
3 years ago
5

In order for the image tag in an HTML file to function properly, the file named square.png must be located where?

Computers and Technology
2 answers:
andrey2020 [161]3 years ago
7 0
A is wrong because a folder can have any name.
B is wrong because not all folders of a web server are exposed to the outside, only all folders below the document root.
C sounds good
D is wrong because an image can reside somewhere else as long as you specify the absolute or relative path to it
charle [14.2K]3 years ago
7 0

Answer:

A

Explanation:

You might be interested in
Jeffrey works with a huge database of spreadsheet records each day. To organize and identify these spreadsheets, he wants to ass
mariarad [96]

Answer:

A. Document Properties

B. Permission

C. Document Options

D. File Details

The answer to this question is "File Details " . This will help Jeffrey works efficiently with a huge database of spreadsheet records each day. He can assign names to these File Details which represents each spreadsheet records. This will help his report more organized and easy to identity.

8 0
2 years ago
Cisco has created a proprietary layer 2 protocol used to manage VLAN configuration between switches called:________a. VLAN Confi
Reil [10]

Answer:

The correct answer is letter "E": None of the above.

Explanation:

The VLAN Trunking Protocol (<em>VTP</em>) provides an easy way of keeping an accurate VLAN configuration through a commuted network. The VTP allows solutions of commuted network easily scalable to other dimensions, reducing the need of manually setting up the red. The VTP composed of a layer 2 protocol used to manage VLAN setups between switches.

7 0
3 years ago
Tim Berners-Lee cultivated a way to interconnect and self-index data. He made a major contribution to the development of the Int
anastassius [24]
Answer: D. Digital data
6 0
2 years ago
A digital certificate system: Group of answer choices uses digital signatures to validate a user's identity. is used primarily b
kompoz [17]

Answer:

uses third party CAs to validate a user's identity

Explanation:

The Digital Certificate is the only means that technically and legally guarantees the identity of a person on the Internet. This is an essential requirement for institutions to offer secure services over the Internet. Further:

The digital certificate allows the electronic signature of documents The recipient of a signed document can be sure that it is the original and has not been tampered with and the author of the electronic signature cannot deny the authorship of this signature.

The digital certificate allows encryption of communications. Only the recipient of the information will be able to access its content.

4 0
3 years ago
You work as the IT administrator for a small corporate network. To accommodate specific network communication needs for an upcom
Andreas93 [3]

Answer:

The right answer is option A

Explanation:

To upgrade a network communication to accommodate for specific network needs, what is required is to select and install the network interface with the highest speed to connect to the local network.

Network communications are what we use to connect to the internet. There are different network providers and the provided networks do not have the same network speed due to different reasons. A network interface is what is used to connect our computer to the network provider. It is only logical to get the best network interface card in that region and connect to the fastest speed available.

5 0
3 years ago
Other questions:
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans t
    8·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the
    14·1 answer
  • A solid understanding of __________ is the foundation of verbal communication
    7·1 answer
  • Eliza needs to share contact information with another user, but she wants to include only certain information in the contact. Wh
    9·2 answers
  • When a new word processing software program is released, companies that might use it must consider not only the cost of buying i
    13·1 answer
  • We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key
    6·1 answer
  • Something I should look for when trying to decide if a source is credible is the publication's ....
    10·1 answer
  • Simple interest will always pay more interest than compound interest.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!