1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rashid [163]
3 years ago
5

In order for the image tag in an HTML file to function properly, the file named square.png must be located where?

Computers and Technology
2 answers:
andrey2020 [161]3 years ago
7 0
A is wrong because a folder can have any name.
B is wrong because not all folders of a web server are exposed to the outside, only all folders below the document root.
C sounds good
D is wrong because an image can reside somewhere else as long as you specify the absolute or relative path to it
charle [14.2K]3 years ago
7 0

Answer:

A

Explanation:

You might be interested in
What type of topology gives you a direct connection between two routers so that there is one communication path?
Setler79 [48]

Answer: Point-to-point topology

Explanation:Point-to-point topology is the connection between the nodes in a simple/regular manner by establishing only one path for the communication with each other.The flow that occurs in this type of topology are of two types - bidirectional(two-way)  and unidirectional(one-way) .

Thus the topology for the communication of the routers through a single communication path is done with the help of point-to-point pattern , considering each router as a point/node.

7 0
3 years ago
When spraying pesticide wear and protective eyeglass​
exis [7]
Ummmmmmmmmmmmmmmmmmmmm ok
6 0
2 years ago
Read 2 more answers
What does PR stand for ?
ss7ja [257]

Answer:

Public Relations or Pull Request (computer programming)

Explanation:

Hope this helps

3 0
3 years ago
9. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when travel
tatuchka [14]

Answer:

True

Explanation:

It is known as Don-Not-Carry rules are implemmented to avoid

-Unauthorized full disk copies (it have been made while the laptop owner was out of the hotel room on overseas travel)

-Laptops steals

- Monitoring by third parties of wireless using.

3 0
3 years ago
__________ is the electronic transmission of signals for communications, which enables organizations to carry out their processe
Serjik [45]

Telecommunications is the electronic transmission of signals for communications, which enables organizations to carry out their processes and tasks through effective computer networks

4 0
3 years ago
Other questions:
  • Jared does not update his computer’s system software. What threat does his computer face?
    9·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • Elizabeth types in the following search terms: "Adoption AND cats AND NOT Persians." what results will her search provide?
    12·2 answers
  • In JAVA,
    10·1 answer
  • @anthonydboss23<br><br> it’s goldielove6 <br><br> .....this is not a question everyone ignore this
    11·2 answers
  • Which of the selections below represents a recursive query?
    12·1 answer
  • Who Likes K-pop? Which group or groups do you like
    12·2 answers
  • Why it is not recommended to add sound effect on slide transition? Write at least two reasons.​
    6·1 answer
  • Determine the value of a and b at the end of the following code segment:
    12·1 answer
  • What is computer viras? Loist 2 preventive measures against it​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!