1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
14

What is HTML?

Computers and Technology
2 answers:
krok68 [10]3 years ago
6 0

the answer is C. a website.


hope this helps!

gavmur [86]3 years ago
4 0
C hypertext markup language
You might be interested in
Graph the functions 8n, 4nlogn, 2n
sukhopar [10]

Graphs are used to represent functions and equations

<h3>How to graph the functions</h3>

The expressions of the functions are given as:

8n, 4nlog(n), 2n^2. n^3 and 2^n

Rewrite the expressions as functions.

So, we have:

y = 8n

y = 4nlog(n)

y = 2n^2

y = n^3

y =  2^n

Next, we plot the graph of the functions

See attachment for the graph of the functions, where n is represented on the x-coordinate, and y is represented on the y-coordinate

Read more about graphs and functions at:

brainly.com/question/13473114

4 0
2 years ago
A _______ attack is where the input includes code that is then executed by the attacked system.
sweet [91]

Answer: Code injection

Explanation:

3 0
2 years ago
Spreadsheets will be displayed as tables in presentations.True or False?
lesya692 [45]
Yes this is true. When put in presentations, Spreadsheets are displayed as tables with multiple columns and rows.
3 0
4 years ago
Read 2 more answers
Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In 1–2 sentences, descri
Tresset [83]

Carlos Should use a Security Camera to keep track of his physical hardware. Carlos can then use a computer to monitor the security cameras.

7 0
4 years ago
Read 2 more answers
The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to a
Aleks04 [339]

The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a lock on the shared file.

<h3>What does a lock on a file mean?</h3>

The lock icon can be seen in Windows and it shows that the file or folder is one that can only be accessed by the person who lock it.

Note that The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to acquire a lock on the shared file.

Learn more about synchronization from

brainly.com/question/25541016

#SPJ1

5 0
2 years ago
Other questions:
  • 5. The hazardous component in most antifreeze is _____, which is extremely toxic to humans and animals. A) Calcium Carbonate B)
    13·2 answers
  • Which of the following will affect the size of your monthly mortgage payment
    8·2 answers
  • Is there any level after genius?
    8·1 answer
  • Write only in C, not C++.
    14·1 answer
  • Is number 1 correct​
    7·2 answers
  • What does it mean to catch an exception?
    8·1 answer
  • What necessarily happens when a photographer chooses to give either the aperture or the shutter speed priority?
    10·1 answer
  • (python) Given the formula for conversion from Celsius to Fahrenheit
    10·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
  • This was the template given for my assignment: class Login:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!