1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
9

Which statement describe the advantages of using XML? more than one answer can be correct

Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
6 0

Answer:

The statements that describe the advantages of using XML are;

B-It allows for data storage in a separate file

D-It is software independent

E-It facilitates the transport of data

Explanation:

XML data can be stored in separate file such that the layout and display can designed in HTML whereby the data in the XML file can be changed without changing the HTML

XML is both software and hardware independent thereby it is possible to use the same XML to carry information to different computers and software

XML is used for data transport.

You might be interested in
the first thing to do when your computer gives you an error message is A restart the computer B press the F2 key C write down th
lesya692 [45]

Answer:

I think you should restart the computer

6 0
1 year ago
Yolanda first breaks down the whole game she needs to program into modules. She then breaks these modules into smaller modules u
Tcecarenko [31]
That’s coo. What’s the question?
5 0
3 years ago
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
yaroslaw [1]

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

5 0
3 years ago
The ________letter of the first word in the Complimentary Closing has a capital letter, everything else is keyed in lower case o
Alona [7]

Answer: enter

\

Explanation:

yes

5 0
3 years ago
A(n _______________ is a pre-written formula that is built into excel
nevsk [136]
<span>A function is a pre-written formula that is built into excel.
There are many functions which are pre-written into excel.
Some examples are the SUM function which adds the values in a given range. The AVERAGE function takes the average of values in a given range, etc.
</span>
8 0
3 years ago
Other questions:
  • Which of the following would be considered a strong password?
    5·2 answers
  • 13.
    8·1 answer
  • Question 16 of 20
    12·2 answers
  • Quinton is having trouble learning Spanish because he keeps reverting back to the grammatical structures of his native English l
    6·1 answer
  • The Daily Trumpet newspaper accepts classified advertisements in 15 categories such as Apartments for Rent and Pets for Sale. De
    9·1 answer
  • What sort of query is (strbucks]?
    14·1 answer
  • Why was it important for the date format to be standardized by the
    7·1 answer
  • Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for l
    9·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n)
    11·1 answer
  • What is the digital revolution and how did it change society?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!