1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
15

Tags that provide browsers with information about document characteristics

Computers and Technology
1 answer:
Lera25 [3.4K]3 years ago
5 0
Head, meta and depending on how you feel about CSS, style.
You might be interested in
The Loanable Funds Market is built very similar to the Supply & Demand Model. The Loanable Funds Market relates ____________
lawyer [7]
A should be the right answer
3 0
3 years ago
Which agency motors the sale and registration of vehicles and vessels within the state
gogolik [260]

An agency which monitors the sale and registration of vehicles and vessels within the state is the department of highway safety and motor vehicles.

<h3>What is the department of highway safety and motor vehicles?</h3>

The department of highway safety and motor vehicles can be defined as a cabinet agency that is established and saddled with the responsibility of monitoring the sales and registration of automobile vehicles and vessels within the state of Florida in the United States of America.

In 1969, the defunct department of public safety and the department of motor vehicles were merged together under Governor Claude Kirk, as a single agency, which became known as the department of highway safety and motor vehicles

Read more on department of highway safety here: brainly.com/question/4805408

#SPJ1

Complete Question:

Which agency monitors the sale and registration of vehicles and vessels within the state?

6 0
1 year ago
What are the responsibilities of the DBA and the database designers?
Ratling [72]

Answer:

Explanation:

DBA's main responsibility is making sure that there is enough CPU, disk, memory, and network bandwidth available, as well as making backups every so often. Meanwhile, the database designers/developers are responsible for investigating and implementing what the end-user needs and making sure that the database holds all of the information that the end-user will be using.

3 0
3 years ago
A start-up employs interns. The following details of interns are stored
Rufina [12.5K]

Answer: See below.

class Intern:

   def __init__(self):

       self.first_name = input("Enter first name: ")

       self.last_name = input("Enter last name: ")

       self.address = input("Enter address: ")

       self.mobile_number = input("Enter mobile number: ")

       self.e_mail = input("Enter e-mail: ")

   def getdata(self):

       print("First name: ", self.first_name)

       print("Last name: ", self.last_name)

       print("Address: ", self.address)

       print("Mobile number: ", self.mobile_number)

       print("E-mail: ", self.e_mail)

   def putdata(self):

       print("First name: ", self.first_name)

       print("Last name: ", self.last_name)

       print("Address: ", self.address)

       print("Mobile number: ", self.mobile_number)

       print("E-mail: ", self.e_mail)

Explanation:

7 0
2 years ago
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
yaroslaw [1]

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

5 0
3 years ago
Other questions:
  • What is one strengths of line graph? a) Line graphs show percentage in a whole b) Line graphs show change over time c) Line grap
    13·2 answers
  • Which acronym describes technology in which all or most of a deviceâs electronic circuitry is on a single microchip?
    12·1 answer
  • The guy wire BD exerts on the telephone pole AC a force P directed along BD. Knowing that P must have a 720-N component perpendi
    10·1 answer
  • Georgenotfound??? question mark??
    15·2 answers
  • All of the following are aspects of the search process except?
    5·2 answers
  • How has information technology made piracy possible
    14·1 answer
  • A bear is an animal and a zoo contains many animals, including bears. Three classes Animal, Bear, and Zoo are declared to repres
    12·1 answer
  • Hannah wanted to watch a movie. She typed the movie name on the search engine. In result she found the downloadable link of the
    10·1 answer
  • . Aisha’s supervisor asks her to create an aspect of a program that will hold data and make it easy to access. What does Aisha n
    5·1 answer
  • What is the general term for programs used to operate a computer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!