1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
8

What is the purpose for using proper markup language

Computers and Technology
2 answers:
agasfer [191]3 years ago
8 0

Answer:

Without the right tags the content wont be accurately indexed

Explanation:

ap3x approved

hope it helps

m_a_m_a [10]3 years ago
5 0

Answer:

n computer text processing, a markup language is a system for annotating a document in a way that is syntactically distinguishable from the text, meaning when the document is processed for display, the markup language is not shown, and is only used to format the text.

Explanation:

hold up reen deen ding ding ding ding

You might be interested in
At what depth does an employer need to use a protection system to ensure the safety of workers in a trench or excavation?
nevsk [136]
Trench 4 foot or deeper and must be located 25 foot within eachother
3 0
3 years ago
Read 2 more answers
CHALLENGE
Lorico [155]

Answer:

Following are the program to this question:

#include <stdio.h>//using the header file

int main()//main method

{

int y;//defining integer variable y

printf("Enter year value:");//print message

scanf("%d", &y);//use input method for input year value

if (y>= 2101)//defining if block that checks year greater then 2101

   printf("Distant future");//print message

else if (y>= 2001)//defining else if block that checks year greater then 2001

   printf("21st century"); //print message

else if (y>= 1901)//defining else if block that checks year greater then 1901

   printf("20th century");//print message

else  //defining else block

   printf("Long ago");//print message

   return 0;

}

Output:

Enter year value:1998

20th century

Explanation:

In the given C language code, inside the main method, an integer variable "y" is defined, which allows the user to input the year value, and use the multiple conditions to check the given value and print message when the condition is matched.  

  • Inside the "if" condition block, it checks the "y" variable value is greater and equal to 2101. so, it will print "Distant future", otherwise go to the next condition.
  • In this, if "y" value is greater than equal to "2001", it will print the message "21st century", otherwise go to the next condition.  
  • In this, If the value of "y" is greater than equal to "1901", it will print the message "20th century", and if all the above condition is not true, then it will go to the else block, and it will print "Long ago" as the message.
6 0
3 years ago
Literacy is best defined as knowing how to: (Points : 1
Soloha48 [4]
Depends on what kind of literacy you are referring to, (computer, health, etc). Since this was asked under computers and technology, I will base my answer on Computer Literacy.

Computer Literacy basically means how much you know about using a computer. Using applications such as Internet Explorer and Microsoft word, or simply typing a document is a form of computer literacy.
6 0
4 years ago
Suppose Alice uses the RSA system with a very large modulus n for which the factorization cannot be found in a reasonable amount
Yuliya22 [10]

Answer:

Encryption method security:-

  • Encryption method representing each alphabetic character as an integer between 0 and 25.
  • Now, apply RSA algorithm for each integer is not an efficient secure encryption method.

Explanation:

  • Let consider alphabetic characters set {A, B... Z} .
  • Each alphabetic character forms a set of message block values M={0,1,2...,25).
  • From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
  • Then, compute the cipher text with knowledge of Bob's public key;
  • If the public key is generated, then possibility to decrypt the cipher text to plain text.
  • The generated public key is easily calculated by everyone and security is lost.
  • Therefore, the encryption method is not secure.

Encryption method is not secure, Most efficient attack against this method:-

  • Now, compute the encryption message with the function Me mod n for all the possible values of M.
  • This is the most efficient attack against the scheme in encryption method.
  • Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.
4 0
3 years ago
Because __________ software can block suspicious software in real-time, it has an advantage over such established anti-virus det
shutvik [7]

Because dynamic analysis software can block suspicious software in real-time, it has an advantage over such established anti-virus detection techniques as fingerprinting or heuristics.

<h3>What is dynamic program analysis?</h3>
  • The examination of computer software by means of the execution of programs on a physical or virtual processor is known as dynamic program analysis.
  • Effective dynamic program analysis requires running the target program with enough test inputs to account for almost all potential outputs.
  • Utilizing software testing tools like code coverage increases the likelihood that a sufficient sampling of the program's potential behaviors has been seen.
  • Additionally, it is important to take precautions to reduce the impact that instrumentation has on the target program's execution, especially its temporal characteristics.
  • Static program analysis contrasts with dynamic analysis. Dynamic testing is used in unit tests, integration tests, system tests, and acceptance tests.

To learn more about the topic, refer to the following link:

brainly.com/question/17209742

#SPJ4

8 0
2 years ago
Other questions:
  • What protocol allows us to use a domain name like .com instead of an ip address?
    6·1 answer
  • The ____ layer of the osi model performs a series of miscellaneous functions necessary for presenting the data package properly
    6·1 answer
  • Do you think that feedly will help you create an effective personal online learning environment? Why or why not?
    15·1 answer
  • Which act will the person be punished by trying to obtain personal information employees illegally?
    11·1 answer
  • Which of the following letters do the most reliable websites end in?
    12·2 answers
  • Why are various creative works split up into different types under copyright law?
    9·1 answer
  • Visme,PowerPoint, keynote and prezi are what kind of software
    15·1 answer
  • Suppose that L is a sorted list of 1,000,000 elements. To determine whether the x item is in L, the average number of comparison
    14·1 answer
  • Select the education and qualifications that are most helpful for Insurance Services careers. Check all that apply.
    14·2 answers
  • To make your brand colors stand out, it is important to implement what with your color scheme?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!