1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnoma [55]
3 years ago
13

1. Which markup language adds the ability to use video without requiring the user to download add-ons?

Computers and Technology
1 answer:
aniked [119]3 years ago
3 0

HTML5

HTML5 has fewer plug-ins like the ability to standardize how audio and video are presented on a Web page. It introduces the <video> element designed to remove the need to install 3rd party add-ons and plug-ins like adobe flash player. It also adds the <audio> element  too that allows pages to smoothly add audio files.

You might be interested in
What are some short term goals for getting a bachelors degree
snow_tiger [21]
1. stay determined and motivated
2. plan ahead
3 stay organized
4. give individual attention to classes
5. don't drop out, even in the toughest times
6. get passing grades
7. graduate high school
8. plan for college and organize for college
9. prepare yourself
9. repeat?
3 0
3 years ago
How to make an upside down exclamation point on mac?
denis-greek [22]
Option + 1

-----------------------------
5 0
3 years ago
Please list of 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
geniusboy [140]

Answer:

BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Explanation:

tick me as brainlilist please

3 0
2 years ago
NEED HELP ASAP JAVA
Bas_tet [7]
I think is C tbh sorry if that’s wrong my fault
4 0
3 years ago
1. Which of the following does a histogram resemble the most?
Ierofanga [76]
Histograms resemble bar graphs the most.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Why are using some special characters (@, #, !, etc.) not a good idea?
    13·2 answers
  • A popular encryption method used to protect data that travel over a wireless network is ____
    12·1 answer
  • Wat kind o mouse pleese hep meh​
    11·1 answer
  • A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device
    12·1 answer
  • Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool
    15·1 answer
  • Writers in our networked world enhance their credibility by
    5·1 answer
  • When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustm
    13·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • What is an example of work performed by an integration platform as a service (ipaas)?
    14·2 answers
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!