1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
3 years ago
10

In order to make schemas that will appear in the Schema Library available in the XML Options dialog box, what file extension sho

uld a user give to schemas?
--.xml
--.xsl
--.xslt
--.xsd
Computers and Technology
1 answer:
Luba_88 [7]3 years ago
5 0

Answer:

You can use your XML parser

Explanation:

hope this helps!

You might be interested in
tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?
SIZIF [17.4K]

A DNS attack which would only impact a single user is: DNS poisoning attack.

DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a Domain Name System (DNS) is used to connect a uniform resource locator (URL) or a web address with their internet protocol (IP) address.

In Cybersecurity, there are different types of DNS attacks and these include:

  • ‎DNS flood attack.
  • DNS tunneling.
  • DNS poisoning attack.

DNS poisoning attack is a special type of Domain Name System (DNS) attack that is designed to only impact or affect a single user.

Read more: brainly.com/question/17273205

7 0
3 years ago
After assembling a computer system the very first software to be installed is​
tatyana61 [14]

Answer:

operating system is the very first

after assembling a computer system the very first software to be installed is

8 0
4 years ago
Read 2 more answers
A multi-national retail company has multiple business divisions with each division having its own AWS account. The engineering t
velikii [3]

Answer:

C. X-ray

Explanation:

AWS X-ray is a form of service that assists developers in carrying out analysis and debugging functions, and at the same time helps in the allotted applications, including those built using a microservices architecture.

In other words, an X-ray, in this case, will assist the developers in carrying out the following:

1. Establish a service map

2. Single out errors and bugs

3. Construct analysis and visualization apps

4. Enhancing the experience for end-users of the application under x-ray.

4 0
3 years ago
What three processor technologies are required to install windows 8?
VashaNatasha [74]
The three processor technologies that are required to be able to install windoes 8 are NX, PAE  and SSE2. PAE stands for physical address extension, NX would NoeXecute and SSE2 means Streaming SIMD Extentions 2. The PAE is the one that enables 32bit processors to be able to access 4 GB and above of memory. NX would help guard the computer from malwares. Lastly, SSE2 is a set of instructions that is used by third party drivers and apps.
5 0
4 years ago
Write a MIPS program to continuously generate the following series of integers: 1, 2, 3, 6, 9, 18, 27, 54, 81, and so on. Use st
Pachacha [2.7K]

Answer:

Explanation:

Here is a working solution in MIPS

.data

space: .asciiz ", "

.text

li $t1, 1       #Start at 1

li $t2, 1       #Store last value

li $t4, 1000    #terminate at 1000

li $t7, 2       #For division (divide by 2)

loop:

li $v0, 1

add $a0, $t1, $zero #print $t1

syscall

div $t1, $t7      #divide $t1 by 2

mfhi $t5          #get the remainder

move $t6, $t1     #hang on to what $t1 was originally

beqz $t5, even    #if the remainder is 0, it's even

add $t1,$t1,$t1    #it's odd, so add to itself

move $t2, $t6      #store what $t1 was originally to last value

bgt $t1, $t4, done #if the number is over 1000, we're done

li $v0, 4           #Print a comma and space

la $a0, space

syscall

j loop

even:

add $t1,$t1,$t2    #set $t1 = $t1 + Last value ($t2)

move $t2, $t6      #store what $t1 was originally to last value

bgt $t1, $t4, done #if the number is over 1000, we're done

li $v0, 4           #Print a comma and space

la $a0, space

syscall

j loop

done:

3 0
4 years ago
Other questions:
  • The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n)
    10·2 answers
  • In a proper webpage which tag holds all of a webpages visible HTML?
    9·2 answers
  • What is the inflation rate if the price of a soda was $10 last year, but only $5 this year?
    5·1 answer
  • Melanie uses an old compact disk to store her company's contract documents. She finds out that she cannot access any documents b
    9·1 answer
  • 1. What are the biggest password mistakes that people and companies make? How can you avoid those mistakes?
    11·1 answer
  • Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol
    7·1 answer
  • Can someone please entertain me and talk right now, because I'm just so bored that I may lose my mind.
    6·1 answer
  • What is an insertion point?
    6·1 answer
  • What are two drawbacks of using netbook ? (Choose two)
    8·1 answer
  • What do you believe the year 2058 will be like? Reply with a link or a picture along with an explanation why. There should be a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!