1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rus_ich [418]
3 years ago
11

Need answer ASAP. Thanks

Computers and Technology
1 answer:
valentinak56 [21]3 years ago
3 0

Answer:

1. XHTML

2. XML

3. HTML

4. CSS

Explanation:

You might be interested in
Cora is writing a program to make a motorcycle racing game. If Cora wants to speed of the motorcycle to appear on the screen whe
elixir [45]

Answer: C. Boolean value

Explanation:

The options are:

A. input

B. output

C. Boolean value

D. conditional statement

Boolean data type refers to the data type which possesses two values which are true and false which shows two truth values of values.

The boolean expression results in a boolean value. Based on the question given, then the answer will be Boolean value. Therefore, the correct option is C.

8 0
3 years ago
What does technological convergence mean, with examples?
Brrunno [24]

Answer:

Technological convergence is a term describes the layers of abstraction that enable different technologies t inter operate efficiently as a converged system. Convergent services such as VoIP, IPTV, Smart TV and others tend to replace the older technologies.

Explanation:

As a feature of society convergence can spur economic growth and change how people communicate on a global basis. A good way t evaluate the previous generations, items such as CD player, cassette deck, console TV or corded telephone each served only one function, whereas a single modern handheld computing device can meld several of those functions with hardly any user intervention required.

7 0
4 years ago
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
sp2606 [1]

Change default user name and password is the first step that should be performed by Derek to secure the wireless router

<h3><u>Explanation:</u></h3>

The device that helps in accessing internet or to any private computer network is the wireless router. It is a devices that acts as the access point which is wireless in nature. There are many steps involved in securing  the wireless router. If the wireless router is not secured then it will be used by others without our knowledge.

In order to secure the wireless router firstly we should create our won password and username deleting the default username and password.To do this, we must open router setting page and change the default username and password with our own. The SSID name of the network must also be changed.

6 0
4 years ago
Why ues storage unit?​
Jet001 [13]

Huh? I don’t understand your question... please be more specific so we can help you

6 0
3 years ago
Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
vodka [1.7K]

Answer:

Link manipulation

Explanation:

With the link manipulation the phisher manipulate the URL link, in this case, the URL can seem similar to an original website, but this link sends you to a fake website, and you enter for example your bank or personal information, the phisher use this data to steal money or delicate data, sometimes these links are sent by email or text messages.

4 0
4 years ago
Other questions:
  • Imagine that you are an independent filmmaker making a feature-length narrative film in the United States, with a variety of bot
    11·2 answers
  • The         provides access to the Internet; may also be internal
    5·1 answer
  • Declare an array reference variable, week, and initialize it to an array containing the strings "mon", "tue", "wed", "thu", "fri
    15·1 answer
  • Say our confusion matrix is as follows, calculate precision, recall, and accuracy. Interpret the results for the positive class.
    10·1 answer
  • Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
    6·1 answer
  • Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to rese
    6·1 answer
  • 8.7 lesson practice question 1
    13·1 answer
  • What does a wireless LAN (WLAN) act as to a wired network?
    12·1 answer
  • someone please do this for and send a screeshot or picture please its really important for my examsss :D​
    9·1 answer
  • If your earning potential is higher than the cost of your higher education,<br> you will have a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!