1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
2 years ago
14

How to identify mistakes in a html code??​

Computers and Technology
1 answer:
Over [174]2 years ago
7 0
hello i am having a mental breakdown could u help me please?
You might be interested in
What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?
dalvyx [7]

Answer:

WPAN ( wireless personal area network )

Explanation:

a. PAN ( personal area network )

This network is limited to the work place of a single person. Hence, the name given as personal area network. The devices connected by PAN belong to the range supported by the technology used to implemented the personal area network.

The devices present in this type of work place are connected to each other through PAN. PAN can connect computer, mobile and other technological devices which support PAN.

The data is transferred among these devices through PAN.

Both wireless and wired networks can be used to implement PAN. Wired PAN is achieved by using USB. Wireless PAN uses various technologies which are discussed below.

b. WPAN ( wireless personal area network )

The wireless PAN covers only short distance and hence requires low power.

The distance can range from few centimetres to few meters.

IEEE 802 has described the technologies and standards for each type of network. This network is implemented mainly by technologies such as Bluetooth, wireless USB, IrDA.

1. Bluetooth uses radio waves of short waves. Devices like keyboard, mobile phones, personal digital assistant ( PDA ) use this technology to communicate.

WPAN implemented using Bluetooth is known as piconet. It can connect up to 8 devices. Among them, one is the master device while rest devices become the slaves.

The range of such a network varies from 10 meters to 100 meters.

2. IrDA stands for Infrared Data Association. This technology uses infrared light. Examples using this technology include printers and scanners.

Plugging in

i. Devices supporting WPAN can only communicate with each other when they are within the supported range or distance from each other.

ii. In addition, these devices should have the capability to block devices which will cause unnecessary interference or are not authorized to gain information.

5 0
2 years ago
How do you copy and paste a screenshot on an hd computer
ICE Princess25 [194]

Answer:

Ctrl shift s, i believe

6 0
3 years ago
Read 2 more answers
A company has a hybrid ASP.NET Web API application that is based on a software as a service (SaaS) offering.Users report general
kobusy [5.1K]

Answer: B. Azure Data Lake Analytics and Azure Monitor Logs

Explanation:

There is a feature on Azure Monitor called Application Insights. This feature offers clients the ability to implement live monitoring of applications as well as detect anomalies.

With its analytics tools, clients can diagnose the issues reported by users as well as follow and understand the activities of users.

5 0
3 years ago
A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
professor190 [17]

Answer:

wireless replay attack

Explanation:

Based on the scenario being described within the question it can be said that the type of attack that is being described is known as a wireless replay attack. Like mentioned in the question this is a network attack where an individual hijacks data in the middle of it being sent in order to copy it before the data reaches the intended recipient. This information can then be used for whatever the attacker intends.

6 0
3 years ago
Read 2 more answers
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
3 years ago
Other questions:
  • Which component is the smallest unit in a spreadsheet?
    14·2 answers
  • Susan bought a new sweater on sale for $28.93.she was charged HST of 13%.find the total amount of her bill including taxes.​
    9·1 answer
  • Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an in
    13·2 answers
  • Which one of the following parts of a universal motor does not move? A. The armature B. The field coil C. The shaft D. The commu
    5·1 answer
  • Internet is for everyone but it wont be if its users cannot protect their privacy and the confidentiality of transactions conduc
    6·1 answer
  • How do you copy and paste plz let me know
    14·2 answers
  • Plzzz help i need this today :(
    15·1 answer
  • What will the computer do in response to a line of code reading # name = input("What is your name?")
    7·1 answer
  • Select the correct text in the passage.
    12·1 answer
  • THIS IS TIMED PLS HURRY UP
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!