1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inna [77]
3 years ago
12

Html code to hyperlink file​

Computers and Technology
1 answer:
Dovator [93]3 years ago
7 0

Answer:

<p>Want to contact a specific staff member?

Find details on our <a href="contacts.html">contacts page</a>.</p>

Explanation:

You might be interested in
Explain how buyers and sellers factor into setting the stock price for a company’s shares.
Kitty [74]

Answer:

The stock price of a company share depends upon the supply and demand. And demand is more if more buyers have positive intent towards the company services or end product. Also if the services and end product are trending, the more buyers buy them, and hence demand increases, and hence the value of the company shares, and hence the stock price.  

Explanation:

The stock price of a company share depends upon the supply and demand. And demand is more if more buyers have positive intent towards the company services or end product. Also if the services and end product are trending, the more buyers buy them, and hence demand increases, and hence the value of the company shares, and hence the stock price.  

Thus as mentioned above, the stock price is down when less buyers shows the intent to buy, and the demand hence is low. The sellers show interest only if demand is high, and sometimes if company sells for less amount and gives more profit margin.

6 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
You must receive an invitation in order to join Pinterest. True or False?
malfutka [58]
That is false, Pinterest is a free website that anyone can join!
3 0
3 years ago
Read 2 more answers
What are two types of organizational structures designed to help an organization achieve its goals and objectives?
Fittoniya [83]

The answer is entrepreneurial and bureaucratic. Organizations that are large and small can achieve higher sales and other profit by properly matching their needs with the structure they use to operate.   the structure of an organization can help or hinder its progress toward accomplishing these goals and This are specific set up of organizations and ways to accomplish different goals. 

4 0
3 years ago
Read 2 more answers
Computer-based networks that trigger actions by sensing changes in the real or digital world are known as: global marketing plat
Gennadij [26K]
It known as the smart systems

It make decision by describing and analyzing the available data in a predictive or adaptive manner thereby performing an efficient and smart actions based on that analysis

A lot of smart systems evolved from micro systems
8 0
3 years ago
Other questions:
  • How to track flash socket server connections wireshark?
    10·1 answer
  • Which data type is most suitable for a password field
    12·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • Sandra is having difficulty with her reading assignment because she does not fully understand the language. Which online tool wo
    6·1 answer
  • Networking and telecommunications technologies, along with computer hardware, software, datamanagement technology, and the peopl
    11·1 answer
  • Jane is creating a slide that will have a large heading and number of bullet points below it. What slide format should she use?
    12·1 answer
  • If a file you are opening for appending does not exist, the operating system will detect the missing file and terminate the oper
    14·1 answer
  • What is white light?
    12·2 answers
  • The math function ceil(x) returns the smallest integer that is greater than or equal to x. True False
    12·1 answer
  • 5 points)*list all of the data that needs to be kept track of for the scenario above in a 1nf (flat file) table (20 points)*use
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!