1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovikov84 [41]
3 years ago
5

What is the significance of XML tags?

Computers and Technology
1 answer:
tatyana61 [14]3 years ago
7 0

Answer:

your answer would be to ur question would be B

You might be interested in
LEARNING TASK 3 about: REAMING THE RIGID STEEL CONDUIT.
devlian [24]

Answer:

1.I have learned that my teacher is a good teacher

2.I have realized that my name is beautiful

Explanation:

thats right? hope it's help you heart me and please give brainlesst

3 0
3 years ago
The picture above is a description of the C code below. Please modify the C below so that it uses FILE HANDLING (fopen, fputs, f
siniylev [52]

Answer: i just learned something new.

Explanation:

3 0
3 years ago
Which payment type is best if you are trying to stick to a budget?
nignag [31]

Answer:

debit card, credit cards usually make people overspend, and cash advance is a bad fee (like $10 minimum usually), and loans have interest

Explanation:

6 0
3 years ago
0 Select the correct answer. Which is an advantage of programming with a procedural language? A. Procedural program code is easy
Novosadov [1.4K]

Answer:

D. Algorithms of simple problems are readily available for reference. ​

Explanation:

Hope this helps you! Ask me anything if you have any quistions!

7 0
3 years ago
Proxy is a network computer that can serve as an intermediary for connecting with other computers.
Keith_Richards [23]

Answer:Protects the local network from outside access

Explanation:Proxy is a type of serves as the mediator in computer network for connecting the network with the user system. These servers are responsible for maintaining the security against any unauthorized access in the system or internet,privacy and other functions.. It helps in protecting the whole network connection by taking the control at the servers .

8 0
3 years ago
Other questions:
  • What is wearable technology? Provide at least one example
    13·2 answers
  • Over time, attackers have had to increase their skills to be able to attack systems or create viruses. True False
    8·1 answer
  • Browsing the web is one of the most common activities performed by individuals who use computers.
    12·1 answer
  • True or false. Embedding only part of a font is called presetting.
    14·1 answer
  • You can use this type of program to create a new raster image
    9·1 answer
  • In order for a fault-block mountain to form, a ______ must take place along a fault line and one side must be ________.
    11·1 answer
  • I have a question. This question will probably be deleted, but why do moderators keep deleting my answers when they are legitima
    13·1 answer
  • What is a computer and what is the work of it​
    5·2 answers
  • Question 19
    9·2 answers
  • If a friend gave a used Wii disc to someone, and they put it in their Wii, could they play it? Nintendo Switch games can only be
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!