1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
3 years ago
15

While all pages use HTML code, not all pages are written in

Computers and Technology
2 answers:
ZanzabumX [31]3 years ago
8 0

Answer:

Code Form

Explanation:

creativ13 [48]3 years ago
7 0
Is this a question?

*Answer: not much information to answer with*
You might be interested in
A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
blondinia [14]
Malware is the answer

3 0
4 years ago
If your computer has a ________, someone else can gain access to it undetected.
irinina [24]
<span>If your computer has a rootkit, someone else can gain access to it undetected.
</span>The term rootkit denotes a set of software tools <span>typically malicious.
 The purpose of this software is to enable access to a computer or areas of its software that is not otherwise allowed.
</span><span>It is one of the most difficult types of malware to find and remove.</span>
3 0
3 years ago
James is planning to expand his DTP business. He has most of the basic DTP hardware and software components, but now he wants to
Nezavi [6.7K]

QuarkXPress is the correct answer

3 0
3 years ago
Read 2 more answers
Is regular Facebook use healthy? Why or why not?
melamori03 [73]
No. social media makes people share too much information about their personal lives.
7 0
3 years ago
Read 2 more answers
Why do arthitects prefer memory dump to be in base 16​
gogolik [260]

Answer:

Memory dump in  base 16​ is human friendly

Explanation:

Hexadecimal numbers are human friendly and hence it is very easy to express the binary number in a more human-friendly as compared to any other base number systems. It is also used to trace errors in the storage

hence, the Architects prefer memory dump to be in base 16​

7 0
3 years ago
Other questions:
  • What makes Group Policy such a powerful tool is its ability to enable security administrators to:_________.
    8·1 answer
  • Which data type or collection of data types can SOQL statements populate or evaluate to?
    9·1 answer
  • Which hardware component is most suspect if a user can barely make out
    10·1 answer
  • Who play fortnite gameeeeeeee
    14·1 answer
  • What are some example of popular music for teenagers
    8·2 answers
  • Circuit pruning occurs only before puberty.<br> O True<br> O False
    9·2 answers
  • Why are iterators useful?
    8·1 answer
  • In the following nested loop structure, which loop does the program EXIT first?
    6·1 answer
  • The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
    13·1 answer
  • In what way, if any, is the impact of a given risk affected by the timing of a project?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!