1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
2 years ago
10

What is the name of html command? ​

Computers and Technology
1 answer:
Makovka662 [10]2 years ago
3 0

Here are some.

  • <html></html> This is the root element tag. ...
  • <head></head> ...
  • <title></title> ...
  • <body></body> ...
  • <h1></h1> ...
  • <p></p> ...
  • <a></a> ...
  • <img></img>
<h2>hope it helps.</h2><h2>stay safe healthy and happy....</h2>
You might be interested in
Your program has a loop. You want to exit the loop completely if the user guesses the correct word.
Wewaii [24]

Answer:

Continue

Explanation:

8 0
2 years ago
Read 2 more answers
These tools gather information from sources such as emails, text messages, and tweets and make the information instantly and pub
babunello [35]

Answer:

Crisis-Mapping

Explanation:

Social networks are characterized by the immediacy of the content that users produce, and that same feature can be transferred to the online mapping of crises and conflicts.

Characteristics Crisis-Mapping:

  • Real-time information processing.
  • Immediacy;
  • Visualization of the aggregated information can allow the detection of patterns that cause new analyzes to be undertaken or work hypothesis to verify.
  • Continuity in the tasks, the maps record activity without interruption during the twenty-four hours of the day and seven days per week.
  • Flexibility in the protocols, since the tasks are distributed and evolve according to the dynamics (the crisis maps evolve with the crisis itself).
8 0
3 years ago
What does nat stand for? network access trigger network administration timetable network address translation network association
Mars2501 [29]
Perhaps I think its NETWORK ADDRESS  TRANSLATIONS
take care:) 
6 0
2 years ago
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that
andrey2020 [161]

Answer:

It is the user tier of the 3-tier architecture that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

Explanation:

Almost if not all applications that use e-commerce for operations use the 3-tier architecture.  3-tier architecture is simply the arrangement of server tier which consists of all computers that run a web server and a database tier that consists of computers that run a DBMS to store and retrieve data. We also have the user data that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

When you make a request, for instance to Google in your local browser, the browser sends a request to the internet. This initial interaction between the user and the internet is what is known as the user tier of the 3 tier architecture. Basically, it is the phase where end users access content online through graphical interface browsers and make requests to the web servers and DBMS.

Learn more about 3-tier architecture

brainly.com/question/12627823

#LearnWithBrainly

6 0
3 years ago
what is the name of the program that enables the device and operating system to communicate with each other?
Fittoniya [83]

Answer:

Explain Operating System working: OS works as an intermediate between the user and computer. It helps the user to communicate with the computer without knowing how to speak the computer's language. The kernel is the central component of a computer operating systems.

Explanation:

3 0
2 years ago
Other questions:
  • A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that da
    14·1 answer
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • ​open-source software is​ ________.
    11·1 answer
  • Given two strings s and t of equal length, the Hamming distance between s and t, denoted dH(s,t), is the number of corresponding
    6·1 answer
  • 1. What makes discrimination different from harassment? (Don't give me definitions.)
    5·1 answer
  • Logical design is tied to a specific hardware and software platform. a. True b. False
    9·1 answer
  • Evolucion de los sistemas operativos
    5·1 answer
  • Modern Computers compared to earlier computers are
    10·1 answer
  • Similarities between master file and reference file
    12·1 answer
  • Ginny faced an application error while executing the recorder in opera. Which web browser is generally recommended to use with r
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!