1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
3 years ago
10

What is a Hyperlink. Give three characteristics of a hyperlink ​

Computers and Technology
2 answers:
MAVERICK [17]3 years ago
5 0

Answer:

a hyperlink, or simply a link, is a reference to data that the user can follow by clicking or tapping.

link label.

link title.

link target.

Vitek1552 [10]3 years ago
4 0

Answer:

link destination ("href" pointing to a URL)

link label.

link title.

link target.

link class or link id.

Explanation:

You might be interested in
What mode is generally used when delivering a presentation to an audience?
dybincka [34]

Answer:

delivery mode

Explanation:

there it is

7 0
3 years ago
Read 2 more answers
5. The access modifier of constructors should be _________________
tatiyna

Answer:

The correct answer for the given question is "public"

Explanation:

The access modifier of constructor is public,private ,protected.

The access modifier of constructor should be public because to access the constructor outside the class .

Constructor can be called anywhere in program by using public access modifier .

The default access modifier in a class is public.

In the private access modifier constructor cannot be called anywhere in program.

We use public keyword to declared public constructor .

We use private keywors to declared private constructor.

Following are example to declared public  and private constructor

class test

{

public test() //  to declared public constructor

{

// statement

}

private test() // to declared private  constructor

{

// statement

}

}

8 0
4 years ago
What would be considered a benefit of using simulation in the modern industry field? Simulation increases labor and manufacturin
Sholpan [36]
Simulation predicts possible problems before they occur
5 0
2 years ago
Trailer is only added at ___________ layer of OSI model.
finlep [7]

Answer:

a. Data link layer

Explanation:

A trailer / footer is the additional data (metadata) which is positioned at the end of the data block being stored or transferred,it  may contain information for the processing of the data block or simply placed at the end of the block.

In data transmission, the data is called the payload or body after the end of the header and before the trailer starts.

In Data link layer, it contain three parts-

  • Frame header
  • Frame data
  • Frame footer    
3 0
3 years ago
Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hac
Mars2501 [29]

Answer:

Chief Information Security Officer (CISO)

Explanation:

One of the senior executive officers in an organization is the Chief Information Security Officer (CISO). Sometimes referred to as the Chief Security Officer (CSO), the responsibility of the CISO is to ensure the security of an organization's business systems and develop strategies to safeguards these systems against malicious intruders such as hacker and viruses.

This role is a very crucial one in any organization especially those that run on IT infrastructures. Not only do they ensure security, they also work together with certain staff such as security directors and managers in the organization, in order to come up with decisions that will add value to the organization and give it some competitive edge over other organizations.

6 0
4 years ago
Other questions:
  • What usually happens at a police check? Do they just look up your name in their system?
    6·1 answer
  • Write a program to read-in a sequence of integers from the keyboard using scanf(). Your program will determine (a) the largest i
    8·1 answer
  • The __________ of a desktop computer is the case that houses the computerâs critical parts, such as the processing and storage d
    5·1 answer
  • The Internet of Things (IoT) is a global information architecture that could contain
    12·1 answer
  • Which is considered the best way to secure a laptop to a desk in a workplace?
    12·1 answer
  • What are two critical properties for a cryptographic hash function?
    9·1 answer
  • How would you convert an integer value to a float value in Python?
    10·1 answer
  • Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is
    14·1 answer
  • I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding
    8·2 answers
  • Check your knowledge
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!