1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
2 years ago
13

Which structural semantic will this HTML code snippet form?

Computers and Technology
1 answer:
Yakvenalex [24]2 years ago
3 0

Answer:

D. Block

Explanation:

Semantic HTML or semantic markup is HTML that introduces meaning to the web page rather than just presentation. For example, a <p> tag indicates that the enclosed text is a paragraph. This is both semantic and presentational because people know what paragraphs are, and browsers know how to display them.

You might be interested in
Proponents of Internet freedom see its _____________ as providing protection for unpopular expression; proponents of greater Int
NeTakaya

Answer: The answer is anonymity

Explanation: i had the same question on my test.

8 0
3 years ago
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
3 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
You are troubleshooting network connectivity issues on a workstation. which command would you use to request new ip
xxMikexx [17]

In the scenario in which you are troubleshooting network connectivity issues on a workstation the command that you should use in order to request new IP configuration information from a DHCP server is: ipconfig/renew. This command tells your computer to renew its current IP address lease with the router.

8 0
3 years ago
What is the output?
Aleksandr-060686 [28]

Answer:

The output of code is 20.

Explanation:

We need to give output of the following code:

numB = 25

while numB > 13:

numB = numB - 5

print(numB)

Solution:

We will check the condition of while loop, if the condition is true, then the statements inside the loop will be executed. Since brackets are not available so, only one statement is linked with while loop.

Executing the statements, we check condition while numB > 13 (25>13) is true, next statement will be executed numB = numB - 5  (20=25-13) so, when print(numB) will be executed, we will get 20.

The output of code is 20.

4 0
3 years ago
Read 2 more answers
Other questions:
  • You send a report to your boss for feedback and she returns it to you with her edits noted in the electronic file. This Word fea
    11·1 answer
  • Trisha is looking for a new table style. What is the fastest way for her to preview how different styles in the gallery would lo
    13·1 answer
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • What will be displayed after the following code is executed? def pass_it(x, y): z = x*y result = get_result(z) return(result) de
    13·1 answer
  • Is it possible for the front and rear references in a circular array implementation to be equal?
    8·1 answer
  • In most programming languages, the compiler carries a preprocessing step to determine if certain statements will compile. For in
    7·1 answer
  • Is Brainly cheating??
    10·2 answers
  • An organization using Robotic Process Automation (RPA) wishes to verify the quality and results of their automated processes to
    6·1 answer
  • Location of a video or photoshoot is not important when it comes to preplanning the shoot.
    10·1 answer
  • Short notes on primary key​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!