1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
3 years ago
8

Which of the following uses the proper syntax for creating an HTML comment?

Computers and Technology
1 answer:
Harman [31]3 years ago
4 0

Answer:

c

Explanation:

You might be interested in
B. Identify the purpose of each of the following types of utility programs
olya-2409 [2.1K]

<u>These are the types </u>:

1. Antivirus software : Detects and removes virus and malwares from   computer system.

2.Disk defragmenter : Reduces the fragmented space in the disk.

3.Disk cleaner : Build to find and delete unwanted files to free the disk space.

6 0
4 years ago
Which setting indents all but the first line of a paragraph by the selected length?
Phoenix [80]

Answer:

Hanging

Explanation:

5 0
3 years ago
Rasha is working in QuickBooks as a heavy storm begins. Her building is notorious for losing power during storms, so she wants t
Anestetic [448]

Answer:

B.

Explanation:

Manually Back Up:

1. File Menu and click Back Up

2. Click Back Up Company.

3. Click Browse if you wanna a specific location o change the name. Then click Save.

5 0
3 years ago
Read 2 more answers
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
Who are the key players in the internet
Anna007 [38]
Gamers my dude, dank memes are also the internet's finest minds
4 0
3 years ago
Other questions:
  • In the Scrum board, prioritizing the issue backlog is done in the ———- mode.
    7·1 answer
  • Why should you avoid the use of sarcasm cliches and idioms in busniess letters?
    9·2 answers
  • The means of identifying an opportunity, understanding resource requirements, acquiring resources, planning, implementing, and h
    13·1 answer
  • Two Technicians are discussing ShopKey Pro. Technician
    14·1 answer
  • What is netiquettes?. Mention any 4 netiquettes. (for class 6)​
    5·1 answer
  • David is selling his art work. He wants to figure out how much he should charge for each painting to make a 20 percent profit. H
    10·1 answer
  • Which of these is an example of input?
    6·1 answer
  • Personal information in the computer can be viewed and stolen
    7·1 answer
  • Not all output display data for humans to read explain why​
    13·1 answer
  • Why is translator required ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!