1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mario62 [17]
2 years ago
9

The main reason for using a comment in your HTML code is to

Computers and Technology
1 answer:
zvonat [6]2 years ago
8 0

Answer:

D, document and explain parts of code

Explanation:

Mark me brainliest :)

You might be interested in
Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to in
Pepsi [2]

Answer: Ask a member of the Enterprise Admins group to authorize the server.

Explanation:

From the information given, we are informed that Rachel installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server but then realizes that the DHCP server service has started, but that the server does not respond to DHCP lease requests.

In this case, the reason for this can be attributed to the fact that the server hasn't been authorized, therefore, she can ask a member of the Enterprise Admins group to authorize the server.

4 0
3 years ago
allows Internet telephony service providers to deliver telephony services and unified communications applications offering voice
hram777 [196]

Answer:

VoIP

Explanation:

Voice over Internet Protocol. You can share videos, data, voice and other applications.

3 0
3 years ago
How do I do these? I dont understand.
Natalija [7]
I don’t understand either, I would suggest contacting your teacher or maybe searching up videos or tutorials on how to solve such a problem.
3 0
3 years ago
Which string method returns true if the character is a lowercase letter?
Llana [10]
The right answer is : is.lower(letter)
8 0
3 years ago
How do spear phishing attacks differ from standard phishing attacks?
mina [271]

Answer:

Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".

Hope this help please give the brainliest award.

5 0
3 years ago
Other questions:
  • Clifford created a table using OpenOffice Writer and entered some information into the table. Later, he needed to add more rows
    15·2 answers
  • The Microsoft Developer Network is an example of a software development company. software development marketplace. developer for
    5·1 answer
  • What do character formats do for your document's message? A. Set how text aligns within a document B. Provide organization C. Pr
    6·2 answers
  • To do a good job of searching periodicals at your library, you should use A) the Library of Congress Authorities webpage. B) web
    10·1 answer
  • Try to figure out who the ideal customer is for the IPhone X
    15·2 answers
  • PLS HELP For this activity, you can use the audio recorder on your cell phone or a digital camera to record the following sounds
    14·1 answer
  • Convert the following numbers to binary numbers: 5 , 6 , 7 , 8 , 9 .​
    13·2 answers
  • Need answer ASAP!!!!
    7·1 answer
  • I need help with computer science<br> the quiz on e2020 is on hackers and unauthorized access
    15·2 answers
  • A web application's code prevents the output of any type of information when an error occurs during a request. The development t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!