1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
2 years ago
5

Can someone plss help me!!

Computers and Technology
1 answer:
REY [17]2 years ago
8 0

Answer:

HTML elements are delineated by tags, written using angle brackets.

Explanation:

Tags such as <img /> and <input /> directly introduce content into the page.

You might be interested in
What are the differences between packet and circuit switching? Which is more prevalent today?
Juliette [100K]

Answer: The difference present between the packet switching and circuit switching are as follows:-

  • Packet switching i the switching in which the data packet travels through the connectionless path whereas connection oriented routes are present for circuit switching
  • Network layer uses the feature of packet switching while physical layer uses circuit switching technique
  • Data transferring is mostly preferred through packet switching and voice communication takes place through the circuit switching.
  • Packet switching is considered flexible as no already established connection is present for switching but the connection in circuit switching are already defined which makes it less flexible.

Among the packet switching and circuit switching , packet switching is preferred for the communication through the data packets because they have  flexibility and affordability.It can establish numerous connection for switching and this make it efficient.

4 0
3 years ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
What is the difference between building a table in word and excel
Anastasy [175]

Answer:

 The main difference between creating a table in word and excel is that there are more number of table tool and the layout section in the excel as compared to the MS word.

Creating a table in word or excel are only depend on the requirements of the particular table. If there is less number of calculations in the table then, it is easy to create the table in word as compared to excel.

And if we want to create a table with maximum numbers of rows and column and also contain high math calculation then, it is good to create in excel.

7 0
2 years ago
Carlie was asked to review a software prject for her company and determine what materials are needed. Whihc part of project mana
Helga [31]

Answer:

The answer is "Resources".

Explanation:

All services should definitely be reviewed through Carlie. However many Software Developers, Reviewers, and others are accessible are important to find out. Only then can Carlie find out because needed, the exact timelines. Because whenever establishing precise deadlines, she needs to take a look at the tools, that's why the above given choice is correct.

8 0
2 years ago
You're working on a TV that has a hard coded list of channels (use an enum for this list) and you're asked to create a mechanism
ra1l [238]
Jsjsjsoos I jdkkskso I iDisks I iiddikdk I ididkkd
8 0
3 years ago
Other questions:
  • What filter gives a “squeezed” effect to an image?
    14·2 answers
  • What does "FDDI" stand for in Technology?
    5·2 answers
  • What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
    12·1 answer
  • 3. Of the following pieces of information in a document, for which would you most likely insert a mail merge field? A. First nam
    13·2 answers
  • The common channel signaling (CCS) system provides a separate network dedicated to control and signaling over the PSTN. This ena
    15·1 answer
  • What is IaaS? For this service model, what are the resources the cloud vendor will provide/manage and what are the resources the
    15·1 answer
  • Name the functional arms of MSDE.
    13·1 answer
  • Cuántos tipos de grua existen en el mundo​
    7·1 answer
  • How is knowing how to use word or docs importamt?
    8·1 answer
  • Write 3 3 advantage and disadvantage of computer​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!