1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
8

What is the difference between the dom api and the html dom api.

Computers and Technology
1 answer:
SCORPION-xisa [38]3 years ago
8 0
The DOM-core is the object model that is common for all XML documents (including HTML) with elements and attributes. The HTML-DOM is an extension of the core DOM with more specific interfaces for the various HTML elements.
You might be interested in
All states that have altered judicial selection techniques in recent years have adopted some form of:
BigorU [14]

Answer:

Merit Selection.

Answer choice D.

4 0
3 years ago
Read 2 more answers
Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?​?
mamaluj [8]
<span>Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?
Ryze
Friendster
SixDegrees
Tribe.net
MySpace


The Correct answer is </span>Friendster.
5 0
4 years ago
What is the shortcut key for opening a new tab in a web browser.
goblinko [34]
Crtl + T is the answer
4 0
2 years ago
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring t
bazaltina [42]

Answer: ensuring that a system is not changed by a subject that is not authorized to do so

Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion

4 0
3 years ago
What is automobile engineering?
Olenka [21]
<span>Automobile engineering is when cars and trucks are made in a factory.</span>
4 0
3 years ago
Other questions:
  • The purpose of the img element's ________ attribute is to provide a method for a browser to display different images depending o
    7·1 answer
  • Chunking is a good strategy for completing large assignments because it makes the work
    15·1 answer
  • In the context of data quality management tools, _____ software is one that gathers statistics, analyzes existing data sources a
    15·1 answer
  • Which components can be added to a lightning app on custom object (choose 3 answers)A. Visualforce B. Standard Lightning compone
    6·1 answer
  • The value of the expression 20.0 * (9/5) + 32.0 is
    11·1 answer
  • personal digital assistants are handheld devices that serve as personql information managers. what is another term used to refer
    11·2 answers
  • Pls answer will give brainlest dont answer if you dont know
    8·1 answer
  • Is climate change a man-made problem or a natural occurrence ? Why or why not ?
    8·1 answer
  • What's the use of computer?Where are they used?​
    6·2 answers
  • What is a blog . explain with example clearly .​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!