1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
11

Prior to the development of e-commerce, web sites primarily delivered static html pages. true

Computers and Technology
1 answer:
CaHeK987 [17]3 years ago
8 0
<span>Prior to the development of e-commerce, web sites primarily delivered static HTML pages. true</span>
You might be interested in
A type of indent where the first line of text starts at the left margin and the second and succeeding lines of text are indented
9966 [12]

Answer: The first line intent

Explanation:

 The first line intent is one of the type of intent and the first line of the text are mainly starts from the left margin. It is one of the most common method to start the line or text with the new paragraph. We use the tab key for creating the first line indent in the word.

In the first line indent the second line are basically known as the succeeding line of the text that contain the various indented bullets.

3 0
3 years ago
Read 2 more answers
Explain the concept of risk management, including risk identification, assessment, and control.
abruzzese [7]

Answer:

Risk management is the technique that is used for managing the risky situation so that security of the system or organization can be maintained. The risk can be reduced by parameters like monitoring the system,alertness, preventive measures etc. There are terms related with the risk management for prevention of the risk such as risk control ,risk identification and risk assessment .

  • Risk control is the method that is used for calculating the loss or damage experience and then taking the correct measures to reduce the loss and thus, controlling the risk.
  • Risk assessment is the analyzation of the threats and source of damage/loss that is caused or can be caused by assessing the whole process and functioning.
  • Risk identification is the technique through which the threat is listed over a document and sorted in accordance with the category of risk, risk response etc.  

7 0
3 years ago
What is the shortcut key to apply /remove the subscript effect?<br> Ctrl+=<br><br> Ctrl-+
telo118 [61]

Answer:

Press "Ctrl, "Shift" and "=" on your keyboard to turn off superscript formatting.

5 0
2 years ago
How do I write a good personal narrative pls help im struggling very hard rn.​
statuscvo [17]

Answer: Find out which starter makes your partner most interested in reading your story.

1. Start with action or dialogue.

2. Ask a question or set of questions.

3. Describe the setting so readers can imagine it.

4. Give background information that will interest readers.

5. Introduce yourself to readers in a surprising way.

Explanation:

4 0
3 years ago
Loops are frequently used to ____; that is, to make sure it is meaningful and useful.
vitfil [10]

Loops are frequently used to<u> validate data </u>that is, to make sure it is meaningful and useful.

<h3>What are common blunders made by programmers in coding loops?</h3>

Forgetting to initialize and alter the loop control variable are common mistakes that programmers occasionally make. One set of instructions operates on multiple, separate sets of data. Initialized before joining a while loop.

<h3>What are the three steps that should occur in every loop?</h3>
  • Provide a starting value for the variable that will contain the loop.
  • Test the loop control variable to decide whether the loop body executes.
  • Alter the loop rule variable.

To learn more about Loops , refer

brainly.com/question/19344465

#SPJ4

4 0
2 years ago
Other questions:
  • Numeric data is stored in ___________ for direct processing.
    10·2 answers
  • )1-bit sign, 8-bit exponent, 23-bit fraction and a bias of127 is used for ___________ Binary Floating PointRepresentation
    11·1 answer
  • What's the screen that displays results from typing text, performing calculations, or running programs?
    11·1 answer
  • When you set the position property for a block element to fixed, the element
    5·1 answer
  • A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter's e-mail accou
    6·2 answers
  • Consider two communication technologies that use the same bandwidth, but Technology B has twice the SNR of technology A. If tech
    14·1 answer
  • The function below takes two arguments, a dictionary called dog_dictionary and a list of dog names (strings) adopted_dog_names.
    8·1 answer
  • What is the maximum current that should be allowed in a 5.0w 220 resistor?
    12·1 answer
  • Question:
    14·1 answer
  • The use of technology to observe a user's actions often without the user's knowledge is known as:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!