1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
9

What is <html>

Computers and Technology
2 answers:
ipn [44]3 years ago
8 0

the opening tag for an HTML document

olya-2409 [2.1K]3 years ago
4 0

the answer is d i just took the test

You might be interested in
During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those por
Setler [38]

Answer:

Following are the solution to the given question:

Explanation:

It sends commands to its Nmap executable platForm, which is used to specified and retrieves the production. The  ZenMap utilizes templates, which are primarily Nmap.

The parameter templates to decide how scans become formed Several ports, like ports, are available: 11, 21, 22, 25, 53, 445, and 3306, all of which run TCP: Linux services, SMTP Postfix, Apache Tomcat/Coyote JSP.

5 0
3 years ago
When you use the keyboard to scroll to a different position in the document, the ____ automatically moves when you press the des
FrozenT [24]

Answer:

Option C i.e., insertion point is the correct option.

Explanation:

if any user or person scrolls the following contents by using the keyboard from one position to another position in the document of the user then, the insertion point moves automatically without any implementation when the user presses any key they want. If the user clicks on the arrow keys then, it also works like that. So, that's why the following option is correct.

8 0
3 years ago
Kevin is working on a financial project that involves a lot of statistical information. He needs software that allows him to ent
makvit [3.9K]

Answer: Spreadsheet Software

If Kevin would use a spreadsheet software, he will be able to input all of the statistical data and have the software generate graphs of the data that he has inputted into the spreadsheet. Using a spreadsheet software, Kevin will also have access to changing the graphs data whenever an anomaly has been detected.

Some of examples of these software would be:

  • Microsoft Excel
  • Open Office
  • Google Sheets
  • LibreOffice

8 0
3 years ago
13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails".
serious [3.7K]

Answer: c

Explanation:

only reasonable answer

7 0
3 years ago
(40 pointsAnd brainliest answer ASAP) Maria is recording her friend’s graduation ceremony. How can Maria ensure that the video i
Elodia [21]

Answer:  there is a red "Tally light" that lights up and tell you if it is recording.

Explanation:

3 0
4 years ago
Other questions:
  • When using a target drive that is fat32 formatted, what is the maximum size limitation for split files?â?
    12·1 answer
  • When you define a table's primary key, the dbms automatically creates a(n) _____ index on the primary key column(s) you declared
    14·1 answer
  • Why is ice even more dangerous than snow
    9·2 answers
  • The functions of forums
    15·1 answer
  • Who designed analatic engine in the 1930's?​
    10·1 answer
  • PLEASE HELP!!! WILLGIVE BRAINLIEST!!!
    11·2 answers
  • Write a second ConvertToInches() with two double parameters, numFeet and numInches, that returns the total number of inches.
    10·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    7·2 answers
  • The Klez virus was a worm created to "spoof others. What is "spoofing"?
    6·1 answer
  • When adopting and implementing a software as a service (saas) platform such as salesforce for your business, which responsibilit
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!