For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called ________. Group of answer choices Hypertext Markup Language (HTML) top-level domains (TLDs) uniform resource locators (URLs) hyperlinks

Answers

Answer 1

URL is the right answer

Explanation:

Ive worked in data management


Related Questions

Why online fraud rose 79% in UK after they switched to the chip and PIN system in the first three years?

Answers

Answer:

TBH I HAVE NO FREAKING IDEA BUT I NEED POINTS BC IM DOING AN EXAM AND HAVE NO MONEY SORRY

write an algorithm to print the first 100 odd numbers​

Answers

Answer:

ALGORITHM :

Step 1: Start

Step 2: Declare variable c of integer type

Step 3: Set c=0

Step 4: Repeat step 4.1 to 4.3 while (c<=100)

Step 4.1: if (c%2 != 0)

Step 4.2: then print c

Step 4.3 : c=c+1

Step 5: Stop

FLOWCHART:

Explanation:

Give three reasons why it is important to have hci-based software programs.

need this soon

Answers

The three reasons why it is important to have HCI-based software programs As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

What is HCI and why is it important?

The Role of Human Computer Interaction withinside the Workplace. Human Computer Interaction (HCI) and User Experience (UX) are interdisciplinary fields that draw on human-focused disciplines like psychology and sociology to layout and increase technological merchandise that meet human needs.

As its call implies, HCI includes 3 parts: the user, the pc itself, and the methods they paint together.HCI is vital on account that it'll be important for items to be extra successful, safe, helpful, and functional. It will make the users revel in extra fun withinside the lengthy term. As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

Read more about the software programs:

https://brainly.com/question/1538272

#SPJ1

write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000

Answers

Using the computational language in C++ it is possible to write a code that uses the salary values ​​of the employees of a company dividing between the number of employees.

Writing the code in C++ is possible:

#include<stdio.h>

#inc1ude<conio.h>

void main()

{

int i, n, count = 0;

Long int salary[25];

clrscr();

printf(“\n Input salary of 25 persons:- ");

for(i=0;i<25;i++)

scanf("%ld", &salary[i]);

for(i=0;i<25;i++)

{

if(Salary[i]>30000 && salary[i]<40000)

count++;

}

printf("There are %d persons whose salary is in between 30000 and 40000",count);

getch();

}

See more about C++ code brainly.com/question/17544466

#SPJ1

Write an algorithim and flowchart to check it the temperature is more than 25°. If it more than 25°C switch fan on else off.​

Answers

Answer:

write the sly flowchart

Explanation:

#stdlib.etc

main()
{

    int temp;
    bool fan = false;

    print("enter the frigin temperature: ");

    read(temp);

    if (temp > 25)

     {
         fan = true;
         print("the fan is on");
     }
     else
      {

           print("the fan is off");

      }

      return 0;

}

what are backup storage device of computer ?​

Answers

Sd/ external hard drives
A backup storage device is used to make copies of data that is actively in use. Backup machines provide redundancy of data residing on primary storage. Should the storage medium, such as a hard disk drive (HDD), fail or become corrupted, the original data is recovered from copies on the backup hardware.

how can you use Upload Files & Folders View when designing A website.

Answers

In the process of designing a website, an end user can upload files and folders by navigating to Site Tools > Site > File Manager.

What is a website?

A website simply refers to a collective name which connotes a series of webpages that are linked together (interconnected) with the same domain name, so as to provide specific information to end users.

In Computer technology, an end user can upload files and folders when designing a website by navigating to Site Tools > Site > File Manager.

Read more on website here: https://brainly.com/question/26324021

#SPJ1

What version of bluetooth is installed on the yaesu ft-5dr?.

Answers

Answer:

version 4.2

Explanation:

The ________ is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet. Group of answer choices world wide web Internet of Things Cloud solid state of things

Answers

Answer:

Internet of Things (IOT)

The Internet of Things (IoT) is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet.

The Internet of Things (IoT) refers to the network of physical objects or "things" embedded with sensors, software, and other technologies that enable them to connect and exchange data with other devices or systems over the Internet.

These objects can be everyday items such as household appliances, wearable devices, industrial machines, vehicles, and much more.

IoT allows these objects to collect and transmit data, interact with their environment, and even respond to certain events or conditions without requiring direct human intervention.

The data generated by IoT devices can be analyzed and utilized to make informed decisions, improve efficiency, enhance convenience, and create new services and applications.

IoT has the potential to transform various industries, including healthcare, agriculture, transportation, manufacturing, and more.

It is an essential component of the ongoing development of the Internet, as it expands the scope of connected devices beyond traditional computers and smartphones.

Hence the correct answer is: Internet of Things (IoT).

Learn more about Internet of Things click;

https://brainly.com/question/29767247

#SPJ3

100 POINTS FOR ANYONE WHO CAN DO THIS!
Make the following modifications to the original sentence-generator program:

The prepositional phrase is optional. (It can appear with a certain probability.)
A conjunction and a second independent clause are optional: "The boy took a drink and the girl played baseball".
An adjective is optional, it may or may not be added to the sentence to describe a noun: "The girl kicked the red ball with a sore foot".
"Optional" is implying that the program should include these elements in a semi-random frequency.

You should add new variables for the sets of adjectives and conjunctions.

Answers

Let's check what can be modified

Before calling def we need adjective and conjunctions stored inside variables

Store them(You may change according to your choice)

[tex]\tt adjectives=("foolish","bad","long","hard")[/tex]

[tex]\tt conjunctions=("and","but","for","after")[/tex]

We have to make optional ,easy way ask the user to do instead of yourself .

[tex]\tt con=input("Enter\: yes\: if \:you \:want \:to \:use \:conjunctions:")[/tex]

[tex]\tt adj=input("Enter\:yes\:if\:you\:want\:to\:use\: adjectives:")[/tex]

If they click then we can proceed else no problem let the program run

[tex]\tt def\: conjunctionPhrase():[/tex]

[tex]\quad\tt if\: con=="yes":[/tex]

[tex]\quad\quad\tt return\:random.choice(conjunctions)+"\:"+nounPhrase()[/tex]

[tex]\quad\tt else:[/tex]

[tex]\quad\quad\tt continue[/tex]

You may use pass also

[tex]\tt def\: adjectivePhrase():[/tex]

[tex]\quad\tt if\:adj=="yes":[/tex]

[tex]\quad\quad\tt return\:random.choice(adjectives)+"\:"+nounPhrase()[/tex]

[tex]\quad\tt else:[/tex]

[tex]\quad\quad\tt continue[/tex]

Effective data communication relies on many components to function collaboratively and reliably. When troubleshooting network problems, you'll need to be able to identify which component is most likely causing the problem based on the symptoms you're observing. Identify the most likely issue causing the problem in each scenario.

Answers

The likely issue cause of the problem in the scenario.

Modem: Problem: Dante's home router reports that it's not connected to the internet.

What is the reason for the above scenario?

The reason for the modem problem may be due to  some issue that occurs with the connection of the modem device

Therefore, The likely issue cause of the problem in the scenario.

Modem: Problem: Dante's home router reports that it's not connected to the internet.  because it is only with the modem that he can connect to the internet and thus need to solve the issue.

Learn more about  communication from

https://brainly.com/question/26152499

#SPJ1

Question 3 of 10
in which part of the Scratch interface does a programmer combine code
blocks to build the program?
OA. Block palette
OB. Stage
OC. Scripts area
O D. Sprite info pane

Answers

The part of the Scratch interface that a programmer combine code

blocks to build the program is the Block palette.

Which part of the sprite screen has programming blocks?

The block palette is known to be the part where all the code blocks can be found.

Note that all the Blocks are said to be color coded by category and as such, The part of the Scratch interface that a programmer combine code

blocks to build the program is the Block palette.

Learn more about Scratch interface from

https://brainly.com/question/27820529

#SPJ1

A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the substitution of the term ______ computers for federal interest computers so that the statute now protects any computer attached to the Internet.

Answers

A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the substitution of the term protected computers for federal interest computers so that the statute now protects any computer attached to the Internet.

What is the National information infrastructure protection act?

It is an amendment act of Computer Fraud and Abuse Act and was enacted in 1996. The act is for the cyber crimes and frauds.

Thus, the correct option is protected.

Learn more about National information infrastructure protection act

https://brainly.com/question/13371540

#SPJ1

Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain so that she can start an online delivery system through his web portal as well. He wants Angela to put a unique domain name so that his website appears a little different from the other competitors. Analyze which of the following top level domain names Angela should opt for under such requirements. a. .mil.
b. .biz.
c. .eu.
d. .com.

Answers

The option among the top level domain names that Angela should opt for under such requirements is .biz.

What's a domain name?

Domain names are known to be formed to create IP addresses very easy so that one can easily remember.

Note that the domain name of biz is better for Angela to use as it is suitable for her business and as such, The option among the top level domain names that Angela should opt for under such requirements is .biz.

Learn more about domain name from

https://brainly.com/question/17062016

#SPJ1

True or False. It is OK for students to find answers to questions on the Internet and submit those answers during a test.

Answers

Strange question, but I would say false. FALSE

What is the difference between the wiring configurations for a residential, 8-position, 8-contact (8P8C) modular plug and jack in the Universal Service Order Codes (USOC) and ANSI/TIA/EIA 570-B

Answers

The key variance between how the two wiring configurations described are in the way that the pair numbers three and four are situated or placed.

What is Service Order Codes (USOC)?

The above refers to a system of specifications that was created by Bell Systems company to enable the connection of equipment used in buildings both in homes and in public places.

The ANSI/TIA/EIA 570-B on the other hand is the standard that the cabling for telecommunications must meet.

Hence, the primary variance between how the configuration or settings of the wiring for a residential, 8-position, 8-contact (8P8C) modular plug and jack in the Universal Service Order Codes (USOC) and ANSI/TIA/EIA 570-B is in the way that the pair numbers three and four are situated or placed.

Learn more about wiring at:

https://brainly.com/question/25922783
#SPJ4

What does Fees, Risk Assessment and Returns mean?

Answers

Answer:

The term return refers to income from a security after a defined period either in the form of interest, dividend, or market appreciation in security value. On the other hand, risk refers to uncertainty over the future to get this return. In simple words, it is a probability of getting return on security.

Explanation:

What are two benefits of defining a function?

A. It can be reused in multiple spots throughout the program. B. It keeps code smaller by reducing the number of blocks. C. It allows custom functions to appear as an option for all sprites D. It decreases the computer's processing speed

Answers

The two benefits of defining a function are:

It keeps code smaller by reducing the number of blocks. It can be reused in multiple spots throughout the program.

What is this function about?

A function is defined based on the link that exist between a set of inputs having one output each.

Note that  a function is  simply a relationship that exist between inputs where each input is linked to one specific  output.

Therefore, The two benefits of defining a function are:

It keeps code smaller by reducing the number of blocks. It can be reused in multiple spots throughout the program.

Learn more about  function from

https://brainly.com/question/23897143

#SPJ1

Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public. Which of the following security solutions would mitigate the risk of future data disclosures?(A) FDE(B) TPM(C) HIDS(D) VPN

Answers

Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

What is FDE in security?

Full disk encryption (FDE) is known to be a kid of a security measures that is often taken so as to help in the protection of all data saved on a hard drive from any kind of unauthorized access through the use of disk-level encryption.

Therefore, Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

Learn more about Remote workers from

https://brainly.com/question/26512743

#SPJ1

The Western Siberian Plain is __________ in some places because it has poor natural draining systems.

Answers

The Western Siberian Plain is marshy in some places because it has poor natural draining systems.

What is a Drainage system?

A Drainage system may be defined as the complete process to exhaust the water in the soil to improve crop production in an area. It eliminates the water through the surface of the earth.

The complete question is as follows:

The Western Siberian Plain is __________ in some places because it has poor natural draining systems.

subtropicalhumidmarshyarid

Therefore, the correct option for this question is C, i.e. marshy.

To learn more about the Drainage system, refer to the link:

https://brainly.com/question/908462

#SPJ1

A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.

Answers

A user view is often developed by identifying a form or report that an end user needs on a regular basis.

What is a database?

A database can be defined as an organized and structured collection of factual data that are stored on a computer system as a backup and are usually accessed electronically.

In database management system (DBMS), a user view is often developed by a software developer through an identification of a form or report that an end user needs on a regular basis.

Read more on data here: brainly.com/question/13179611

#SPJ1

Which longstanding restaurant chain closed its last location in lake george, new york?.

Answers

It’s Howard Johnson

Drag each label to the correct location on the image.
Match each item to check for while reconciling a bank account with the document to which it relates.

Answers

The matchup are:

Balancing check register has:

Interest earned.Deposit in transit.

Balancing statement account has:

NFS FeesBank Error

What is bank reconciliation?

Bank Reconciliation is known to be a process in accounting where firms are said to match their bank statements to their various transactions that are known to be recorded in their general ledger.

A statement of account is known to be one that list all the financial transactions that took place when two or businesses make different transaction over a period of time.

Note that Balancing your checkbook is a way of verifying that the records you have matches with that of the bank's.

Learn more about bank reconciliation  from

https://brainly.com/question/15525383

#SPJ1

Northern trail outfitters has the case object set to private. the support manager raised a concern the reps have a boarder view of data than expected and can see all cases on their groups dashboards. what could be causing reps to have inappropriate access to data on dashboards

Answers

The option that could be causing reps to have inappropriate access to data on dashboards is known to be Dynamic Dashboards.

What is a Dynamic dashboards?

Dynamic dashboards is known to be a tool that helps all user to be able to view the data they are known to have access to.

Note that in the case above about Northern trail outfitters, the option that could be causing reps to have inappropriate access to data on dashboards is known to be Dynamic Dashboards.

see options below

Northern Trail Outfitters has the Case object set to private. The support manager raised a concern that reps have a broader view of data than expected and can see all cases on their group's dashboards.

What could be causing reps to have inappropriate access to data on dashboards?

A. Public Dashboards

B. Dashboard Subscriptions

C. Dynamic Dashboards

D. Dashboard Filters

Learn more about Dashboards from

https://brainly.com/question/1147194

#SPJ1

ANSWERS FOR PLATO!!!

What does the second element in a pair of HTML tags contain?

ANSWER: /

when would you use the code snippet <input...(randome code stuff)...> American?

ANSWER: while inserting a RADIO BUTTON

assume you are creating a website for school... yada yada,

ANSWER: <img>

Why is it preferable to code web pages in HTML format?

ANSWER: to display properly as search results in all browsers

drag tiles, somthinf about creating a web page and wich dose the html tags define


new paragraph ---> <p>

define a term ---> <dd>

define single line break ---> <br>

define heading ---> <h3>


HOPE THIS HELPS GUYS YOU GOT THIS KEEP ON KEEPING ON <3<3<3<3 #platogang #edementumegang​

Answers

The thing which the second element in a pair of HTML tags contain is "/" and is known as the Closing Tag.

What is an HTML Tag?

This refers to the keywords that are used in the building block of a website to indicate how a web browser would interpret and display the content.

Hence, we can see that in HTML tags, there are always the Opening and Closing Tags that are used to enclose lines of code and when paired together are known as container tags.

Read more about HTML elements here:

https://brainly.com/question/9069928

#SPJ1

What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.

Answers

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.

What type of hackers are motivated by social or political issues?

Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated  aim or reason.

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.

Learn more about Hacktivism from

https://brainly.com/question/5483494

#SPJ1

a. What is this age called?

Answers

Answer:

The Information Age (also known as the Computer Age, Digital Age, or New Media Age) is a historical period that began in the mid-20th century, characterized by a rapid epochal shift from traditional industry established by the Industrial Revolution to an economy primarily based upon information technology.

OR

Age, epoch, era, period all refer to an extent of time.

Explanation:

can i have brainliest pls?

The which command _________________. a. can only be used to search for executables b. searches for a file in all directories starting from the root c. is not a valid Linux command d. searches for a file only in directories that are in the PATH variable

Answers

Answer: D. Searches for a file only in the directories that are in the path variable

are tigers and goldfish related

Answers

Yes, they are by law of America

HELPP!!! 50 POINTS WHOEVER GETS IT RIGHT
David has gone to the Niagara Falls with his camera. He wants to click photos of the people around him and also the distant sights. If he can have just one lens with him, which lens would it be?

David can take__ lens with him.

it ISN’T standard, normal, telephoto or wide lens i’ve already tried

Answers

Since David has gone to Niagara Falls with his camera. He wants to click photos of the people around him and also the distant sights. If he can have just one lens with him, the lens would be a zoom lens.

What is Photography?

This refers to the act and process of taking pictures with the use of a camera with the help of lenses.

This is because the telephoto lens is perfect and great for taking shots that are both distant and close and gives the best focal length and zoom as they are amazing for bringing distant scenes and subjects closer

Hence, we can see that the zoom lenses are the best as they can be manually adjusted for David for taking close pictures and distant shots too.

This helps David to take close photos and also distant sights and zoom lenses would help him do this.

Read more about zoom lenses here:

https://brainly.com/question/13874733

#SPJ1

Other Questions
Determine the unknown mineral using the information given below. Be sure to use significant figure rules when doing calculations. Mass is shown on the triple beam. Scale Test Mineral Mineral H. Density, g/cc 10 diamond tellurium 2 2.07 9 corundum galena 2.5 7.58 8 topaz anglesite 2.5 - 3 6.4 7 quartz chalcocite 2.5 - 3 5.6 6 feldspar copper 2.5 - 3 9.0 5 apatite gold 2.5 - 3 19.3 4 fluorite silver 2.5 - 3 10.5 3 calcite arsenic 3.5 5.7 2 gypsum barite 3 - 3.5 4.4 1 talc dolomite 3.5 - 4 2.9 platinum 4.5 21.5 willemite 5.5 4.0 magnetite 6 5.18 pyrite 6 - 6.5 5.02 pyrolusite 6 - 6.5 5.0 cassiterite 6.5 6.9 diamond 10 3.52 Volume of water displaced = 0.051 LMass: 981.0, 908, 908.1, 981 gDensity: 192.35, 19,235, 19, 19.2 g/ccHardness 4, 2.5, 1, 3, 5.5 - 5, 3, 2, 4.5, 1.5Determine the unknown mineral.Platinum, Gold Uranus was originally thought to be the star Sagittarius A*.TrueFalse 5. What was Einsteins major work As you continue to proofread your peer's essay, you now start to focus on higherorder concerns in another paragraph. Read through the following paragraph andselect the type of error that is presentRead through the following paragraph and select the type of higher concern errorthat is present.My classmates mocked my reading, so I only imagined how they'd react to mywriting. They always reminded of how little I'm familiar with the language that theyseemed to master. Why was I singled out?A) Focus B) DevelopmentC) Organization D) Audience 9:40 in english words Sana's mother bought produce for Sunday dinner. She bought one more pound of peaches than pounds of tomatoes. She bought 3 times as many pounds of tomatoes as pounds of mushrooms.If peaches cost $6 per lb, tomatoes cost $3 per lb, and mushrooms cost $10 per lb, how many of each did Sana's mother buy for $80? Task 2Rearrange the lines in the Python program below, so that you have a runnable programthat holds a meaningful interaction with the user.1 print("And where do you live", name)2 print ("I've never been to", location)3 name = input()4 print("What is your name?")5 location = input()Write your rearranged program below: if u=6i-2j and v=-3i+7j, find u-v rom QUIT INDIAMohandas Karamchand GandhiAugust 8, 1942 Then, there is the question of your attitude towards the British. I have noticed that there is hatred towards the British among the people. The people say they are disgusted with their behavior. The people make no distinction between British imperialism and the British people. To them, the two are one. This hatred would even make them welcome the Japanese. It is most dangerous. It means that they will exchange one slavery for another. We must get rid of this feeling. Our quarrel is not with the British people, we fight their imperialism. The proposal for the withdrawal of British power did not come out of anger. It came to enable India to play its due part at the present critical juncture. It is not a happy position for a big country like India to be merely helping with money and material obtained willy-nilly from her while the United Nations are conducting the war. We cannot evoke the true spirit of sacrifice and valor, so long as we are not free. I know the British Government will not be able to withhold freedom from us, when we have made enough self-sacrifice. We must, therefore, purge ourselves of hatred. Speaking for myself, I can say that I have never felt any hatred. As a matter of fact, I feel myself to be a greater friend of the British now than ever before. One reason is that they are today in distress. My very friendship, therefore, demands that I should try to save them from their mistakes. As I view the situation, they are on the brink of an abyss. It, therefore, becomes my duty to warn them of their danger even though it may, for the time being, anger them to the point of cutting off the friendly hand that is stretched out to help them. People may laugh, nevertheless that is my claim. At a time when I may have to launch the biggest struggle of my life, I may not harbor hatred against anybody.Drag each tile to the correct box.Identify examples of each emotional appeal in Gandhis speech. [tex]\sf\large\green{\underbrace{\red{Question*}}}:[/tex][tex] \mathcal \pink{Solve} [/tex][tex] \blue{3(x - 2) + 2(x + 1) = 10}[/tex] Henry asks whether life and peace should be "purchased at theprice of chains." What does Paine speak of as having a price? What is the measure of ?5 cm20cm The Thirteenth Amendment to the U.S Constitucin affected the lives of millions of African Americans by - a) providing them with access to the. court sistemsb) guranteeing their freedom of speech.c) guranteeing their permanent freed from slavery.d) providing them with voting rights. What is 7 to the 2018th power Which foreign affairs challenge or issue is the most serious? How do the details in this passage support theauthor's purpose? Sugar changed the world What is The converse of pq help please fast i got to get a 90% Why do important to cite information in a research paper? A: gives credit to the information sources B: provides background information about the topicC:supports thesis statement of a paper D: highlights the main points of the paper Why did henry david thoreau build a cabin on walden pond