PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer 1

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

Answer 2

Answer : language

JavaScript is a scripting language, not a HTMLanguage type. It is mainly to do process at background and it needs document.


Related Questions

What is voice recognition system ?​

Answers

Answer: Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.

Explanation:

Answer:

Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands. ... Voice recognition systems enable consumers to interact with technology simply by speaking to it, enabling hands-free requests, reminders and other simple tasks.

In Linux, most applications and commands are in the ____ directory or its subdirectories bin and sbin.

Answers

On a Linux computer, most of the software applications are saved in the /usr directory or in its subdirectories named, bin and sbin.

A Linux can be defined as an open-source and community-developed operating system (OS) that is designed and developed for the following electronic devices:

Mainframes. Computers.Embedded systems.Mobile devices.

Generally, the Linux operating system (OS) is based on UNIX and it is typically released under the GNU general public license (GPL).

On a Linux computer, the commonly used directory for saving most software applications is the /usr directory or sometimes its subdirectories named, bin and sbin.

Read more: https://brainly.com/question/20629962

pretty sure nones gonna do this but please do it would gelp alot of my exams irs gonna bring me like 10 marks :(

Answers

I wanna help so bad but I failed cs

________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. (1pts) Question 5 - ________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing

Answers

Answer:

Hey there!

Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing

Hope this helped! :)

A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us

Answers

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.

Read related link on:

https://brainly.com/question/25522987

WILL MARK A BRAINLIEST!!! PLS HELP!!!





Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

man, just got rick rolled brb going to cry

Explanation:

Daijōbu desho. Datte Kimi yowai mon.

translate ¨friends¨ into spanish

Answers

Friends to Spanish is Amigos

Answer: I hope this is helpful

Explanation:

Friends in Spanish is Amigo- masculine aka male ,noun.
Friend in Spanish is Amiga- feminine aka Female , noun

Friends- trusted and caring person

How do i add a picture on a computer? Its a random question but i dont know how to do it. It needs to be a very detailed description.

Answers

get the picture glue it on the screen

una laptop agarra mas internet que una computadora de escritorio?

Answers

una laptop agarra mas internet que una computadora de escritorio?

Su computadora no puede afectar la velocidad de Internet de sus otros dispositivos. ... La única forma en que su computadora puede reducir la velocidad de Internet de otros dispositivos es si no obtiene suficiente velocidad de su ISP y sus dispositivos luchan por un ancho de banda limitado.

^^

A _____ agent can be used to perform specific tasks for a user, such as remembering information for filling out Web forms.

Answers

Specific tasks such as the remembrance of key information when filling out Web forms can be performed by: personal agent.

A personal agent is also referred to as user agent and it can be defined as a computing software or hardware-based system that is typically designed and developed to perform specific tasks on behalf of an end user.

This ultimately implies that, a personal agent is an intelligent computer hardware or software program that can be configured to perform specific tasks on behalf of an end user.

For example, a personal agent can be configured to remember key information when filling out Web forms.

Read more: https://brainly.com/question/21656851

what command can be used to repair a dual boot system?

Answers

Answer:

bootrec utility

Explanation:

It entirely depends on your version of windows and if you are even on windows, so I have no explanation, but for windows it is possible.

Software that enables information to be obtained from a computer without the user's knowledge is ____________

Answers

Answer:

Spyware

Explanation:

A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records.

Answers

A form is an access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records.

The ____ method constructs a text string from Unicode character codes that are passed as arguments.

Answers

Answer:

The fromCharCode() method constructs a text string from Unicode character codes that are passed as arguments.

using iot to track packages, containers, and other bulkware are examples of what type of smart iot technologies?

Answers

There are technology that are used to detect and identify objects with tracking tag. The statement is an example Smart logistics IOT technologies.

Smart logistics is commonly called Connected logistics.  It helps or allows us to have near real-time tracking of movement/delivery of goods and services.

It is often used by ECommerce companies, food delivery companies, app-based taxi service companies, online markets etc.

 

In the logistics process, Internet of things can aid an individual by tracking goods and services as it saves time.

Learn more from

https://brainly.com/question/19995128

The frame rate is the result of multiplying the length of the film times its width

True or False

Answers

Answer:

False

Explanation:

frame rate is how many frames are shown per second in a video

the length of the film times the width is the resolution. not frame rate

__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

Answers

Answer:

bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

We _____ information about space. For example, while reading a textbook, we encode the place on a page where certain material appears.

Answers

Answer:

Extremes is the answer for the blank.

Explanation:

In one to two sentences, describe how you would create a border around a group of cells.

Answers

Answer:

Select the cells you want to format. Click the down arrow beside the Borders button in the Font group on the Home tab. A drop-down menu appears, with all the border options you can apply to the cell selection.

___________________________________ allows many home users, corporations, and organizations around the world to connect far more computers to the Internet than they would otherwise be able to connect.

Answers

Answer:

network address translation

Explanation:

DIRECTIONS: Organize your desktop. Name the 5 folders based on the files given below. Organize your own desktop by sorting the given files accordingly.

Please
I need help​

Answers

Answer: Music, Documents, PowerPoints, Pictures/Videos, Audios

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

PLEASE HELP! WILL MARK AS BRAINLIEST
JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

uploaded ads give advertisers access to more inventory than responsive display ads. true or false?

Answers

Answer:

True

Explanation:

This is because of the fact that  it allows the marketing industry rise to higher rates.

Ture but you can do that for now and then when we can get it done today and then we

Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a fileserver, network
attached storage, or the cloud?
Why?
What are some possible disadvantages of your recommendation that they should be aware of?

Answers

Answer:

I would recommend the cloud because they can access their data on every single device. There are virtually no disadvantages to the cloud.

Explanation:

Hope this helps.

What will print to the console after running this code segment?


A. 15.

B. 16.

C. 18.

D. 21.

Answers

Answer:

16

Explanation:

answer =3+2

answer =5+3

return 8 × 2

16 will print to the console after running this code segment. Therefore, option B is correct.

What do you mean by code segment ?

A code segment, also known as a text segment or simply text, is a section of an object file or the program's virtual address space that contains executable instructions.

A character array segment that represents a text fragment. Even though the array is directly accessible, it should be treated as immutable. This allows for quick access to text fragments without the overhead of copying around characters.

In memory, the code segment functions normally as read-only memory and has a fixed size; thus, without the need for loading, it can generally be found in read-only memory (ROM) on embedded systems.

answer = 3+2, answer = 5+3

return 8 × 2

= 16

Thus, option B is correct.

To learn more about the code segment, follow the link;

https://brainly.com/question/20063766

#SPJ2

In the design phase of the systems development life cycle (SDLC), the _____ design indicates hardware and software, such as specifying Linux servers and Windows clients. Select one:

Answers

Answer:

logical

Explanation:

Which command should you enter at the command prompt to display the current user's quota limits and disk usage?

Answers

wmic diskdrive get size

Question about microscope ​

Answers

Answer:

1.  c. diaphragm

2.  a. ocular lens

3.  b. fine adjustment knob

4.  c. course adjustment knob

5.  d. nosepiece

6.  a. simple light microscope

7.  d. A, B, and C

8.  a. light switch

Explanation:

Hope this helps.

Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this

Answers

Firewalls are used to screen and avoid block the threat posed by unwanted data or files that could want to penetrate into a system. Hence, the kind of firewall described is packet filtering firewall.

Packet filtering firewall describes a network security protocol which examines individual data packets entering into a system.

Each data packet is screened based on established principles and protocols, with only those who meet the defined requirement allowed to reach their destination while others are dropped.

Hence, the missing phrase is packet filtering firewall.

Learn more : https://brainly.com/question/25706522

Other Questions
1) Use the number line to help you answer this question.Describe the location of |-3 | on a number line in reference to zero. Type your response to this prompt in the space provided below. PLEASE HELP!Using the information below draw a diagram, making sure to label the sides and angles, to help answer the following 2 questions. Dont forget to label your answer. ABC DEF AC = 15 in., AB = 24 in., mA = 34, mC = 124What are the values of DE and mE?DE = ______ mE = ________ A nutrition company is marketing a low-calorie snack brownie. A serving size of the snack is 3 brownies and has a total of 50 calories. Determine how many calories 14 brownies would have. Round to the nearest calorie Charlie borrows $900 add to his $100 so that he can purchase $1000 worth of stock. In 6 months, he sells his stock for $2500. How much money did he make on his investment? outlook 365 can be described as a personal information manager true or false The use of computer systems to distribute potentially harmful information is called:A) Propaganda B) Cyber security C) Computer fraudD) Industrial espionage Help help help help Which of the following is 3.761 written in expanded notation?A) (3 x 1) + (7 x 110) + (6 x 1100) + (1 x 11000)B) (3 x 1) + (7 x 110) + (6 x 110) + (1 x 1100)C) (3 x 1) + (7 x 110) + (1 x 1100) + (6 x 11000)D) (3 x 1) + (7 x 110) + (6 x 110) + (1 x 1100)WORTH 40 POINTS Find the equation of the line. Someone please help me Sal's Sandwich Shop sells wraps and sandwiches as part of its lunch specials. The profit on every sandwich is $2, and the profit on every wrap is $3. Sal made a profit of $1,470 from lunch specials last month. The equation 2x + 3y = 1,470 represents Sal's profits last month, where x is the number of sandwich lunch specials sold and y is the number of wrap lunch specials sold.Change the equation to slope-intercept form. Identify the slope and y-intercept of the equation. Be sure to show all your work.Describe how you would graph this line using the slope-intercept method. Be sure to write using complete sentences.Write the equation in function notation. Explain what the graph of the function represents. Be sure to use complete sentences.Graph the function. On the graph, make sure to label the intercepts. You may graph your equation by hand on a piece of paper and scan your work or you may use graphing technology.Suppose Sal's total profit on lunch specials for the next month is $1,593. The profit amounts are the same: $2 for each sandwich and $3 for each wrap. In a paragraph of at least three complete sentences, explain how the graphs of the functions for the two months are similar and how they are different.pls help me out quick, PLS HELP ME!! What are the names of the three generations of Greek gods?a. Gorgons, Demogorgons, & Dungeon Mastersb. Dwarves, & Elvesc. Immortals, Mortals, & Demonsd. Primordials, Titans, & Olympians Calculate the pH when the following quantities of 0.100 M NaOH solution have been added to 50.0 mL of 0.100 M HCl solution Select all the equations that can represent the question: "How many groups of 45 are in 1?"?1=45?45=1451=?145=?145=? Federal loans are from i need geometry help... Explain why a tiny 1.5 V cell can operate a calculator for a year, while a much larger 1.5 V cell burns out in a few hours in a tiny robot. I WILL CHOOSE BRAINIEST!! PLEASE HELP In Vietnam War,----- vs the French army?help There are no transition elements between the Group 2 element magnesium and theGroup 3 element aluminium.Give a reason why, in terms of electronic structure. cuales son la caracteristicas de la obra dramaica