Marle uses a browser to visit a blog. How is the blog uniquely identified?
The blog uniquely identified by the

Answers

Answer 1

Answer:

URL

Explanation:


Related Questions

write the icon of full justification​

Answers

Answer:

In the paragraph group, click the Dialog box Launcher. ,and select the Alignment drop - down menu to set your justified text. You can also use the keyboard shortcut , Ctrl + J to justify your text

What does the subnet mask 255. 255. 255. 0 tell a router?

Answers

The subnet mask 255. 255. 255. 0 tell a router the part of an IP address that has or that is the subnet ID and the part that is host ID.

What does subnet mask tell a router?

The aim of the part of the mask that reads 255 is one that  tell a router the part of an IP address that is said to  be the subnet ID.

Note that A subnet mask helps to know which aspect of the IP address are known as the network and host identifiers.

Therefore, The subnet mask 255. 255. 255. 0 tell a router the part of an IP address that has or that is the subnet ID and the part that is host ID.

Learn more about subnet mask from

https://brainly.com/question/12858865

#SPJ12

Create a chart on basic commands used in HTML.
It should include basic body structure of HTML also.And make it beautiful

Answers

basic HTML commands

1 the head tag

2 titles

3 the body tag

4 headers

5 paragraph

6 performance text

7 bold face and italics

the HTML tag Al truth not currently required by the all clients the HTML tag signals the point where tax should started being interprinted as HTML code

Identify a true statement of array.find(callback [, thisArg]) method. It tests whether the condition returned by the callback function holds for all items in array. It returns the value of the first element in the array that passes a test in the callback function. It tests whether the condition returned by the callback function holds for at least one item in array. It returns the index of the first element in the array that passes a test in the callback function.

Answers

The true statement of the array is that C. It tests whether the condition returned by the callback function holds for at least one item in array.

What is an array?

It should be noted that an array means a data structure that can store a fixed size collection of elements.

In this case, the true statement of the array is that it tests whether the condition returned by the callback function holds for at least one item in array.

Learn more about array on:

brainly.com/question/26104158

#SPJ12

What is open source software​

Answers

Answer:

Open Source Software

Explanation:

Open-source software is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. Open-source software may be developed in a collaborative public manner.

Answer:

open so software is an computer software that is reliance in which copyright holding reference uses the rights use study change and disturb this software and it so scold to anyone for any propose also open source software maybe diplobed in collaborative public manner

Explanation:

helpful

Write a class with name shares shares( ) constructor to initialize the object shares(String , int , int ) constructor to initialize the object void buy( ) for buying the shares void sell( ) for selling the shares calc( ) to calculate the total value of shares show( ) to show the details. Note : buy( ) and sell( ) functions will increase or decrease the number of shares, and accordingly the Total value of shares will change. Create another class and write main( ) function and use the above functions....use : string nm(name of buyer)
int no(no. of shares)
int unitprc(price of 1 share)
int totalval (total value of all shares)

Answers

Explanation:

What is constructor?

Constructor is a member function of class, whose name is same as the class.

A constructor is a special type of member function of a class which initializes objects of a class. In C++, Constructor is automatically called when object(instance of class) is created.

Constructor is invoked at the time of object creation. It constructs the values i.e. provides data for the object that is why it is known as constructors.

Constructor does not have a return value, hence they do not have a return type.

Human centered technology often recommends
to computer designers and manufacturers, telling them how to make systems and the devices that support them more user-friendly.

Answers

Human centered technology often recommends  best practices to computer designers and manufacturers.

What is Human centered technology?

Human-Computer Interaction is known to be a kind of a study that is said to be based  a lot on the design of computer technology and its relationship between humans and computers.

Note that, Human centered technology often recommends  best practices to computer designers and manufacturers.

Learn more about technology from

https://brainly.com/question/12081854

#SPJ1

Answer:

best practice

Explanation:

Which two devices are examples of endpoints susceptible to malware-related attacks? (choose two. )

Answers

A server and desktop are examples of endpoints susceptible to malware-related attacks.

Malware

A malware (short for “malicious software”) is a term used to describe any piece of file or code that is deliberately transmitted by an attacker or attackers with the aim of infecting, controlling or stealing data over a computer network.

It is recognized by IT professionals that computer servers and desktop devices are susceptible targets of malware attacks, hence, it is often encouraged certain measures are in place to prevent an attack or reduce the damage one may cause.

You can learn more about malware-related attacks here https://brainly.com/question/22185332

#SPJ12

A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name of the person who prepared the workbook, and the date it was created. _________________________

Answers

A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name of the person who prepared the workbook, and the date it was created: True.

What is a worksheet?

A worksheet is also known as a spreadsheet and it can be defined as a type of document which comprises cells that are arranged in a tabulated format (rows and columns).

In Computer technology, some of the common business practice include the following:

Creating a worksheet named Documentation with a description of the workbook.The name of the person who prepared the workbook.The date it was created.

Read more on worksheet here: https://brainly.com/question/4965119

#SPJ1

what is one of the key components of a typical formula?

Answers

A formula key components are:

FunctionsReferencesOperatorsConstants.

What is a formula?

This is known to be a kind of mathematical relationship or rule that is said to be expressed in form of symbols.

Note that function is the association between a set of inputs that is said to have one output and all function do contain a domain and range.

Therefore, A formula key components are:

FunctionsReferencesOperatorsConstants.

Learn more about formula from

https://brainly.com/question/2005046

#SPJ11

The _____ characteristic of an intelligent agent demonstrates its ability to learn from previous knowledge and go beyond information given previously

Answers

Answer:

Adaptability

Explanation:

The agent is adaptable, versatile, and capable of establishing its own goals based on its implicit purpose. The range of quality measures for each of the aforementioned qualities, suited to the agent type, will then define software agent quality, and the value of a multi-agent system will be a function of the quality of each of the agents participating in the system.

This characteristic is characterized by the agent's capacity to alter its state in order to adapt to the environment, the ability to evolve and adapt its functionality to the surroundings at runtime, and the ability to appropriately interact with exceptions produced by the environment in order to rate the agent's ability to adjust and survive.

The Adaptability characteristic of an intelligent agent shows its ability to learn from former knowledge and go beyond information given before.

What is Adaptability characteristics?

Adaptable attribute is when people have a kind of elastic-like energy and they are said to be willing to bend and break any given habits, to push themselves when circumstances is altered.

Therefore, The Adaptability characteristic of an intelligent agent shows its ability to learn from former knowledge and go beyond information given before.

Learn more about Adaptability characteristic from

https://brainly.com/question/25594630

#SPJ12

Write a program using integers usernum and x as input, and output usernum divided by x three times.

Answers

Answer:

Hopefully This Will Help

Explanation:

If the input is:

2000

2

Then the output is:

1000 500 250

Which 3 file formats can be used for importing lists directly into quickbooks online?.

Answers

Answer:

Explanation:

QBO

IIF

QBJ

The name of 3 file formats that can be used for importing lists directly into QuickBooks online are,

1. Excel (XLS, XLSX)

2. CSV (Comma-Separated Values)

3. IIF (Intuit Interchange Format)

Given that,

To find names of 3 file formats that can be used for importing lists directly into QuickBooks online.

Now, Here are three commonly used file formats:

1. Excel: QuickBooks Online allows you to import lists such as customers, vendors, and products using Excel spreadsheets.

2. CSV (Comma-Separated Values): CSV files are widely used for data import/export. QuickBooks Online supports importing lists in CSV format.

3. IIF (Intuit Interchange Format): While not as commonly used as Excel or CSV, QuickBooks Online also supports importing lists using the IIF file format.

IIF files are specific to QuickBooks and provide a way to import various types of data, including lists.

To learn more about QuickBooks visit:

https://brainly.com/question/24441347

#SPJ4

A user wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page. What setting should the user enable on the printer for this print job to achieve this result

Answers

A user who wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page should check the portrait orientation check box.

What is a Spreadsheet?

A spreadsheet is basically a term used to describe any computer application that is used to compute, organize, analyse and store data in tabular form.

Spreadsheets applications play a crucial role today as they help to make the work of educators more efficient. The next time you come across data presented in a tabular form, do remember it was likely made possible by a spreadsheet application.

You can learn about spreadsheets here https://brainly.com/question/26919847

#SPJ1

Write an if-else statement to describe an integer. Print positive even number if iseven and ispositive are both true. Print positive number if iseven is false and ispositive is true. Print not a positive number otherwise. End with newline.

Answers

The positive number if is even is false and the positive is true. Print, not a positive number otherwise. End with a newline. C code is the answer.

How, support your answer?

#include <stdio.h>

#include <stdbool.h>

int main(void) {

int userNum;

bool is Positive;

bool is Even;

scanf("%d", &userNum);

isPositive = (userNum > 0);

isEven = ((userNum % 2) == 0);

if(isPositive && isEven){  printf("Positive even number");}

else if(isPositive && !isEven){

 printf("Positive number");}

else{ printf("Not a positive number");

}printf("\n");

return 0;

Thus, this could be the answer.

To learn more about integer. click here:

https://brainly.com/question/2114800

#SPJ1

When you use transact-sql, you can store procedural code in:

Answers

When you use transact-sql, you can store procedural code in stored procedure, scriptsz or user defined functions.

What is a procedural code?

It should be noted that a procedural code is ten code that directly instruct a device on how to finish a task.

In this case, when you use transact-sql, you can store procedural code in stored procedure, scripts, or user defined functions.

Learn more about procedural code on:

brainly.com/question/18265814

#SPJ12

Where would you add a new tag on an invoice that was already created?

Answers

To add a new tag on an invoice that was already created, find the tag group, select the run report and select edit group.

What is an invoice?

It should be noted that an invoice is a stamped document that itemizes and records a transaction.

In this case, to add a new tag on an invoice that was already created, find the tag group, select the run report and select edit group.

Learn more about invoice on:

brainly.com/question/4056820

#SPJ12

What do you understand by ' selecting' text​

Answers

Answer:

highlight the whole sentence

Explanation:

that is what it means

Selecting is highlighting text or picking an object.

What are 2 ways to send a message to your client when signed in as an accountant user?.

Answers

Answer:

The use of Ask client and request are 2 ways to send a message to your client when signed in as an accountant user.

what type of storage drive contains multiple spinning platters?

Answers

The type of storage drive that contains multiple spinning platters is called; Hard disk drives

What is the hard disk drive?

A computer hard disk drive (HDD) is a non-volatile data storage device. Non-volatile refers to storage devices that maintain stored data when turned off.

Now, the correct answer to the question is hard disk drives. This is because a hard disk drive is comprised of a stack of spinning metal disks known as platters. Each spinning disk has trillions of tiny fragments that could possibly be magnetized in order to represent bits (1s and 0s in binary code).

Read more about Hard disk drives at; https://brainly.com/question/24498473

#SPJ12

Cloud architecture has unlimited __________. Select one: a. Sustainability b. Vulnerability c. Reliability d. None of the other options are correct e. Accessibility

Answers

Note that in the case above, Cloud architecture has unlimited Accessibility.

Does cloud computing have unlimited storage?

The cloud storage is one that often depends on the cloud service provider and it is one that often give unlimited cloud storage and Accessibility for all.

Therfore, Note that in the case above, Cloud architecture has unlimited Accessibility as everyone can access it whenever they want.

Learn more about Cloud architecture from

https://brainly.com/question/11934271

#SPJ12

Starting in 2024 under a new law, all new smartphones sold in the eu must have….

Answers

Answer:

USB type C cables.

Explanation:

the internet is controlled by ______

Answers

In the case above, No one control the Internet.

What is the internet control about?

Note that no one and everyone has no control over the use of the Internet as it is said to be a network of networks.

Note that there are separate networks that is said to belongs to different firms and organizations as they have their own laws and regulations.

Therefore, In the case above, No one control the Internet.

Learn more about Internet from

https://brainly.com/question/2780939

#SPJ11

What tool can you use to identify a secure location.

Answers

The tools used to identify secure location are Sucuri SiteCheck, Mozilla Observatory, Detectify, SSLTrust and WPScan.

What is website security check tools?

The Website Security Check tool is used to scan and check safety of the websites and to look after the websites related problems faced by the users.

It also helps the users in whether the website is safe to visit or not and to share the information with.  

Sucuri SiteCheck, Mozilla Observatory, Detectify, SSLTrust, and WPScan are some of the tools used to determine secure locations.

Learn more about  website security here:

https://brainly.com/question/12588992

#SPJ1

what are the tags in html. Write its syntax.

Answers

Answer:

HTML is using tags for its syntax. A tag is composed with special characters: <, > and /. They are interpreted by softwares to compose an HTML element.

Explanation:

There are generally two types of tag they are;

1. empty tahg

2. container tag

Select examples of software
Mouse
Computer programs
Applications
Monitor
Photo editing program

Answers

Answer: Computer programs, applications, photo editing program

Explanation:

Computer software is stuff you have downloaded on your computer. Mice and monitors are both physical objects, and therefore is not software. On the other hand, computer programs, applications, and a photo editing program are all on your computer and stuff you would have to download in order to have.

Medium to large businesses, or those with large data-storage needs, are more likely to use microsoft sql server or oracle as their dbms.

Answers

Answer:

True

Explanation:

SQL is a common language for data storage and maintenance that is utilized by mobile applications and organizations. It is used by almost every medium and large businesses to capture employee data and confidential business data. SQL is used by their database administrator to change and add information to their online database. It serves as the back-end data storage for apps, allowing authorized users to access information quickly and securely. Microsoft has created many versions of SQL Server, allowing you to select the one that best meets your workload and requirements. Companies that utilize SQL Server may encounter a variety of issues. Businesses choose Oracle for data storage and databases because it is exceptionally efficient for relational data and never crashes. Oracle databases are industrial computers' database equivalents. Businesses invest in Oracle because it offers the necessary relational data at fast speed and absolute dependability. Oracle database technologies provide consumers with cost-effective and high-performance version of Oracle Database, the world's most popular convergent, multi-model database management system, as well as in-memory, NoSQL, and MySQL databases.

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.

Answers

Answer:

(config)# service password-encryption

Explanation:

A system administrator could use service password-encryption command to prohibit any specified credentials from showing in text format in configuration files. This command secures all passwords in the config file that have been specified.

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command.

An administrator can use the service password-encryption command to stop all configured passwords from being displayed in configuration files as plain text. All configured passwords in the configuration file are encrypted by this command.

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

Hence, to prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command.

Learn more about the configuration file here:

https://brainly.com/question/32311956.

#SPJ6

An organization with a(n) _____ structure, sometimes called a "franchiser," uses highly centralized information systems

Answers

An organization with a global structure, sometimes called a "franchiser," uses highly centralized information systems to perform its tasks.

What is an information system?

An information system refers to a set of computer systems that is primarily used by an organization to obtain, store, and process data, including the dissemination of information, knowledge, and the distribution of digital products from one geographical location to another.

Basically, an organization with a global structure, which is sometimes referred to as a "franchiser," make use of highly centralized information systems to perform its tasks.

Read more on information here: brainly.com/question/25885448

#SPJ12

What might you expect to find out about people who are described as credit risks?

Answers

What might you expect to find out about people who are described as credit risks? They have a history of not making their payments on time. Which is a long-term consequence of making late payments on your bills? It will be harder to secure a new loan at a low rate.
Other Questions
You pushes a 25kg box with 40 N of force, but the friction on the crate is 15 N. What is the netforce? A copper block rests 30.0 cm from the center of a steel turntable. The coefficient of static friction between the block and the surface is 0.53. The turntable starts from rest and rotates with a constant angular acceleration of 0.50 rad/s2. After what time interval will the block start to slip on the turntable?pls explain the question briefly Find the x-intercept of the rational function.A (-5,0)B (0,-5)C (0, -1)D (-1, 0) If we can preach that it has 2 pairs of parallel sides, one pair of consecutive sides perpendicular and perpendicular diagonals.(check image) PLEASE HELP ME I'LL MARK U AS BRAINLIEST IF U GIVE ME THE RIGHT ANSWERS + GOT QUESTION A RIGHT JUST NEED QUESTION B AND C'S ANSWER Read the passage from "The Seven Voyages of Sindbad the Sailor.In the times of the Caliph Haroun-al-Raschid there lived in Bagdad a poor porter named Sindbad, who on a very hot day was sent to carry a heavy load from one end of the city to the other. Before he had accomplished half the distance he was so tired that, finding himself in a quiet street where the pavement was sprinkled with rose water, and a cool breeze was blowing, he set his burden upon the ground, and sat down to rest in the shade of a grand house. Very soon he decided that he could not have chosen a pleasanter place; a delicious perfume of aloes wood and pastilles came from the open windows and mingled with the scent of the rose water which steamed up from the hot pavement. Within the palace he heard some music, as of many instruments cunningly played, and the melodious warble of nightingales and other birds, and by this, and the appetizing smell of many dainty dishes of which he presently became aware, he judged that feasting and merry making were going on. He wondered who lived in this magnificent house which he had never seen before, the street in which it stood being one which he seldom had occasion to pass.What is Sindbad most motivated by in this passage?fatigue and curiositydiscomfort and peacework and pleasurehunger and greed Explain the competitive structure of the community What is the measure of angle CED?There are two triangles labeled ABC and DCE with a common vertex C. In triangle ABC, angle BAC is labeled as y, and angle ABC is labeled as 65 degrees. In triangle DCE, angle CDE is labeled as 65 degrees y over 2, because Triangle ABC is congruent to triangle DCE y, because Triangle ABC is similar to triangle EDC y + 65 degrees, because Triangle ABC is similar to triangle DCE 115 degrees y, because Triangle ABC is congruent to triangle DCE HELPPPP PLEASEE DUEE SOONNN Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.Polygon MNOPQ is dilated by a scale factor of 0.8 with the origin as the center of dilation, resulting in the image MNOPQ. The coordinates of point M are (2, 4), and the coordinates of point N are (3, 5).The slope of is Sample I is the cute little golden cube embedded in this metamorphic rock called a greenschist. This perfect little cube crystallized in this rock during the metamorphic process. If you were not a trained geologist, this mineral might fool you into thinking that it is gold because it is often called "fool's gold." What mineral is it? Question 14 of 20You have two rocks made of the same material that are at the sametemperature. The first rock has three times the mass of the second rock. Howdoes the thermal energy of the two rocks compare?A. The first rock has six times the thermal energy of the second rock.B. The second rock has three times the thermal energy of the firstrock.C. The second rock has one-third as much thermal energy as the firstrock.D. The rocks have the same amount of thermal energy. What is the volume of the sphere shown below?O A. units3676387883C. 52 units 3OD. 104 units3B. units-13- what is the degree for the polynomial below ? 2x^(2)+3x + 1 describe the trends in the atomic size, location energy and electrongavity from left to right across a period in periodic table Help with math work Tammie was communicating to her employees the proper way to handle abuse in the workplace. one individual kept interjecting comments while tammie was speaking. this behavior is known as ______ and can be a serious barrier to effective communication. write detail note on malaria 2 study What can you do to contribute to the lives of people with disabling conditions? Make a list. 2x + y 2 a. change the inequality into slope-intercept form, and then change it into an equation.b. create a table. Use the x-values indicated c. Graph the points and draw a line.d. Shade the solution area.e. Check your solution. Use (0,0) as your test point and see if it satisfies the conditions of the original inequality.