Which is the default scripting language in most browsers? A. ASP B. JavaScript C. PHP D. XML

Answers

Answer 1

Answer:

B. JavaScript

Explanation:

It is very useful to easily create a good website with it.


Related Questions

what is 8 4/7 divided by 15

Answers

84/7 divided by 15 is 0.8

Answer: 4/7

Explanation:

8 4/7 ÷ 15

60/7× 1/15

=4/7

ok so...you first are going to convert the mix fraction 8 4/7 to improper fraction by multiplying the denominator and the whole number which is 56 then add the numerator 56 +4= 60 and put back the denominator which is going to be 60/7.

Then flip the fraction or the whole number 15 which is also 15/1 that is on the right which is going to be 1/15 and change the division sign to multiplication which is going to be 60/7 × 1/15.

then you can cancel, 15 go into 60, 4 times, so you are going to multiply 4 times 1 and 7 times one, which gives you 4/7.

I hope this help you to understand

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

GIVING BRAINLIEST Jenna creates advertisements for companies to air on television. Which file format will best preserve the graphics? DOCX PDF MP3 MPEG

Answers

Answer:

MpEg

Explanation:

Answer:

PDf

Explanation:

brainliest please

(Correct Answer Recieves Brainliest)
The excerpt is a sample works-cited list.

A typed list of citations titled Works cited, with W and C capitalized. There are 3 citations. The turnovers for the second and third citations set flush left. There is extra space between citations. The first words in each citation, from top to bottom, are Keegan, Keller, South. The third citation does not have an access date.

Based on MLA standards, how could this list be improved?

alphabetize according to title
change it to a bibliography
order it according to in-text citations
use hanging indents in the second line

Answers

Answer:

D

Explanation:

you would want to using a hanging in front because they are already in alphabetical order to the author

What will be the result of the following lines of CSS?

body{

background-color:yellow;

}

A.
The background of the header will be yellow.

B.
The text will be highlighted yellow.

C.
The background of the body of the webpage will be yellow.

D.
The photo will change to a yellow box if the user clicks on the photo.

Answers

Answer:

C.

Explanation:

The correct option that explains the result of the given lines of CSS is:

C. The background of the body of the webpage will be yellow.

The CSS code provided sets the background color of the body element to yellow. The "body" selector targets the entire body of the webpage, and the "background-color" property sets the background color to yellow. This means that the background of the entire webpage will be displayed in yellow.

Answer:

C. The background of the body of the webpage will be yellow.

Why isn't my brainly post being answered?

Answers

Try deleting then reposting, it may not always pop up in new questions, I will have a look at the question anyway.

Sometimes they don’t pop up on the feed try reposting again or possibly updating the app if you can. Or it may be an issue within the question itself like if it is worded correctly.
Hope this helps!

Experts believe robots and AI will continue taking over many of the human jobs we know today. What changes should be made to K-12 education to ensure students are prepared for the future? What courses or skills should be added? WHat should be removed? Why?

Answers

Answer:

I think they should show one subject per month so students are more prepared

Answer: some changes that should be made are  dresscode , some courses should be more sports . Nothing should be removed because the kids in the future need to learn more .

Explanation:

(I made this up teehee) what anime is katski bakugo from

Answers

Scooby do because that is the best shower ever
MHA (My Hero Academia) or Boku no hero academia

Which of the following options shows the correct code to increase a player’s lives by an amount equal to a variable called hits?

A.
lives == lives + hits

B.
hits == lives + hits

C.
lives = lives + hits

D.
lives + hits = lives

Answers

The answer is C.

The line lives = lives + hits increments a player's lives by an amount equat to hits.

the answer to the problem is C

Typing on a Keyboard is an example of ______

a) Input
b) Output
c) Processing
d) Storage

Answers

Answer:

Input

Explanation:

Typing on a keyboard is an example of input.

Example if I have 13 answers one day in brainly.com and the next day
I get 15 will I have 28 answers??

Answers

Answer:

Yes you should

Explanation:

13+15=28

Ya that person correct hope this help u get it Done and feel comfortable summiting

THE FIRST PERSON THAT ANSWER THIS QUESTION GETS 18 POINTS AND BRAINLY!!!!!

You are creating an online form for a streaming music service. Users will need to enter at what point they want their contract to end. Which data type should you use?

Boolean

char

date

string

Answers

Answer:

data

Explanation:

Open the NetBeans IDE and create a new project named MySizes.java. Your program should do the following:
Declare and initialize an int variable for the comparison expression (waist measurement).
Assign a value to the variable to be used as the customer’s response for the program.
Create a switch-case statement that includes three cases and a default statement. Use appropriate conditional operators ( =, >) to define the three case comparisons.
Create output lines for each case, stating the appropriate pant size.
Create a default statement if the customer waist measurement does not match any case.
Then, Create nested if statements that accomplishes the same results.
( I really need this for a project, it doesn't need to be correct it just needs to look like it is, this is in Java )

Answers

Explanation:

Open the NetBeans IDE and create a new project named MySizes.java. Your program should do the following:

Declare and initialize an int variable for the comparison expression (waist measurement).

Assign a value to the variable to be used as the customer’s response for the program.

Create a switch-case statement that includes three cases and a default statement. Use appropriate conditional operators ( =, >) to define the three case comparisons.

Create output lines for each case, stating the appropriate pant size.

Create a default statement if the customer waist measurement does not match any case.

Then, Create nested if statements that accomplishes the same results.

( I really need this for a project, it doesn't need to be correct it just needs to look like it is, this is in Java )

1. A virtual network of websites connected by hyperlinks is called

A. a browser

B. a URL

C. the internet

D. the World Wide Web


2. The Domain Name System translates the URL into

A. a client

B. an IP address

C. a website

D. a web browser

Answers

the answer of the first McQ is a and second one is b

Answer:

1 Option D is correct:  World wide web

2 Option B is correct:  Ip addresses

I have a 50$ GameStop gift card, What should I buy????

Answers

If you have a P s 4 or a P s 5 you should buy V bucks for F o r t n i t e

Or Rec Room Bucks

Or if you have a Nintendo then buy those small chip games like animal crossing

You should consider a headset or storage like a terabyte.

What are the pros and cons of doing research for homework projects online over using offline resources like libraries?

Answers

Here is my answer






Pros: like you’re phone it could be portable and easy to use unlike a library you can’t take a while library with you like in your pocket



Con: the stuff you could be trying to find out could be wrong or there is millions of answers that are not all the same
Distractions are everywhere online although it’s quick and easy, but offline sources encourage reading and a variety of answers

How do solar ovens track the sun as it moves during the day?

Answers

Answer:

A sort of solar thermal collector is a solar cooker. It "collects" and retains the thermal (heat) energy of the Sun. When high frequency light (visible and ultraviolet) is transformed into low frequency infrared radiation, heat is created.

Explanation:

When the sun is overhead, light rays pass through less atmosphere, so less UV radiation is screened out. A solar cooker works like a one-way lobster trap. It lets UV light rays in and then converts them to longer infrared light rays that can't escape.

Which is one of the modes of game advertising?
A.
media
B.
hoardings
C.
transport
D.
schools

Answers

Answer:

I'm pretty sure its A

Explanation:

The Media it the biggest platform rn

Answer:

A more people will be able to see

List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)

Answers

Answer:

There are several different industries that are involved in the production and use of computers. These industries include:

Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.

Answer:

Hardware Manufacturers

Software Developers

System Integrators

Service Providers

Data Providers

ISP

Cloud Computing Providers

Consulting Firms

Explanation:

It is in order..

You can find this out on Brainly! Recycling one glass jar saves enough energy to watch television for _ hours It's one of the fun facts!

Answers

Recycling one glass jar saves enough energy to watch television for 3 hours.

3! Is the answer ………..

blank are defined by how a company interacts with customers and employees

Answers

Maybe customer service?
Yeah I think it might be costumer service

1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?

Answers

Answer:

The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.

Explanation:

There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.

The establishment of the ‘ARPANET’ (an early version of the internet) used in the USA in 1969 as a means of communication between various research institutions.

The impact it has had:
Developed into the globally used Internet which is now integrated into modern society and is seen as an essential for good quality of life.

explain the history of computing of mechanical era

Answers

Answer:The Mechanical Era

Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.

Explanation:Hope this helped

what software is my teacher using to do this and how can i stop her from doing this

what software is my teacher using to do this and how can i stop her from doing this

Answers

Answer:

I’m not sure if you can only teachers can acess that

Explanation:

Is there a help tab on the website? Maybe you could try to get into an adult account on the website. Depends on what the website is.

How do you get brainlist answers?

Answers

Answer:

you have to answer a question where there's already an answer or you answer a question and wait for someone else to answer it. when there are 2 answers, the person who asked the question will choose someone's answer to be brainliest. ( the brainliest answer is usually the better answer out of the 2 basically)

Explanation:

Answer:

1)Give a helpful answer:Avoid guessing or choosing an answer you are unsure of. Remember, you’ll only get the extra points if you give the correct answer.

2)Always explain:It’s important to know WHY. Great explanations are what makes Brainly awesome.

3)Start from the basics

Explain everything. Imagine that the person who was asking, knows nothing at all so you need to start from the very beginning.

4)Include steps

Always include the steps and/or background required to get to the final answer. Let’s help other people understand and solve future problems on their own

Explanation:

"+", "-", "x" are Arithmetical operators. "AND, "OR", "NOT" are which operators.​

Answers

Answer:

+, -, *, % are Arithmetical  operators because they do math operations

&(AND), | (OR), ! (NOT) are Logic Operators and they do logic gates operations on the bits.

Yeah what the other person said is correct

ok 2 things please 1. i need one more question to add if u can come up with anything or what not and 2. please answer the following questions in the picture i need as many answer a s posable por favor nod nod thank youu

ok 2 things please 1. i need one more question to add if u can come up with anything or what not and

Answers

Answer:

5 siblings, 1 trip per month, 14 age, 12 hours of sleep,  2 hours games, 5 pairs of shoes owned

Explanation: i don't know if this is what u meant, but i hope this helps....

Siblings: 5 trips too the movies:0 age: 17 weight:217 time playing games:none how many pairs of shoes: 6

Is a poster the best media form to make a call to action to the government and major corporations? What other media forms could be effective?

Answers

Answer:

A Poster can be an effective media form to make a call to action to the government and major corporations, as it allows for visually impactful messaging. However, other media forms could also be effective, such as:

Social media campaigns: Utilize platforms like Twitt..er, Fa..cebook, or Ins..tagram for awareness and mobilization.

Online petitions: Collect signatures and demonstrate public support.

Video campaigns: Engage viewers emotionally through compelling videos.

Mass media advertising: Utilize TV, radio, or print media for broader reach.

Advocacy websites: Provide information, resources, and a platform for action.

Public demonstrations and rallies: Gather supporters for visible advocacy.

Answer:

Explanation:

Online petitions: Collect signatures and demonstrate public support.Video campaigns: Engage viewers emotionally through compelling videos.Mass media advertising: Utilize TV, radio, or print media for broader reach.Advocacy websites: Provide information, resources, and a platform for action.Public demonstrations and rallies: Gather supporters for visible advocacy.

In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.

Answers

When consumers prioritize speed over security, several technological problems can arise, leading to potential risks and vulnerabilities. While speed is undoubtedly important for a seamless and efficient user experience, neglecting security measures can have severe consequences. Here are some of the technological problems that can occur when consumers emphasize speed over security:

1. Vulnerabilities and Breaches: Emphasizing speed often means sacrificing robust security measures. This can lead to vulnerabilities in software, applications, or systems that attackers can exploit. Without adequate security measures, data breaches become more likely, exposing sensitive information such as personal data, financial records, or trade secrets. The aftermath of a breach can be detrimental, including reputational damage, legal consequences, and financial losses.

2. Malware and Phishing Attacks: When speed takes precedence, consumers may overlook potential malware or phishing attacks. By rushing through security checks or bypassing cautionary measures, they inadvertently expose themselves to malicious software or fraudulent schemes. These attacks can compromise personal information, hijack devices, or gain unauthorized access to networks, resulting in financial losses and privacy violations.

3. Inadequate Authentication and Authorization: Speed-centric approaches might lead to weak or simplified authentication and authorization mechanisms. For instance, consumers may choose easy-to-guess passwords or reuse them across multiple platforms, making it easier for attackers to gain unauthorized access. Additionally, authorization processes may be rushed, granting excessive privileges or overlooking necessary access controls, creating opportunities for unauthorized users to exploit system vulnerabilities.

4. Neglected Updates and Patches: Prioritizing speed often means neglecting regular updates and patches for software and systems. By delaying or avoiding updates, consumers miss out on critical security fixes and vulnerability patches. Hackers actively exploit known vulnerabilities, and without timely updates, devices and systems remain exposed to these threats, making them easy targets.

5. Lack of Secure Development Practices: When speed becomes the primary concern, secure development practices might take a backseat. Security testing, code reviews, and quality assurance measures may be rushed or ignored, leading to the inclusion of vulnerabilities in the software or application itself. These vulnerabilities can be exploited by attackers to gain unauthorized access or execute malicious activities.

To mitigate these problems, it is essential to strike a balance between speed and security. Consumers should prioritize security measures such as using strong passwords, enabling multi-factor authentication, regularly updating software, and being cautious of suspicious links or emails. Service providers and developers must also prioritize security in their products and services by implementing secure coding practices, conducting thorough security assessments, and promptly addressing vulnerabilities. Ultimately, a comprehensive approach that values both speed and security is crucial for maintaining a safe and efficient technological ecosystem.

Explanation:

--> used brainly simplify :D

Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.

Brainliest for correct answer

Which of the following statements describes circuit boards?
They have billions of tiny switches.
They operate according to the decimal system.
They have been replaced in modern computers by hard drives.
They make the keyboard function properly.

Answers

Answer: A

Explanation: Been asked before.

A
Explain: I did this in a test
Other Questions
5) Sam sold half of his comic books and then bought six more. He now hasfourteen. How many did he begin with ? Compute 7,953,000 / 1000. Nora says that "...dogs don't bite nice little dolly children"--what does this indicate about her role with her children? Cell w has half as much dna as cells x, y, & z. Which phase of the cell cycle is cell w in?. Sarah visited a tree nursery. She measured and recorded the heights of some young trees. This line plot shows her results.How much taller is one of the tallest trees than one of the shortest trees?Enter your answer as a mixed number in simplest form by filling in the boxes. Pleaseee answer correctly !!!!!!!!!!!!! Will mark Brianliest !!!!!!!!!!!!!!!!!!!! Which of these is correct way of calling a constructor having no parameters, of superclass A by subclass B? Select one: a. super. AO; O b. superclass.(); O c. super(void); d. super(); Carbonated beverages contain dissolved carbon dioxide gas. Which temperatures are best for the liquid while it is being produced in the factory?A. High temperatures are best to minimize the solubility.B. High temperatures are best to maximize the solubility.C. Low temperatures are best to minimize the solubility.D. Low temperatures are best to maximize the solubility. Please answer and thankyou! suppose 1000 people enter a chess tournament. the champion is determined in such a way that a player is eliminated after one loss and games are played until only one entrant has not lost.how many games must be played to determine a champion? Which description is the best example of physical capital?A. A doctor with expertise in medicineB. A miner with experience digging for coalC. A machine that tests new car enginesD. A new law regulating trade in a country 7. The company utilizes a storage facility on the other side of town. The landlord, as part of an inducement to the company, has agreed to delay the December cash payment for use until January 15th of next year. The company signed a monthly rental agreement of $2,000 per month on December 1st Find the surface area of the solid formed by the net. Round your answer to the nearest hundredth. In 150 words or less, describe the effects of globalization on the transportation industry. what is nationalism 14. A square has a diagonal of length 12 m. What is the side length of the square? Express in simplest radical form What will be the value of coefficient of volume thermal expanion for a olid for which coefficient of linear thermal expanion ha value of 4 10-5K-1? Two oxides of sulphur A and B analysed and the result obtained shows that in oxide A 3.50g of sulphur combined with 6.05g of oxygen and in oxide B 2.80g of sulphur combined with 2.80g of oxygen show that this results illustrate the law of multiple proportion. Write their formulae What is stress? Explain thedifference between positive stress andnegative streaks You buy 10 pounds of bird seed at Store A for $11.50. Your friend buys 15 pounds of bird seed at Store B for $19.50. How much less would you spend buying 20 pounds of bird seed at the store with the better deal?HELPPP PLEASE What does George mean when he says " I haven't any country?!?!?!??!