________ is embedded inside an HTML page and is activated by triggering events such as clicking on a link.
A - VBScript
B - A plug-in
C - Visual Basic code
D - A browser

Answers

Answer 1

A - VBScript. HTML (Hypertext Markup Language) is the standard markup language used to create web pages.

HTML uses a series of tags to define the different elements of a webpage, such as headings, paragraphs, images, and links. These tags are then interpreted by the browser to display the content of the page. HTML has evolved over the years, with newer versions incorporating more advanced features and capabilities, such as support for multimedia content, responsive design, and dynamic content. HTML is a critical component of web development, and is often used in conjunction with other technologies, such as CSS (Cascading Style Sheets) and JavaScript, to create rich, interactive web applications.

Learn more about HTML here:

https://brainly.com/question/10002469

#SPJ11


Related Questions

Comments File Home Insert Draw Page Layout Formulas Data Review View Help ▼ K7 X✓ fx B A с D E F G H K M N O P 1 Reid Furniture Store Financing 2 In range G9:G115 enter a formula to calculate the

Answers

In range G9:G115, the formula to calculate the monthly payment for a loan in the Reid Furniture Store Financing worksheet is as follows: =PMT(G5/12,G6,-G4)

Here, the PMT function is used to calculate the monthly payment for a loan.

The arguments required for this function are the interest rate per period, the number of periods, and the present value of the loan.

In this case, the arguments are as follows: Interest rate per period = G5/12Number of periods = G6

Present value of the loan = -G4 (since this value is a negative amount)

Therefore, the complete formula is = PMT(G5/12,G6,-G4).

The range G9:G115 is the area where the formula is being entered, and it will show the results for each customer in that range.

Learn more about Microsoft Excel here:

https://brainly.com/question/11154250

#SPJ11

At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server.

State the type of computer system that is required for EACH of the following purposes..

Processing of scientific data ...........

Distribution of data over a network

Working from home .....

Answers

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

The computer that's needed for processing scientific data is the supercomputer.

The computer that is needed for the distribution of data over a network is the client or server computer while the computer that's needed for working from home is a laptop.

A supercomputer simply means a computer that has a high level of performance and has thousands of processors. The server computer provides functionality for other devices.

Learn more about computers on:

https://brainly.com/question/24540334

Which of the following is not a method for opening Word software? right clicking on the desktop and selecting "view" selecting the Start button and navigating through all programs selecting the Start button and navigating to the most recently used programs using an icon on the desktop

Answers

Answer:

right clicking on the desktop and selecting "view"

Explanation:

A word software enables us to create, edit  two or more documents at the same time and print documents, to write text, store it electronically, display it on a screen and modify it by entering commands, and then print it.

It enables you to draw graphs, and possibly even convert videos into a document.

Word software cannot be opened by right-clicking on the desktop and selecting "view".

Answer:

right clicking on the desktop and selecting "view" selecting the Start button

Explanation:

Word pad is a word processing software included with all versions of MS- Windows starting from Windows 95 to Windows 10. It is more better compared to Notepad and much simpler than Microsoft Word. Microsoft replaced the Microsoft write.

You cannot access word pad by clicking on the desktop and selecting "view", the simplest way to access Word pad is by clicking on the start button and then clicking on the word pad.

I am timed and it needs to be in program C PLEASE help !!


Declare an array of doubles of size 170 called examBonus and initialize all the elements in the array to 5.5 (HINT: use a loop)

Answers

Answer:

Following are the declaration to this question:

double examBonus[] = new double[170]; // declaring the double array examBonus that holds 170 size value  

int x1;//defining an integer variable x1

for (x1=0;x1<170;x1++)//defining a for loop that initialize value in array

{

examBonus[x1] = 5.5;//assign value in array

}

Explanation:

In the above-given java program code, a double type array "examBonus" is declared, that holds a given size value, which is already defined in the question.

In the next step, an integer variable "x1" is defined which is used in the for loop that starts from 0 and ends when its value less than 170, and it assigns the value "5.5" in the above-given array.

Which component of Exploit Guard helps prevent access to internet domains that may host phishing scams, exploits, and other malicious content?
Network protection

Answers

Network protection is the component of Exploit Guard that helps prevent access to internet domains that may host phishing scams, exploits, and other malicious content.

Exploit Guard is a set of advanced security features in Windows that provides enhanced protection against various types of cyber threats. One of its key components is network protection, which acts as a safeguard against accessing malicious internet domains.

When enabled, network protection monitors network traffic and analyzes the URLs or domain names being accessed by applications on a system. It compares these URLs against a list of known malicious domains or blacklists maintained by Microsoft, security organizations, or administrators.

By leveraging real-time threat intelligence and machine learning algorithms, network protection can identify and block attempts to access websites that are known to host phishing scams, exploit kits, malware, or other types of malicious content. This proactive approach helps to prevent users from inadvertently visiting dangerous websites and falling victim to online scams or malware infections.

Network protection operates at the network level, meaning it can block access to malicious domains across various applications and processes on a system. This ensures comprehensive protection, even if an application has vulnerabilities that could be exploited to bypass other security measures.

By actively monitoring and filtering network traffic, Exploit Guard's network protection component helps to create a safer browsing environment for users and mitigate the risks associated with accessing malicious internet domains.

Learn more about  phishing scams

brainly.com/question/32404889

#SPJ11

Problem 1. (a. 10 points) Show that 3n²-8n - 100 = 0(n³) using the definition. (b. 10 points) Find the e-notation of the following expressions: 3 3lgn+ (1+ ++++++)) + ² + ( )² + ( )* + - + ( )
Pr

Answers

To show that 3\(n^2\)-8n - 100 = 0(\(n^3\)) using the definition, we will use the following definition;` Let f and g be positive functions. Then we write f(n) = O(g(n)) if there exist positive constants c and n0 such that 0 ≤ f(n) ≤ cg(n) for all n ≥ n0.`

To solve this, we will convert `3\(n^2\)-8n - 100 = 0(\(n^3\))` into the definition of `O`. This can be achieved as follows;

We can show that 3\(n^2\)-8n - 100 = 0(\(n^3\)) by showing that `3\(n^2\)-8n - 100 ≤ c\(n^3\)` for all `n ≥ n0`. Now, let us solve for `c` and `n0`.Here, we will choose `c=3` and `n0=2`

Then we have,`3\(n^2\)-8n - 100 ≤ 3\(n^3\)``-8n - 100 ≤ 3\(n^3\)-3\(n^2\)``-8n - 100 ≤ \(n^2\)(3n-3)`

We can now solve for `n` by equating it to `n0`.That is,`-8(2) - 100 ≤ (2²)(3(2)-3)``-116 ≤ (4)(3)`

We can see that the above statement holds, hence;

`3n²-8n - 100 = O(\(n^3\))`

To learn more about functions, visit:

https://brainly.com/question/29633660

#SPJ11

if your browser is loading much slower than normal, that may be a sign of a cyberattack on your computer. true or false?

Answers

False.

A slow browser does not necessarily mean that there is a cyberattack on your computer. There could be various reasons for a slow browser, such as high traffic on a website, issues with the browser itself, or network connectivity problems. While a cyberattack may cause a slowdown, it is not always the case. It is important to investigate the root cause of any issues with your computer or network and take appropriate action.

The statement is true in some cases but false in others. A slow browser can be a sign of a cyberattack, but it can also be caused by other factors such as a slow internet connection, too many open tabs, or a browser that needs to be updated. Cyberattacks such as malware or adware can slow down the performance of a computer and cause a browser to load slowly or display pop-ups and ads. Therefore, it is important to perform regular system checks and use security software to protect against cyberattacks. However, a slow browser does not necessarily indicate a cyberattack and other factors should be considered before assuming an attack has occurred.

Learn more about cyberattacks here:

https://brainly.com/question/30783848

#SPJ11

What is a good general rule to follow when deciding whether to repair or replace a computer

Answers

Answer:

witch is most cheap and would benifit you use pros and cons

Explanation:

The sticky notes often have strings of characters written on them that appear to be passwords. What can you do to prevent the security risk that this practice presents

Answers

Educate the user on how to make strong passwords

Which is a screen that shows information from a computer​

Answers

computer monitor is an output device that displays information in pictorial form. A monitor usually comprises the visual display, circuitry, casing, and power supply.

I=5
While I <=20
TextWindow.Write (A + " " )
I = I + 6
EndWhile

Answers

The code provided is a simple example of a while loop written in the BASIC programming language. The loop uses a counter variable 'I' to execute a block of code repeatedly until a specific condition is met.

In this particular example, the loop initializes the variable 'I' to 5, and then executes a block of code that writes the value of a variable 'A' to the console using the TextWindow.Write method. After writing the value to the console, the loop increments the value of 'I' by 6.The loop continues to execute the code block and increment the value of 'I' until the condition 'I <= 20' is no longer true. This means that the loop will execute as long as the value of 'I' is less than or equal to 20. Once the value of 'I' becomes greater than 20, the loop terminates, and the program moves on to the next line of code.

To learn more about while loop click the link below:

brainly.com/question/15091477

#SPJ1

Which TWO of the following are disadvantages of using email?


the threat of getting scammed
the possibility that an email is not delivered to specified recipients
a personal email being read by unintended recipients
increased official communication in the workplace
the risk of computers malfunctioning

ILL GIVE BRAINLY AND A LOT OF POINTS PLS HURRY

Answers

Answer:

A and C

Explanation:

Which girl is he baddest 1. Shawty 2.Lisa 3.Ashley

Answers

Answer:

. . . . . . . S H A W T Y.. . .. . .

the main disadvantage of using cgi scripts is that: question 5 options: a) they cause a resource bottleneck since they have to execute separately for each user request. b) an error in one script can damage and bring down the web server completely. c) they are specific to the web server and to the operating system, thus being platform dependent. d) they do not have the capability to process forms or prepare outputs based on form data.

Answers

The main disadvantage of using CGI scripts is that they can cause a resource bottleneck since they have to execute separately for each user request.

This means that if a website has a high amount of traffic, the server can become overwhelmed and the website may become slow or unresponsive. Additionally, since CGI scripts are specific to the web server and operating system, they can be difficult to transfer to a different platform if needed. Another potential disadvantage is that an error in one script can bring down the entire web server, leading to downtime and potential loss of business. It's important to consider these factors when deciding whether to use CGI scripts for website development, and to weigh the potential benefits against the risks and challenges.

learn more about CGI scripts here:

https://brainly.com/question/29677623

#SPJ11

ILL GIVE BRAINLIEST HELLP.
in windows 8, the _____ manager is the app that allows you to manage your hardware drivers on your computer .
a. device
b. drivers
c.system
d.utilities

Answers

Answer:

Device Manager

Explanation:

The Device Manager is used to check for hardware that have been installed on your system such as RAM, CPU, GPU etc. However, it has the option to update drivers for any hardware that you such desire.

Can someone help me on a 60 second ringtone :(

Can someone help me on a 60 second ringtone :(

Answers

Answer:

If you have an apple phone, its as easy as importing it into Garage Band, cutting it to size, and exporting it as a ringtone or even a text tone. My text tone is now Megalovania.

please help me out with answering the questions

please help me out with answering the questions

Answers

10.

if "h" in letter:

   #do something

11.

if value >= 13.6:

   #do something

12.

if 5 < y < 11:

   #do something

13.

if num1 == num2:

   print("equal")

14.

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

if num1 > num2:

   print(num1)

else:

   print(num2)

15.

if number == 89 or number == 78:

   print("Your number is equal to 89 or 78")

I hope this helps! If you have any other questions, I'll do my best to answer them.

What are some of the unique benefits and challenges of flash drives as a way to store data?

Answers

Answer:

these are some benefits Increased Durability. Unlike traditional hard-disk drives, flash drives lack moving parts

Maximum Portability

Plenty of Storage Capacity

Fast Transfer Speeds

Compatibility with Many Devices

Which arcade game, released in 1972, is considered to be the first to be commercially successful?.

Answers

Answer:

Pong

Explanation:

Pong

____ technology uses digital signaling in which the cable carries only one channel of digital data.

Answers

Baseband coaxial technology uses digital signaling in which the cable carries only one channel of digital data.

What is a Baseband coaxial cable?

A baseband coaxial cable is known to be one that is used in networking.

It helps to send a single signal at a  given time and this is known to be done at a very high speed.

Note that a broadband coaxial cable can help to send or  transmit a lot of simultaneous signals via the use of different frequencies.

Therefore, Baseband coaxial technology uses digital signaling in which the cable carries only one channel of digital data.

Learn more about Network from

https://brainly.com/question/8118353
#SPJ1

Computer has brought radical change in every field​

Answers

Answer:

Yes it has brought change in every field

Explanation:

In computer science how can you define "copyright, designs and patents act 1988"?​

Answers

Answer:

:)

Explanation:

Copyright Designs and Patents Act

The Copyright Designs and Patents Act (1988) gives creators of digital media the rights to control how their work is used and distributed. ...

Anything which you design or code is automatically copyrighted and may not be copied without your permission, as the digital creator.

Seeing the bank robber jump into his vehicle and speed away, Super
Megan quickly spun into her costume and took off flying into the air to
catch the thief. This is an example of
sounds
dialogue
exciting action
description

Answers

Exciting action, mainly because there’s a never-ending script of action-thriller dialogue.

What term is commonly used to refer to HTML formatting?

Answers

Answer:

<html> or </html>

quick sort concise explanation of algorithm give and explain best/average time complexity give and explain worst time complexity give and explain space complexity in terms of auxiliary space give and explain space complexity in terms of runtime stack give and explain in-place? give and explain stable?

Answers

An effective, all-purpose sorting algorithm is quicksort. Tony Hoare, a British computer scientist, created the Quicksort algorithm in 1959.

Quicksort

Quicksort was later published in 1961 and is still a widely used sorting algorithm today. For randomized data, it is generally marginally faster than merge sort and heapsort, especially for bigger distributions.

Divide and conquer is a sorting method that is used in Quick Sort.

In rapid sort, we select an element as the pivot and divide the array around it. We sort our array by using this strategy again for each subdivision.

We can use rapid sort in several ways depending on where the pivot is.

pivoting on the first or last elementusing the pivotal median element

Partitioning is quicksort's primary operation (). The goal of partitions is to arrange an array with element x serving as the pivot so that all other elements smaller than x are placed before x and all other elements larger than x are placed after x in a sorted array. This should all be completed in a straight line.

To know more about Quick Sort, Check out:

https://brainly.com/question/13155236

#SPJ4

Caroline is building an expert system for wartime defense. Which of these is true about the system she is building?
A. The expert system can demonstrate an attack to test the defense mechanism.
B. The expert system can make autonomous decisions with no human intervention.
C. The expert system can rebuild its knowledge base based on new defense technology.
D. The expert system can diagnose a new threat with any existing information.

Answers

Answer:

The true statement about the system she is building is;

B. The expert system can make autonomous decisions with no human intervention

Explanation:

A computer program known as an expert system is a system that emulates the human or organizational, decision making, judgement and behavior that has gained the knowledge and experience of an expert by analyzing information categories using if then rules of artificial intelligence technologies and not procedural code

Therefore, an expert system of wartime defense can make decisions on its own without the input of a human administrator

How are console apps displayed?
a) In a window form.
b) In the Command Prompt.
c) Console apps have no output to
display.
d) It depends.

Answers

The Command Prompt displays console apps. Some consumers simply favour console-based programmes, while some businesses continue to employ legacy console programmes for critical data processing operations.

A console application is a software application that is intended to be used through a text-only computer interface, such as a text terminal, the command-line interface of some operating systems (Unix, DOS, etc.), or the text-based user interface found in the majority of graphical user interface (GUI) operating systems, such as the Windows Console in Microsoft Windows, the Terminal in macOS, and xterm in Unix.

Modern programming environments, including Visual Studio and the.NET Framework on Microsoft Windows, nevertheless support the creation of console programmes. By eliminating the complexity of a graphical user interface(GUI), it makes learning a new programming language easier.

To learn more about Command Prompt click here:

brainly.com/question/29491045

#SPJ4

Ryder has discovered the power of creating and viewing multiple workbooks. ​ ​ Ryder wants to use a layout in which the workbooks overlap each other with all the title bars visible. Ryder opens all of the workbooks, and then he clicks the View tab on the Ribbon and clicks the Arrange All button. What should he do next to obtain the desired layout?

Answers

Answer:

Click the Cascade option button

Explanation:

Based on the description of what Ryder is attempting to accomplish, the next step that he needs to do would be to Click the Cascade option button. This option will cause all the windows of the currently running applications to overlap one another but at the same time show their title bars completely visible in order to let the user know their open status. Which is exactly what Ryder is attempting to make as his desired layout for the workbooks. Therefore this is the option he needs.

__________________ provides a graphical user interface to access and manage the file system, including opening files, moving and copying files, and deleting files.

Answers

A file manager provides a graphical user interface (GUI) for accessing and managing the file system, allowing users to perform tasks such as opening, moving, copying, and deleting files.

A file manager is a software application that provides a user-friendly interface for interacting with the file system on a computer. It allows users to navigate through directories and folders, view file contents, and perform various file management operations.

With a file manager, users can easily open files by double-clicking on them or selecting them from a list. They can also create new files and folders, rename existing ones, and organize files into different directories. Moving and copying files becomes a simple task, as users can drag and drop files from one location to another or use built-in options to move or copy files. Additionally, a file manager provides the functionality to delete files and folders, either by selecting them and pressing the delete key or using the appropriate context menu options.

File managers often include additional features such as file search, file compression and extraction, file properties display, and customizable views. They offer a visual representation of the file system, making it easier for users to navigate and manage their files efficiently.

Learn more about graphical user interface here:

https://brainly.com/question/14758410

#SPJ11

Sarah is working in Scratch and trying to access the code editor. What does Sarah need to click on in order to do this?

A.
the Code tab at the bottom right of the screen

B.
the Code tab at the top right of the screen

C.
the Code tab at the bottom left of the screen

D.
the Code tab at the top left of the screen

Answers

Answer: the Code tab at the bottom right of the screen

Explanation: Already did this and got it right !

Other Questions
using variable pricing in response to demand variability to maximize revenue using perishable capacity is known as 16. How does aspirin relieve the symptoms of the flu?(1) It forms a barrier around the outer surface of PGHS-2 molecules,separating them from the prostaglandins.(2) It dissolves the crystal of the enzyme, preventing it from producingprostaglandins.(3) It is an acid that dissolves the prostaglandins that cause the symptoms.(4) It reduces the amount of raw material reaching the active site of theenzyme that produces prostaglandins. I need some of yalls opinions for my essay. Who do you think decides what is just and unjust? find the slope the in clearest form Case, please be sure to provide response posts to at least two class Chapter 4: Completing the Accounting Cycle Mary Smith is the controller for ABC Printing Service Mary has been putting in a lot of overtime, therefore, she has been allowed hire an assistant Mary's assistant is a bright, high school graduate but he has never taken an accounting class Mary is trying to decide which accounting activites could be delegated to her assistant Mary is willing to give the assistanta few time instructions th each task, but she doesn't have time to teach the a stant to be an accountant For each task listed, state whether Mary should continue to do the work or delegate the trk to her assistant Please explican 1. List the account balances from the general ledger in the Trial Balance columns of the end of period spet 2. Add the Debit and Credit columns of the trial balance. 3. Make the adjusting entries on the spreadsheet. 4. Complete the spreadsheet 5. Type the formal financial statements uning the data from the Income Statement and Balance Sheet columm of the spreadsheet 6. Journalize and past the adjusting entries. Which types of decay will cause the mass number a of a nucleus to change?. If you hiked for 1 hour and your best friend skied for 1 hour, who would burn more calories write your own response to the question, What is the main reason the US awar started? Sase your response on your own interpretation of the historical evidence. how can we draw it in graph?[tex]f(x) = { - 2}^{ - x} [/tex] Fossil fuels such as oil and coal are made from highly condensed ___ in the soil.A. CarbonB. HydrogenC. OxygenD. Nitrogen Consider the following predicate describing a general financial advisor: A A 1. savings account(inadequate) investment(savings). 2. savings account(adequate) income(adequate) investment(stocks). 3. savings account(adequate) , income inadequate) investment(combination). 4. V amount_saved(X)^3 Y (dependents(Y) ^ greater(X, minsavings(Y))) savings account(adequate). 5. X amount_saved(X)^3 Y (dependents(Y) A greater(X, minsavings(Y))) savings account(inadequate). 6. X earnings(X, steady) ^ 3 Y (dependents (Y) ^ greater(X, minincome(Y)))income (adequate). 7. V X earnings(X, steady) ^ 3 Y (dependents(Y) ^ - greater(X, minincome(Y))) income inadequate). 8. X earnings(X, unsteady) income inadequate). 9. amount_saved(22000). 10. earnings(25000, steady). 11. dependents(3). - -> - Jane Doe has four dependents and a steady income of $30,000 and $15,000 in her savings account. Add the appropriat describing her situation to the general investment advisor. Economists represent a good/service which has a fixedsize/amount with a vertical (linear) supply curveno matter how themarket price may change, the amount of the good does not. A commonexample i A farmer has a piece of land with an area of 4 square yards. If a cow can graze grass at a rate of 2 square feet per hour, how long will it take 3 cows to graze the entire piece of land solve the question 3/8x-1/4=1/2x=? PLEASE HELP AS SOON AS POSSIBLE! One of the processes designed to eradicate maximum possible security risks is to ________________, which limits access credentials to the minimum required to conduct any activity and ensures that access is authenticated to particular individuals. a web site that specializes in determining (primarily for americans) the ancestry of its visitors would be an example of the following type of web attractor:select one:a.the clubb.the gift shop c.the freeway intersection or portald.the customer service centerquestion 7not yet answeredmarked out of 1.00flag questionquestion text What is the longest river in the world? Given the characteristic equation: s2 + 3 + 5 = 0 for v(t), what is the value of the sinusoidal angular frequency (w) in the underdamped expression: v(t) = e -*[Acos(w)t + Bsin(w)t] ? Notes on entering solution: . Enter your solution to two decimal places Do not include units in your answer You are finding (W) According to Przeworski, democratic and authoritarian regimes ______.A. present great differences in term of economic developmentB. are about the same on economic developmentC. control citizens economically through capitalismD. none of thes