Monitoring agents usually track and report on computer equipment and network systems to predict when a system crash or failure might occur. Monitoring agents provide real-time visibility into the health and performance of computer equipment and network systems.
Monitoring agents are software elements created to monitor and report on the performance and status of computer hardware and network systems. Their main goal is to anticipate and identify probable system failures or breakdowns before they occur, enabling administrators or operators to take proactive action to stop or lessen the effects of such incidents.
Learn more about Monitoring agents here:
https://brainly.com/question/32322678
#SPJ4
How to know if windows machine has java.
Answer:
In the Search bar, type Control Panel. Click Programs. If the Java icon present, then Java is installed. If not, click Programs and Features, and look for installed versions of Java in the J's.
Explanation:
good luck ☺️
One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data
Answer:
Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers
Explanation:
Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only certain limited number of sites are available.
Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible
Hence, option A is correct
what did Ada lovelace do
Answer: Ada Lovelace is often considered to be the first computer programmer!
Explanation: Most wealthy women of the 1800s did not study math and science. Ada Lovelace excelled at them—and became what some say is the world's first computer programmer. Born in England on December 10, 1815, Ada was the daughter of the famous poet Lord George Byron and his wife, Lady Anne Byron.
create the physical model: r-1 (x,y,z): 0,0,200 ft (this is the reservoir) j-1 (x,y,z): 200,0,0 ft j-2 (x,y,z): 500,200,0 ft j-3 (x,y,z): 1000,0,0 ft all pipes are 6 inch with c value of 130. add 150 gpm demand only on j-3. analyze the system. what is the velocity (fps) in the pipe connecting j-1 and j-3?
The pipe diameter is divided by D in inches square, and the velocity, v, is equal to 0.408 times the gallon flow rate per second.
Explain about the Velocity?
A statistic called velocity forecasts how much work an Agile software development team will be able to effectively finish in a two-week sprint (or similar time-boxed period). When determining how quickly work can be done and how long it will take to complete a project, velocity is a useful planning tool.
The velocity (V) of an agile software development project is the number of narrative units allocated for planning the following iteration. Based on observations made during prior iteration cycles, velocity is calculated.
Velocity the fourth of the big data "5 V's" is velocity. This phrase refers to the rate at which data is generated and transferred. For businesses that require their data to move rapidly, this is a crucial factor.
To learn more about Velocity refer to:
https://brainly.com/question/24445340
#SPJ4
Suppose an object-relational mapping (ORM) library syncs a database from source code models. What is an advantage of supporting migrations of existing tables? Select the correct answer: To allow additional constraints on the tables To guarantee test database schemas match the production schema To populate test fixtures Faster creation of test databases Select your answer
An advantage of supporting migrations of existing tables is that it allows for faster creation of test databases. The object-relational mapping (ORM) library can sync a database from source code models, making it possible to create new tables and modify existing tables according to changes in the source code.
However, when changes are made to the schema of an existing table, it can be difficult and time-consuming to recreate the test database from scratch. This is where supporting migrations can be useful, as it allows the ORM library to modify the existing table schema in place, rather than creating a new table. This can significantly reduce the time and effort required to create and maintain test databases.
Other benefits of supporting migrations may include:Allowing additional constraints on the tables: By modifying the table schema, it may be possible to add additional constraints or rules to enforce data integrity.Guaranteeing test database schemas match the production schema: By syncing the test database with the production database, it ensures that the test data accurately reflects the state of the production data.Enabling easier rollback of changes:
To know more about library visit:
https://brainly.com/question/31630680
#SPJ11
_______, historically, has not been an integral part of the software development life cycle.
Historically security has not been an integral part of the software development life cycle.
What is Software Development ?Software Development Life Cycle is the application of standard business practices to building software applications. It's typically divided into six to eight steps: Planning, Requirements, Design, Build, Document, Test, Deploy, Maintain.
What are the 5 phases of software development life cycle?The SDLC process includes planning, designing, developing, testing and deploying with ongoing maintenance to create and manage applications efficiently.
To learn more about Software Development , refer
https://brainly.com/question/25310031
#SPJ4
Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints a single line consisting of 5 periods (terminated by a new line character) .
Answer:
See the short code Below
Explanation:
Let us implement the code with Python programming language
def printDottedLine ():
print("..... "\n) # this line will print 5 dots
Joel needs to write a research paper. What is the best application to use?
Answer: Britannica High School
Explanation:
https://school-eb-com.content.elibrarymn.org/levels/high
Answer:
g
o
o
g
l
e
s
h
e
e
t
s
Explanation:
Using the above network graphic, answer the following
questions.
What types of servers should/could go into the Internal LAN?
List at least three, provide role and why in this segment.
How should
The types of servers that could go into the Internal LAN are Domain Name System (DNS) server, E-mail server, and File server. Domain Name System -DNS translates domain names into IP addresses. A DNS server is critical to your internet connection.
E-mail server: The email server is used to send and receive email messages on the network.File server: A file server is a server that manages access to centralized storage on a network. It stores files and data so that all users can access the same data. A file server can be used to centralize the storage of all files on the network, making it easier to manage and backup.
The Internal LAN should be configured with a network address range that is not used on the Internet, as this will help to prevent conflicts with Internet resources. The IP address range 192.168.0.0/16 is reserved for private networks and can be used for internal LAN addresses. The Internal LAN should be secured with a firewall to prevent unauthorized access.
The firewall can be used to block incoming traffic from the Internet while allowing outgoing traffic to access Internet resources. It can also be used to restrict access to internal resources, such as servers and workstations, to authorized users only.
To know more about Domain Name System visit:
https://brainly.com/question/32339060
#SPJ11
# 35.3) Hot and Cold
A scientist has been recording observations of the temperature for the past
while. On hot days, they write "H", and for cold days, they write "C". Instead
of using a list, they kept all of these observations in a single long string
(e.g., "HCH" would be a hot day, followed by a cold day, and then another hot
day).
Write a function `add_hot_cold` that consumes a string of observations and
returns the number of hot days minus the number of cold days. To accomplish
this, you should process each letter in turn and add 1 if it is hot, and -1 if
it is cold. For example, the string "HCH" would result in 1, while the string
"CHCC" would result in -2.
You cannot use the built-in `.count()` method or the `len()` function for this
problem.
Don't forget to unit test your function.
Answer: Code
Explanation:
#add_hot_cold function
def add_hot_cold(obs):
"""
takes a string of observations as input
and returns the number of hot days minus
the number of cold days.
>>> add_hot_cold("CHCC")
-2
>>> add_hot_cold("HHHHHCCCHCHHHCHCHC")
4
>>>
"""
#set nday to 0
nday = 0
#process each letter in the string
for char in obs:
#if it is a hot day, add 1
if char == "H":
nday = nday + 1
#if it is a cold day, add -1
elif char == "C":
nday = nday - 1
#return nday
return nday
#Call the function on the string "HHHHHCCCHCHHHCHCHC" and print the result
print(add_hot_cold("HHHHHCCCHCHHHCHCHC"))
Note - The above code might not be indented. Please indent your code according to the below screenshot.
Sample Output:
Code Screenshot:
6. (12 points) let s be a set of n intervals of the form [a, b], where a < b. design an efficient data structure that can answer, in o (log n k) time, queries of the form contains(x), which asks for an enumeration of all intervals in s that contain x, where k is the number of such intervals. what is the space usage of your data structure?
A program's or algorithm's overall memory usage, including the space utilized for input values during execution, is referred to as space complexity.
What data structure is employed in what context?Data structures are typically employed to build the physical representations of abstract data types. The creation of effective software requires the use of data structures. They are essential to both the design of algorithms and their application in computer applications.
Which data structure is most commonly used?
Arrays. The most straightforward and popular data structure is an array. Stacks and queues, for example, are derived from arrays.
To know more about algorithm's visit :-
https://brainly.com/question/21172316
#SPJ4
I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding FLVS fine ill put it 100 plz help meee
Part 1: Plan and Write the Pseudocode
Using pseudocode, write an algorithm that someone else can follow.
Decide on a question to ask the user. Some ideas include:
What grade are you in?
What sport do you play?
Where did you go on vacation?
Use one variable to store the response.
Use one if-else statement to make a decision based on the user's input.
Display two messages; one for each condition (True and False).
Insert your pseudocode here: (you only need to do one)
Flowchart
Write it out
Get input:
If statement:
Print if true:
Print if false:
Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Write one if-else statement using user input.
Include a print message for both conditions (True and False).
Conclude the program with the main() statement.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question
Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.
Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.
you can also give me a link to your work and ill use it as a guide I will not copy
my g mail is my user name
Answer:
give other guy brainliest
4. Write technical term for the following statements
A) The computers designed to handle specific single tasks.
B) The networked computers dedicated to the users for professional wrok.
C) The computers that uses microprocessor as their CPU.
D) A computer that users analog and digital device.
E) The computer that processes discontinuous data.
F) The portable computer which can be used keeping in laps.
G) The general purpose computers used keeping on desk.
Answer:
a) Special-purpose computer
b)
c)microcomputers
d) hybrid computer
e) digital computer
f) laptop computers
g) desktop computers.
Please mark me as brainlist :)which of the two attributes should have the name of javascript as its value?
Match the following.
1. the process of reducing repetition of data
data normalization
2. individual categories of data you will enter in a database
records
3. a field that is a unique identifier for each record in the table
fields
4. data that is entered in the database
primary key
5. a link between two tables
relationship
Answer:
1192783728439
Explanation:
A student is stuck on implementing a function that flips images top to bottom: def flip_top_down (img): #line 1 for i in range (len (img)): #line 2 temp = () #line 3 for j in range(len(img) // 2): #line 4 temp = img[i][j] #line 5 img[i][j] = img[len(img)-1-i][j] #line 6 img[len (img)-1-i][j] = (temp [0], temp [1], temp [2]) #line 7 Select ALL the reasons why the above student's code will not flip img correctly: temp is declared as a function instead of a variable in line 3 The range of the inner for-loop is incorrectly set The range of the outer for-loop is incorrectly set Line 7 will result in an error because temp is immutable
Since temp is a tuple, it is immutable, and cannot be changed. This will result in a TypeError, leading to an incorrect result.
The above student's code will not flip img correctly due to the following reasons:1. temp is declared as a function instead of a variable in line 32. The range of the inner for-loop is incorrectly set3. The range of the outer for-loop is incorrectly set. Explanation:1. temp is declared as a function instead of a variable in line 3The student in the code has declared temp as a function instead of a variable in line 3. Due to this, the code will not run properly. The temp should have been defined as a variable for storing the pixel values of the image. The correct code is given below:def flip_top_down (img): #line 1for i in range (len (img)): #line 2 temp = img[i] #correction img[i] = img[len(img) - i - 1] #correction img[len(img) - i - 1] = temp #correction2. The range of the inner for-loop is incorrectly setThe inner for-loop in line 4 has been defined to have a range of `len(img) // 2` which is wrong. This will only flip half of the pixels in the image, leading to an incorrect result. Instead, the range of the inner for-loop should have been set to the length of the image.3. The range of the outer for-loop is incorrectly setThe outer for-loop has been defined to have a range of `len(img)` which is incorrect. This will cause the code to attempt to flip each row of the image more than once, leading to incorrect output. The range of the outer for-loop should have been set to `len(img) // 2` to flip each row only once.4. Line 7 will result in an error because temp is immutableThe student has attempted to assign a new value to temp in line 7. However, since temp is a tuple, it is immutable, and cannot be changed. This will result in a TypeError, leading to an incorrect result.
Learn more about tuple :
https://brainly.com/question/30641816
#SPJ11
The use of artificial intelligence (AI) is a central element of the digital transformation
process at the BMW Group. The BMW Group already uses AI throughout the value
chain to generate added value for customers, products, employees and processes.
"Artificial intelligence is the key technology in the process of digital transformation. But
for us the focus remains on people. AI supports our employees and improves the
customer experience.
We are proceeding purposefully and with caution in the expansion of AI applications
within the company. The seven principles for AI at the BMW Group provide the basis
for our approach."
Following an analysis of the extracts and article above, evaluate the impact of artificial
intelligence and other technologies on the various stakeholders of BMW: i.e.
customers, products, employees and processes.
• Analyse the statements and article above
• Provide a thorough assessment of the impact of artificial intelligence and
other technologies on the various stakeholders of BMW: i.e. customers,
products, employees and processes.
• Ensure the various stakeholders of BMW are included in your evaluation.
• Answer must not exceed four (4) pages
• Please conduct your own online desktop research in order to support your
answer.
Artificial intelligence (AI) and other technologies have a significant impact on various stakeholders of BMW, including customers, products, employees, and processes. These advancements bring about enhanced customer experiences, improved products, increased efficiency in internal processes, and support for employees.
AI is a key technology in BMW's digital transformation process, but the company emphasizes that its focus remains on people. AI is employed throughout the value chain to generate added value for customers. With the use of AI, BMW can gather and analyze customer data to understand preferences, personalize experiences, and provide targeted recommendations. This leads to improved customer satisfaction and loyalty.
Moreover, AI enables BMW to enhance its products. By leveraging AI in areas like design, engineering, and manufacturing, BMW can optimize vehicle performance, safety, and sustainability. AI-powered features such as driver assistance systems and autonomous driving capabilities contribute to improved product offerings, meeting the evolving needs and expectations of customers.
In terms of employees, AI supports them by automating routine tasks, enabling them to focus on more complex and strategic activities. This enhances productivity and efficiency, allowing employees to contribute their skills and expertise in areas where human judgment and creativity are crucial. AI also assists employees in decision-making processes by providing data-driven insights and recommendations, leading to better outcomes.
Regarding processes, AI plays a vital role in streamlining and optimizing internal operations at BMW. Machine learning algorithms analyze vast amounts of data to identify patterns, detect anomalies, and make predictions, facilitating proactive maintenance and reducing downtime. This leads to improved operational efficiency, cost savings, and enhanced overall performance.
Overall, the impact of AI and other technologies on BMW's stakeholders is positive. Customers benefit from enhanced experiences and personalized offerings, employees are supported in their work and decision-making processes, products are improved through AI-powered advancements, and internal processes become more efficient and effective.
Learn more about #SPJ11
When you sign up for phone, tv, or internet service, the provider is likely to check your credit report. Why would they do this even though you’re not borrowing money from them?.
Answer:
If you are paying for it they are gonna make sure your gonna pay them monthly or weekly that's why they check your credit report
Explanation:
Hope this helps :)
What is the analysis stage in System development life cycle?
Answer:
Explanation:
end user business requirements are analyzed and project goals converted into the defined system functions that the organization intends to develop. The three primary activities involved in the analysis phase are as follows: Gathering business requirement. Creating process diagrams.
Create a program that allows the user to enter an unknown number of sales amounts for each of three car dealerships: Dealership 1, Dealership 2, and Dealership 3. The program should calculate the total sales. Display the total sales with a dollar sign and two decimal places. a. Create an IPO chart for the problem, and then desk-check the algorithm using 23000 and 15000 as the sales amounts for Dealership 1; 12000, 16000, 34000, and 10000 for Dealership 2; and 64000, 12000, and 70000 for Dealership 3. b. List the input, processing, and output items, as well as the algorithm, in a chart similar to the one shown earlier in Figure 8-16. Then code the algorithm into a program. c. Desk-check the program using the same data used to desk-check the algorithm. d. If necessary, create a new project named Intermediate19 Project, and save it in the Cpp8\Chap08 folder. Enter your C++ instructions into a source file named Intermediate19.cpp. Also enter appropriate comments and any additional instructions required by the compiler. e. Save and then run the program. Test the program using the same data used to desk-check the program.
As an AI language model, I cannot create or run programs. However, I can provide you with the algorithm and the pseudocode for the program you described:
Input:
Sales amounts for each of the three car dealerships
Processing:
Initialize total sales to 0
Loop through each dealership
Loop through each sales amount for the current dealership
Add the current sales amount to the total sales
Display the total sales with a dollar sign and two decimal places
Output:
Total sales
Pseudocode:
totalSales = 0
FOR each dealership
FOR each salesAmount in dealership
totalSales += salesAmount
END FOR
END FOR
DISPLAY "$" + totalSales with two decimal places
To desk-check the algorithm, we can use the given data:
Dealership 1: 23000, 15000
Dealership 2: 12000, 16000, 34000, 10000
Dealership 3: 64000, 12000, 70000
totalSales = 0
FOR each dealership
FOR each salesAmount in dealership
totalSales += salesAmount
END FOR
END FOR
DISPLAY "$" + totalSales with two decimal places
After running the algorithm with the given data, we should get a total sales of $230000.00.
To code the algorithm into a C++ program, we can use the following code:
#include <iostream>
#include <iomanip>
using namespace std;
int main() {
// Declare variables
double totalSales = 0;
double salesAmount;
char continueInput;
// Loop through each dealership
for (int dealership = 1; dealership <= 3; dealership++) {
cout << "Enter sales amounts for dealership " << dealership << ":\n";
// Loop through each sales amount for the current dealership
do {
cin >> salesAmount;
totalSales += salesAmount;
cout << "Enter another sales amount? (Y/N): ";
cin >> continueInput;
} while (toupper(continueInput) == 'Y');
}
// Display the total sales with a dollar sign and two decimal places
cout << fixed << setprecision(2);
cout << "Total sales: $" << totalSales << endl;
return 0;
}
To desk-check the program using the same data, we can run the program and input the following values when prompted:
Dealership 1: 23000, 15000
Dealership 2: 12000, 16000, 34000, 10000
Dealership 3: 64000, 12000, 70000
After running the program with the given data, we should get a total sales of $230000.00 displayed on the screen.
Learn more about algorithm here:
https://brainly.com/question/22984934
#SPJ11
Who invented the television and what year did color come out? Explain
The television was not invented by a single person, but its development involved contributions from several inventors and engineers.
How is this so?Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.
As for color television, it was first introduced commercially in the United States in 1953 by RCA.
The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.
Learn more about television at:
https://brainly.com/question/12079773
#SPJ1
windows 11 has 3 accessibility categories, what are they?
Windows 11 has 3 accessibility categories Vision., Hearing., Mobility disabilities easier to find and use, making it one of the most accessible operating systems available.
Windows 11 makes accessibility tools for people with vision, hearing, and mobility disabilities easier to find and use, making it one of the most accessible operating systems available. Although PC hardware is nice, it is of little use without cutting-edge software.
What's coming to Windows 11 accessibility?Voice access, which lets users control most of the operating system with their voice, is another new feature in the Windows 11 2022 Update. Without having to move your hands, you can open and close apps, navigate text, click things, press keyboard keys, and more with this.
What exactly are access permissions?Android Accessibility Services was made to help app developers make their apps more accessible to people with disabilities and to help them overcome the obstacles they face when using smartphones. To take advantage of these advantages, users must enable "Accessibility Permissions" when downloading these apps.
Learn more about windows 11 :
brainly.com/question/30613269
#SPJ4
Which type of settings needs to be configured for you to manage the implementation of Application Guard
To manage the implementation of Application Guard, you need to configure certain settings. These settings include network isolation, container image management, and host hardware requirements. By properly configuring these settings, you will be able to effectively manage the implementation of Application Guard.
Page orientation is determined in Microsoft Word from the __________ tab
Answer:
Page orientation is determined in Microsoft Word from the Page Layout tab.
Explanation:
The Page Layout Tab holds all the options that allow you to arrange your document pages just the way you want them. You can set margins, apply themes, control of page orientation and size, add sections and line breaks, display line numbers, and set paragraph indentation and lines.
An analog video is a video signal transmitted by an analog signal, captured on a (blank)
Answer:Analog component signals are comprised of three signals, analog R′G′B′ or YPbPr. Referred to as 480i (since there are typically 480 active scan lines per frame and they are interlaced), the frame rate is usually 29.97 Hz (30/1.001) for compatibility with (M) NTSC timing.
Explanation:
Why is a service level agreement (sla) important?
1.it documents expectations of rising costs.
2.it documents expectations of future resource availability.
it documents expectations of availability, uptime, and security.
3.it documents expectations of usage.
Service level agreement (SLA) important for "It documents expectations of availability, uptime, and security."
A Service Level Agreement (SLA) is a contract between a service provider and its customers that outlines the level of service and support that the provider is committed to delivering. The SLA documents the expectations of availability, uptime, and security, which are critical factors in determining the quality of service a customer receives. By setting clear expectations and defining metrics for service delivery, an SLA helps to ensure that both the provider and the customer are on the same page, reducing the risk of misunderstandings or disputes. Additionally, an SLA can help to establish a foundation for ongoing communication and collaboration between the provider and the customer.
To learn more about (SLA) visit;
https://brainly.com/question/15269079
#SPJ4
Consider the following recursive algorithm: (a) Prove that Algorithm Weirdsort correctly sorts the elements in the array A. 2 (b) Ignoring ceilings (i.e. we can assume that n is a power of 3 ), write the recurrence in terms of n describing how many calls are made to Weirdsort with an initial call of Weirdsort (A[0…n−1]) ? Hint: write a recurrence whose general form is R(n)= aR(n/b)+f(n) where a,b are rational numbers and f(n) is a function of n. Justify why your recurrence is counting the number of recursive calls. (c) Using this recurrence, prove that R(n) is at most n 3
when n≥2 using induction.
(a) To prove that Algorithm Weirdsort correctly sorts the elements in the array A, we need to show two things: (1) it terminates and (2) it produces a sorted array. For termination, the algorithm works by repeatedly dividing the array into three equal-sized subarrays and recursively calling itself on each subarray. 1.termination is guaranteed. To show that the algorithm produces a sorted array, we need to prove the correctness of the recursive calls. Let's assume that the Weirdsort algorithm works correctly for arrays of size less than n. Then, we can say that for any array of size n, the algorithm will correctly sort it by recursively sorting the subarrays.
(b) R(n) = 3R(n/3) + f(n) In this recurrence relation, n represents the size of the array and R(n) represents the number of recursive calls made to Weirdsort. The term 3R(n/3) accounts for the three recursive calls made on the three subarrays of size n/3 each. The term f(n) represents any additional operations or calls made outside of the recursive calls.
The recurrence relation accurately counts the number of recursive calls because for each recursive call, the size of the array is divided by 3. The initial call is made on an array of size n, and subsequent calls are made on subarrays of size n/3, n/9, n/27, and so on, until the base case of size 1 is reached.
(c) To prove that R(n) is at most n^3 when n≥2 using induction, we need to show two things: (1) the base case and (2) the inductive step. Base case: For n=2, we have R(2) = 3R(2/3) + f(2). Since n=2, the size of the array is reduced to 2/3 in the recursive call. Therefore, R(2/3) is the number of recursive calls made on an array of size 2/3. Since n<2, the base case holds. Inductive step: Assume that R(k) ≤ k^3 for all k.
To know more about algorithm visit:
brainly.com/question/33178643
#SPJ11
Type the correct answer in the box. Spell all words correctly.
Natasha came across a website that had a building image, where each window in the building was clickable. She clicked on one of the windows,
Upon clicking the link information was sent to another computer. This computer processed the information and returned the appropriate page
about a window. Which attribute is used in this case to identify the type of image map?
The
attribute is used in this case to identify the type of image map.
Answer:
Redirection
Explanation:
This is something called redirection, you can sometimes get paid for it, or just some sort of reward, sometimes even a virus scanner.
Answer:
The ismap attribute is used in this case to identify the type of image map.
Explanation:
Using ismap indicates to your browser that the link is processed by another computer (server). Once the server processes the information about the link, it returns the appropriate page.
10. An area on a slide that can hold text, graphics and other media is called
Placeholder
Section
Text Box
Answer:
textbox
Explanation:
large carriers like sprint, at&t, and xo communications exchange internet traffic freely at physical locations called ________.
The answer is Internet Exchange