Computers and Technology
Computers and Technology, 08.07.2019 17:00, nina2323

25 ! 1.) what is the page that loads when the website address is typed into a browser? a.)permalink b.)hyperlink c.)index d.)url 2.) a hyperlink can be used to open which of the following? a.) a specific folder on you computer b.) a word processing program c.) a page within a website that requires a login and password d.) another location on the same web page 5.) what is a piece to text or an image that, when clicked on, will open another document? a.) home b.) hyperlink c.) index d.) url 6.) what is a related collection of documents that are stored on the world wide web with a common domain name? a.) favicon b.) hyperlink c.) web page d.) website 7.) how do links typically appear in a web browser? a.) blue and bold b.) blue and underlined c.) bold and capitalized d.) bold and underlined 8.) what is the small icon that is displayed in the address bar of the web browser to the left of the website address? a.) favicon b.) hyperlink c.) web page d.) website asap 25 points

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 09:00, 19youngr
Which company provides a crowdsourcing platform for corporate research and development? a: mtruk b: wiki answers c: mediawiki d: innocentive
Answers: 2
image
Computers and Technology, 24.06.2019 02:30, sha273
Which option completes the explanation for conflict of interest in an organization
Answers: 1
image
Computers and Technology, 25.06.2019 01:00, shonesam98
Regular maintenance is a key component of automotive lift safety.
Answers: 1
image
Computers and Technology, 25.06.2019 14:40, dora8798
Which of the following is the definition of role-based access control ( rbac)? (a) ensures that data has not been accidentally or intentionally modified without authorization. (b) access control system where rights are assigned based on a user’s role rather than his or her identity. (c) ensures that private or sensitive information is not disclosed to unauthorized individuals. (d)the principle in which a subject—whether a user, an application, or another entity—should be given the minimum level of rights necessary to perform legitimate functions.
Answers: 2
Do you know the correct answer?
25 ! 1.) what is the page that loads when the website address is typed into a browser? a.)permali...

Questions in other subjects:

Konu
History, 17.12.2020 16:30
Konu
English, 17.12.2020 16:30