answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
2 years ago
12

Use the ________ method to write text to a web page.

Computers and Technology
1 answer:
Nastasia [14]2 years ago
3 0
Document.write()

I'm not sure that this is a method, but I think this is right. 
You might be interested in
A hidden backlog contains the projects that the IT department is not aware of because of low feasibility.
Finger [1]

Answer: True

Explanation:

Yes, the given statement is true that the due to the very low feasibility the IT (Information technology) department are not aware of the hidden backlog that basically contain projects.

The feasibility is the main factor in the IT department as it helps to study whole objective of the project and then also uncover all the strength and weakness of the project so that we can easily go through the details to make the project more efficient and reliable.

8 0
2 years ago
A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu
Butoxors [25]

Apply encryption to VM files the following steps should be taken to secure the VMs so no user can copy or delete another user's VM files

f. Apply encryption to VM files.

b. secure the VM files with permissions

<u>Explanation:</u>

Installing anti-malware is a must on each VM OS OR Host OS to protect both servers and hosted workstations.

Scheduling update OS patches and anti-malware and scanning server or host operation are also must.

Securing VM files as best practices better to encrypt and decrypt is the best method or best practices.

Even protected VM files sometimes can be hacked and damaged the VM files.

VM is a virtual machine technology is used in windows 10. Before login decrypts the VM and connects to virtual machines. On disconnected encrypted is safer.

5 0
2 years ago
If you're found to be at fault in _____, your driver license will be canceled within 90 days unless you complete a 12-hour Advan
Viktor [21]

<u>Answer:</u>

<em>D. three crashes within three years.</em>

<u>Explanation:</u>

Rules differ from Country to Country. <em>In United States Of America, the traffic rules are so strict and the process of License</em> is followed strictly and people who are violating rules gets a penalty or punishment in such a way that it changes their <em>mindset to follow the traffic rules strictly.</em>

All these are done to <em>safe guard people, avoid injuries and sudden loss of death due to accidents.</em>

So if a driver has done three crashes within <em>36 months of time, then the driver license is likely to get cancelled within 90 days.</em>

<em>In order to avoid this it is necessary for the driver to appear for improvement course of driving and appear for the test once again.</em>

5 0
2 years ago
Read 2 more answers
Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the compu
Svetllana [295]

Answer:

SATA Cable

Explanation:

SATA (Serial Advanced Technology Attachment) Cable is a connection made between Computer hard drives and the motherboard. When a computer gives an error on startup that OS not found, there's a possibility that the drive containing the OS is not well connected to the motherboard. Making sure it is well connected to the motherboard will possibly fix the issue.

6 0
2 years ago
In three to five sentences, describe how you can organize written information logically and sequentially
gogolik [260]

I’d organize my writing by using the five paragraph method and set it up in a chronological order. I’d begin with an introduction. An introduction will make the reader understand the topic and what I am going to be talking about in the body paragraph. An introduction has the hook which draws the reader with good and interesting sentences. There is also the bridge and then there is the thesis statement that will explain my main points. Next is to write the body paragraph. This will explain the points in the intro in more depth so that the reader can better understand what is going on. Lastly there is the conclusion, which reviews will review my main point again and summarize all of my points.

5 0
2 years ago
Other questions:
  • Which selections are possible for controlling the start time of audio playback? Check all that apply. Automatic Rewind when done
    10·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
    10·2 answers
  • Explain the following instructions: ADD 3000, 1050, 1900.
    12·1 answer
  • The OSI security architecture provides a systematic framework for defining security attacks, mechanisms, and services. True or F
    12·1 answer
  • 1. Show that the three security services-confidentiality, integrity, and availabilty- are sufficient to deal with the threats of
    10·1 answer
  • Three variables , x, y and z, supposedly hold strings of digits, suitable for converting to integers. Write code that converts t
    9·2 answers
  • When should a developer begin thinking about scalability? 1 during the design phase 2during testing 3when traffic increases by 2
    14·1 answer
  • Write a method called printRangeOfNumbers that accepts a minimum, maximum numbers as parameters and prints each number from mini
    6·1 answer
  • In this exercise you will debug the code which has been provided in the starter file. The code is intended to take two strings,
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!