answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scZoUnD [109]
2 years ago
3

if andres needs to make sure all the elements of his web page are connected, he is considering the _____ of the page​

Computers and Technology
1 answer:
Volgvan2 years ago
6 0

Answer:

Alignment

Explanation:

Alignment is the answer

You might be interested in
Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
lara [203]
Hello <span>Pouerietzach


Question: </span><span>Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
</span><span>
Answer: A, B, D, E, G

Hope That Helps
-Chris</span>
5 0
2 years ago
Read 2 more answers
A school librarian has been asked to identify inappropriate Internet usage. Which students would most likely be reported to the
adoni [48]

Answer:

a student who researches various websites that show how to gamble online

a student who visits a special website with step-by-step directions on how to make a bomb

a student who posts jokes online about the cultural heritage of other students

Explanation: These are all most likely against school policy. In fact attempting to make a bomb is illegal.

5 0
2 years ago
Read 2 more answers
When does the narrator of "EPIC 2015" say the "road to 2015" began?
Zigmanuir [339]

Answer:

The answer is "In the late 20th century"

Explanation:  

EPIC 2015 is a short movie released in 2005 by Robin Sloan and Matt Thompson, In this film, there are some forecasts for 2015, which are very tech. In 2008, Google and Amazon were added as an alternate timeline, together with the frightfully "Google."

  • This film is also known as Animated Flash video because in this film there is full use of animation.
  • In this film, the narrator tells about "road to 2015", in the late 20 century.

8 0
2 years ago
Read 2 more answers
A layer 2 switch is used to switch incoming frames from a 1000base-t port to a port connected to a 100base-t network. which meth
fredd [130]
<span>Shared memory buffering would work best. This would give the ports the best allocation of resources, using only those that are the most active and best allocated for the size of the frames being transmitted in the current traffic. In addition, any port can store these frames, instead of being specifically allocated as per other types of memory buffering.</span>
7 0
2 years ago
A hidden backlog contains the projects that the IT department is not aware of because of low feasibility.
Finger [1]

Answer: True

Explanation:

Yes, the given statement is true that the due to the very low feasibility the IT (Information technology) department are not aware of the hidden backlog that basically contain projects.

The feasibility is the main factor in the IT department as it helps to study whole objective of the project and then also uncover all the strength and weakness of the project so that we can easily go through the details to make the project more efficient and reliable.

8 0
2 years ago
Other questions:
  • Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a
    6·1 answer
  • Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
    8·1 answer
  • Explain the following instructions: ADD 3000, 1050, 1900.
    12·1 answer
  • Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds o
    15·2 answers
  • While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes
    7·1 answer
  • ________ is a free online service that enables a user to contact a cell phone number to hear who answers the telephone without i
    5·1 answer
  • What is the name of the program file that you can enter in the Windows search or Run box to execute Event Viewer? What process i
    12·1 answer
  • We have an internal webserver, used only for testing purposes, at IP address 5.6.7.8 on our internal corporate network. The pack
    15·1 answer
  • Design an application for Bob's E-Z Loans. The application accepts a client's loan amount and monthly payment amount. Output the
    8·1 answer
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? a) T
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!