All of the following are standards that enable programs to receive data from and display data to a variety of mobile and desktop devices except ________. Group of answer choices CSS 3 html5 javascript SOA AOL

Answers

Answer 1

Answer:

AOL

Explanation:

Some of the standards that enable programs to receive data from and display data to a variety of mobile and desktop devices includes;

I. CSS 3: it is a framework used for providing various styles used in web design.

II. HTML 5: this is a hypertext markup language used for creating web pages or website.

III. Javascript: it is a software framework that allows software components to send and receive data through a database.

IV. Service oriented architecture (SOA): this is an architectural pattern which allows various software application components to provide specific services to other applications through a network.

All of the following standards listed above enable programs to receive data from and display data to a variety of mobile and desktop devices except AOL. AOL is an acronym for American Online and it is typically used for providing internet connection through a dial-up.

Answer 2

All of the following are standards that enable programs to receive data from and display data to a variety of mobile and desktop devices except AOL.

The following information should be considered:

AOL means America Online .CSS3 is Cascading Style Sheet this standard represent the look and formatting of a document HTML5 is markup language .Javascript is Scripting language for WWW .SOA is Service Oriented Architecture this is type of standards provide service to the application component via communication protocol in network.

Learn more: brainly.com/question/17429689


Related Questions

Write a program that assigns a value the value of 50000 to an integer variable x, assigns the value of x*x to an integer variable y, and then prints out the value of y.

Answers

Answer:

Explanation:

The following code is written in Java and does exactly what the question asks. The variables are long variables instead of integers because integer variables can only be a maximum of 2147483647 and the product of these two variables is much higher than that.

public static void main(String args[]) {

               long x = 50000;

               long y = x * x;

               System.out.println(y);

       }

Search for articles describing front end and back end design of any application (example, a website). Summarize the concepts and elements for each one. Does the database that holds all the data exist at the front end or the back end

Answers

Answer:

No, the database is a back-end utility.

Explanation:

A webpage is a page of a website. The website is the collection of internet pages addressing particular information or service. There are two sides of web development, that is the front-end and back-end web development.

The front-end is the part of a website that interacts or is seen by the user of the website. The back-end developer scripts it to connect the server, route the webpages and communicate the data in the database.

what is the full form of ARPANet, WAN,FTP,DCP,HTML,ISP and last WWW​

Answers

Advanced Research Projects Agency Network,

wide area network

File Transfer Protocol

?

Hypertext Markup Language

Internet service provider

world wide web

ARPANET — Advanced Research Projects Agency Network

WAN — Wide Area Network

FTP — File Transfer Protocol

DCP — Diploma Computer Programming

HTML — Hyper Text Markup Language

ISP — Internet Service Provider

www — World Wide Web

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️

In the program below, which variable has the same scope as strA?

def usernameMaker (strFirst, strLast):
return strFirst + strLast[0]

def passwordMaker (strA, numC):
if len(strA) > 4:
answer = dogName[0:3]
return answer + str(numC)
else:
return 'xk&' + str(numC)

Answers

Answer:

" numC " is the correct answer

Explanation:

The reason is that on line 3 of code it has "def passwordMaker (strA, numC):"

strA and numC are both in "( )" which is the scope and only things inside are varibles. Also its the only line that has  strA in it.

The scope of a variable is the extent at which the variable can be referenced.

The variable with the same scope as strA is variable numC

From the program, we have the following function definition

def passwordMaker (strA, numC):

Variables strA and numC are declared along with the function passwordMaker

This means that:

Variables strA and numC have the same scope

Hence, the variable with the same scope as strA is variable numC

Read more about scopes of variables at:

https://brainly.com/question/17102008

What is the main advantage that a website builder offers for web development?

OA. It enables people with no coding skills to create websites.
OB. It allows developers to debug the code on your website.
OC. It allows developers to adjust the finer details more easily than an IDE does.
OD. It provides tools such as a resource manager and interpreter.

Answers

The correct answer is: OA. It enables people with no coding skills to create websites.

Answer: A

It enables people with no coding skills to create websites.

Explanation:

i want to touch it but if i talked about the past , it would be i wanted to touch it or i wanted to touched it?​

Answers

Answer:

I wanted to touch it

Explanation:

since you put the setting in the past you can use present verbs because we already know it's something that already happened

Variable X is a *
Public Class Form)
Sub Example 10 Handles MyBase.load
Dim X As Integer
X = 10
MsgBox("The value of X is "& X)
End Sub

Answers

Answer:

Variable X is a local variable.

Explanation:

X exists only inside the sub.

A coworker just sent you a presentation to review. You noticed that she used different types of transitions on the same slide, and the animations and videos were distracting from the topic. Give your coworker advice about guidelines she can follow when using animation, transitions, and multimedia. Be sure to include at least four guidelines

Answers

Answer:

The transitions presented should either be different on each slide or the same type but only one on each slide shown. Pictures and videos shouldnt be included a lot. At least two photos or one on each slide, while videos should only be one on the very last slide.

Explanation:

Sarah used a grid to create this layout for a website. Which rule of composition did Sarah use for the grid?



A.
unity
B.
rule of thirds
C.
contrast
D.
rhythm

Answers

Answer:

B rule of thirds

Explanation:

Answer:

a

Explanation:

Sam is conducting research for a school project on the American Revolution. Which of the following kinds of software will help with research notes? music editing software word processing software presentation software spreadsheets

Answers

Answer:

Students analyze the techniques that make for good storytelling I think. :}

Explanation:

[] Hello ! []

Answer:

B. Word Processing Software

Explanation:

I hope it helped! :]

A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text. (230)Group of answer choices

Answers

Answer:

The appropriate response will be "Public key".

Explanation:

A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms. Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.

As per the scenario, a Public key would be the set of such characters.

A public key would have been generated using cryptographic protocols or the techniques, which contains asymmetric keyword encrypted methods.These very same keys were being used to convert a memorandum or manuscript to such an unintelligible state. Decryption has always been accomplished solely through the use of a completely separate, but associated, highly classified address and otherwise key.

Thus the above response is correct.

Learn more:

https://brainly.com/question/20709892

What is Code?
A) Rules of conduct
B) One or more commands designed to be carried out by a computer.
C) A pack between friends.
D) Edoc spelled backwords.

Answers

Answer:

In a class of statistics course, there are 50 students, of which 15 students  scored B, 25 students scored C and 10 students scored F. If a student is chosen at random from the class, what is the probability of scoring

not F?

Explanation:

Answer:

its b it's like opening multiple tabs

. A Worker in Microworkers can also be an Employe

Answers

Answer:

A Worker in Microworkers can also be an Employer: After reaching $25 in earnings. After placing an initial deposit of $10, and launching a valid campaign. If success rate is maintained at 75% before launching a campaign. After creating a separate Employer account.

Explanation:

A customer connects to your business network. The customer uses a packet sniffer to intercept network traffic in an attempt to find confidential information. This is an example of which type of attack

Answers

Answer:

Self Attack

Explanation:

I pick self attack because the person is trying to harm you.

Which ad extensions can serve automatically?

Answers

Answer:

Sitelink, structured snippets, and callout.

Explanation:

Those 3 are the 3 main ad extensions that can serve automatically. I learned this on Monday.  

What is a feature of Print Preview?

Fit to Document
Fit to Margin
Fit to Page
Fit to Size

Answers

fit to page i believe

Answer:c

Explanation:

Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate

Answers

Answer:

Z-Wave

Explanation:

Z-WAVE can be seen as a protocol which enables home automation and home security to take place because with home automation home appliances as well as lighting , sound systems among others can be smoothly control and monitor.

Secondly Z-WAVE make uses of mesh network, allow appliances to smoothly and successful communicate with each other.

Lastly Z-WAVE which is a wireless protocols make use of data transfer rate that is low.

Therefore Z-WAVE is important because it enables wireless monitoring of home appliances to take place in a smart home.

Leo needs to consolidate data in multiple worksheets by performing a calculation across all worksheets on the same cells.
Which feature should he use to perform this task?
A) data consolidation
B) 3-D reference
C) grouped cells
D) linked cells

Answers

A do you think is the answer

Answer:

3-D reference

Explanation:

Edge 2022

How can you reboot a laptop?
How do you get an upgrade for a tower?
Lastly, How do u get a Virus Protection.

Answers

Question: How can you reboot a laptop?

Answer: Rebooting a computer simply means to restart it. If you're using Microsoft Windows, you can click the "Start Menu," click the "Power" button and click "Restart" in the submenu to restart your computer. If you still have problems with the computer, you can also choose the "Shut Down" option in the "Power" submenu to turn the computer off altogether, let it sit for a bit and then turn it back on.

Question: How do you get an upgrade for a tower?

Answer: You can upgrade your existing Tower installation to the latest version easily. Tower looks for existing configuration files and recognizes when an upgrade should be performed instead of an installation. As with installation, the upgrade process requires that the Tower server be able to access the Internet. The upgrade process takes roughly the same amount of time as a Tower installation, plus any time needed for data migration. This upgrade procedure assumes that you have a working installation of Ansible and Tower.

Question: How do you get a Virus Protection?

Answer: Use an antimalware app - Installing an antimalware app and keeping it up to date can help defend your PC against viruses and other malware (malicious software). Antimalware apps scan for viruses, spyware, and other malware trying to get into your email, operating system, or files.

Hope this helps! :)

Write a function max_magnitude() with two integer input parameters that returns the largest magnitude value. Use the function in a program that takes two integer inputs, and outputs the largest magnitude value. Ex: If the inputs are: 5 7 the function returns: 7 Ex: If the inputs are: -8 -2 the function returns: -8 Note: The function does not just return the largest value, which for -8 -2 would be -2. Though not necessary, you may use the built-in absolute value function to determine the max magnitude, but you must still output the input number (Ex: Output -8, not 8). Your program must define and call the following function:

Answers

Answer:

The question is answered in python

def max_magnitude(a,b):

   if abs(a) > abs(b):

       return a

   else:

       return b

       

num1 = int(input("Num 1: "))

num2 = int(input("Num 2: "))

print(max_magnitude(num1,num2))

Explanation:

This question is answered using the concept of absolute value to get the integer with the highest magnitude

First, the function is defined with integer parameters a and b

def max_magnitude(a,b):

This checks if a has the highest magnitude

   if abs(a) > abs(b):

If true, it returns a

       return a

If otherwise, it returns b

   else:

       return b

       

The main starts here

The next two lines prompt the user for inputs

num1 = int(input("Num 1: "))

num2 = int(input("Num 2: "))

This calls the function

print(max_magnitude(num1,num2))

Plz help me

What is a challenge in wild animal photography?


A. They are easy to close to


B. They don’t move much


C. You can’t position them


D. All of the above

Answers

Answer: C
Explanation: You cannot just go up to a wild animal and make it move to wherever you want it to be. In other words, you cannot manipulate nature.

Answer:

C. You can’t position them for K12

running away from home

Answers

Answer:

wait what?

Explanation:

Well heads up

Be careful theres guys and woman to take advange of you so stay careful

Human trafficking is such a horrible thing :C

why ROM is called non volatila Memory?​

Answers

Answer:

Explanation:

ROMs that are read only memory are called non volatile because all of the data that are inside it happens to not get erased after shutting down the system or computer and starting it all over again. The opposite is this phenomenon is RAM. In RAM, they are being called volatile because all of the data that are inside it happens to get erased once shutting down of the system or computer occurs and it is being restarted.

This is telling us that ROM irrespective, stores data while it is on and also while it is off, it doesn't matter. It never forgets data, unless of course, in a situation whereby it is erased.

Volatile memory stores data as long as it is powered. ROM, which stands for read-only memory, is called non-volatile memory because of they do not lose memory when power is removed. Data stored in ROM cannot be electronically modified after the manufacture of the memory device.

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️

Write a Java statement that declares and creates an array of Strings named Breeds. Your array should be large enough to hold the names of 100 dog breeds.

Answers

Answer: String[]Breeds = new String[100]

second question today 25 POINTS: What is the formula to balance a lever when both effort and resistance are present?

Answers

Answer:

To find the MA of a lever, divide the output force by the input force, or divide the length of the resistance arm by the length of the effort arm. In a first-class lever the fulcrum is located at some point between the effort and resistance forces.

Explanation:

Put these events in the order in which they occurred,
starting with the earliest.

b
Germany prepares for an imminent attack on the island of
Sardinia.



Spanish officials pass off the information in the briefcase to
German agents.

Local fisherman recover the body of Major Martin off the coast
of Spain

Major Martin's name appears on a casualty list in a British
newspaper

Answers

Answer:

Local fisherman recover the body of Major Martin off the coast  of Spain .Spanish officials pass off the information in the briefcase to  German agents.Major Martin's name appears on a casualty list in a British  newspaper.Germany prepares for an imminent attack on the island of  Sardinia.

Explanation:

This above is the order in which Operation Mincemeat was executed in WW2 to deceive the Germans into believing that the Allies were going to invade the Balkans directly instead of Sicily which was their actual target.

The plan involved a fictitious Major Martin who had secret documents about the Allied invasion of the Balkans. After the body was released from a British submarine, it washed up in Spain where it was found by local fishermen.

Spanish officials then passed the information in the briefcase Major Martin had to German intelligence. To further reinforce the ruse, the British published Major Martin's name in a casualty list.

The Germans were thoroughly convinced and switched forces from Sicily for the defence of the Balkans and the island of Sicily.

Write a class called Date that represents a date consisting of a day, month, and year. A date object should have the following methods: public Date(int day, int month, int year) -- Constructs a new Date object to represent the given date public int getDay() -- returns the day value of this date public int getMonth() -- returns the month value of this date public int getYear() -- returns the year value of this date public void addDays(int days) -- Moves the Date object forward in time by the given number of days public int daysTo(Date other) -- Returns the number of days between this Date and the other Date public boolean isLeapYear() -- Returns true if the year of this Date is a leap year. A leap year occurs when the value of the year is divisible by 4, except when it is divisible by 100 and not 400 (so 1700, 1800, and 1900 are not leap years) public String toString() -- returns a String representation of this date in the form day/month/year Write a program in which to test your class. This program should prompt the user to enter the days, months, and years of two separate dates, and then print out the number of days between these two dates.

Answers

Answer:

No

Explanation:

Because it's years and its also very public

1.4 Assume the source port number used by the above browser is 5100. Now a second browser is opened on the client also wants to request the same webpage. Does the second browser use the same source port number of 5100? Why? What is the destination port number?

Answers

Answer:

100000001

Explanation:

A website that sells computer hardware to large organizations --> .com. A website operated by the state of California --> .gov. The website of the US Coast Guard --> .mil. The website of a group of individuals who work toward protecting gray wolves --> .org

What is the government website?

The government website is the official US government website and is used for a domain name that is based on the word government. It is administrated by the cyber security and infrastructure security agency.

It is sponsored top level domain and only the US government is federal govt uses such websites.a website that sells computer hardware to large organizations a website operated by the state of California.

The website of the US Coast Guard the website of a group of individuals who work toward protecting gray wolves. a website that sells computer hardware to large organizations a website operated by the state of California.

Therefore, A website that sells computer hardware to large organizations --> .com. A website operated by the state of California --> .gov. The website of the US Coast Guard --> .mil. The website of a group of individuals who work toward protecting gray wolves --> .org

Find out more information about the driver's license on:

brainly.com/question/13112961

#SPJ2

Your manager has asked you to write a program that displays the percentage of males and female in your class. The program should prompt the user to enter the number of males and females and display the results.

Answers

Explanation:

The program using python programming language would be:

First, we write the Input prompt.

Input  prompt for the user

number_of_males_in_class = int (input ('Enter the number of males: '))

number_of_females_in_class = int(input('Enter the number of females: '))

Next, we write the Process algorithm.

Process  algorithm

total_number_of_students_in_class = number_of_females_in_class + number_of_males

_in_class

percentage_of_males_in_class = number_of_males_in_class / total_number_of_students

_in_class

percentage_of_females_in_class = number_of_females / total_number_of_students

Finally, the Output process

Output process

print('Total number of males in class =', format(percentage_of_males_in_class, '.0%'))

print('Total number of females =', format(percentage_of_females_in_class, '.0%'))

What two solutions address lack of human access to clean water

Answers

Answer:

THREE strategies which local municipality is implementing in addressing the issue of lack of clean water caused by human factors include:

1) Increasing the amount of tax for those companies which are opening their wastes into water sources which can help built better water cleaning and recycle system.

2) Tree plantation is another strategy to help secure the water sources and naturally keep cleaning it.

3) Running awareness campaigns for general people to keep the water sources clean as well as use the only amount of water which they need and not waste it.

Explanation:

i hope this helps you

Other Questions
Logic is the language of the conscious mind, emotion is the language of the unconscious mind.agree.....(why) disagree.....(why) Hello! Im doing a reading response journal and I was wondering if this quote from The Giver could be considered an idiom, It jumps out of my hand onto the ground... I would like this to be answered quickly but I have the rest of the day so Im not in a huge rush, thank you! Write an equation in slope-intercept form for the line that passes through the given point and is perpendicular to the graph of the given equation: (-3,-2) y=x+2 When 2.00 g of silver nitrate and 2.50 g of sodium sulfide in different solutions combine to react, 1.25 g of precipitate are collected. * The text box will not allow you to use subscript. If you want to type the chemical formula for iron(III) sulfate, Fe2(SO4)3, it will need to be typed as Fe2(SO4)3. Remember that the symbol for iron, Fe, is not "fe" or "FE." Do not include the state of matter for each formula. What is the chemical formula* for the product? Remember that spectator ions do not form a product in solutions. What is the theoretical yield, in gram(s) for the solid product? What is the chemical formula for the limiting reagent? What is the chemical formula for the excess reagent? What is the percent yield for the reaction? How many gram(s) of the excess reagent is/are left over? Find the value of x in the parallelogram. whats the answeer giving brainliest A helicopter is flying from Hong Kong to Jakarta. The latitude of Jakarta is -6.20, and its longitude is 106.80. The latitude of Hong Kong is 22.27, and its longitude is 114.15. What is the helicopters net change in latitude and longitude as it travels from Hong Kong to Jakarta?A.-28.47 latitude and 7.35 longitudeB.-28.47 latitude and -7.35 longitudeC.28.47 latitude and -7.35 longitudeD.38.34 latitude and 220.95 longitudeE.-38.34 latitude and 220.95 longitude Euglena will most likely act as consumers when placed in an environment that has DON'T ANSWER THIS CAUSE I NEED THIS ONE PERSON TO GET THIS! IT IS POINTS FOR THEM AND WE ALSO NEED TO DISCUSS STUFF! What are three factors that contribute to the way music has developed in different parts of the world? Only that one though The solution of 4(x + 1) = 4(2 x) Assume that the readings at freezing on a bundle of thermometers are normally distributed with a mean of 0C and a standard deviation of 1.00C. A single thermometer is randomly selected and tested. Find the probability of obtaining a reading greater than -2.674C.P ( Z > 2.674) = ??? The City of emberwhy did Lina have hanging up all over her room?what did Lina think of her new job after her first few messages assignments?what was her message to the mayor?how did the city of Amber keep track of hours and time with no son to guard them?what did Lina do at the gathering Hall that could have cost her her job? Henry's potato vine is growing like crazy! When he planted it, it was 2 inches long. Two weeks later it was 5 inches long. At 6 weeks, it was 11 inches long. 19. The numerator of a fraction is 1 less than the denominator.When both numerator and denominator are increased by 2,the fraction is increased by 1/12Find the original fraction. At a day care center a researcher asks children to list their five favorite toys from most favorite to least favorite. What level of measurement is represented in this example The lifespan of a guinea pig is 6 years less than that of a giraffe. The lifespan of a tiger is 4 times that of the guinea pig. If the total lifespan of the animals is 30 years, calculate the longevity for the giraffe. An increase in the price of Ford trucks will likely cause _______because the products arein the demand for Chevy trucks because the products are ______O A increase; complementsO B. decrease; substitutesC. decrease; complementsD. increase; substitutes what is a computer ? What is 2/5 3 and 1/10