What is the use of form in HTML​

Answers

Answer 1
Answer:

Answer:

to make the internet faster

Explanation:

becuase it will have a faster act on the computer so the computer could process the information for it later to be used


Related Questions

g Write a line of code to invoke a function named RandNum, which accepts no parameters, and storing the return value in a variable called num (which has already been defined). Separate each item with 1 space (except around the parentheses), and end the line with a semi-colon.
The Spanning Tree Protocol operates at the Network layer of the OSI model.TrueFalse
NMCI is the name used for a large-scale effort to link Navy and Marine Corps computer systems on bases, boats, and in offices around the world. When completed, this internal WAN will use Internet technology to link soldiers in the field with support personnel on bases, etc. NMCI is an example of a(n):
Write a loop that counts the number of space characters in a string. Recall that the space character is represented as ' '.
99 POINTS HELP ASAP PLEASE!!!Select the mathematical statement that is true. A.22 % 2 > −3 B.22 % 2 < 5 C.22 % 2 == 4 D.22 % 2 != 1This is for my python coding class thank you

Write a python program to calculate and print the electric bill for Ethiopian Electricity Corporation. (consumer name meter number(mno),last month reading(Imr)and current month reading(cmr) of 50 customers and calculate the net bill amounts as follows: Number of unit(Nou)=cmr-lmr If Nou200 then bill =Nou*2 tax=bill*0.15 netbill=bill+tax Print all the details in the bill for all customers​

Answers

The electric bill program illustrates the use of loops (i.e. iteration)

Loops are used to execute repetitive operations

The electric bill program in Python where comments are used to explain each line is as follows:

#This iteration shows that the process is repeated for 50 consumers

for i in range(50):

   #This gets input for the consumer name meter number

   mno = input("Consumer name meter number: ")

   #This gets input for last month reading

   lmr = int(input("Last month reading: "))

   #This gets input for current month reading

   cmr = int(input("Current month reading: "))

   #This calculates the number of units

   Nou = cmr - lmr

   #This calculates the bills

   bill = Nou*2

   #This calculates the tax

   tax = bill*0.15

   #This calculates the netbills

   netbill = bill+tax

   #This next four lines print the electric bills

   print("Number of units:",Nou)

   print("Bills:",bill)

   print("Tax:",tax)

   print("Netbill:",netbill)

Read more about loops at:

brainly.com/question/19344465

Travis and Craig are both standard users on the network. Each user has a folder on the network server that only they can access. Recently, Travis has been able to access Craig's folder.This situation indicates which of the following has occurred?

Answers

C. A misconfiguredaccess control. The fact that Travis is able to access Craig's folder indicates that the access control has been misconfigured, allowing Travis to gain access to datahe is not authorized to view.

Misconfigured Access Control Breach on Network Server

This situation indicates that a misconfigured access control has occurred. It appears that Travis has been granted access to Craig's folder, which he should not have access to. This misconfiguration of the access controlsettings may have been an accidental or intentional action taken by someone with the necessary permissions.

Regardless of the cause, this misconfiguration has enabled Travis to access Craig's data, which is a serious security breach and needs to be addressed immediately. The proper security protocols need to be put in place to ensure that only authorized users can access the necessary data and to prevent any further breaches of security.

Since the question isn't complete, here's the full task:

Travis and Craig are both standard users on the network. Each user has a folder on the network server that only they can access. Recently, Travis has been able to access Craig's folder.

This situation indicates which of the following has occurred?

Choose the right option:

  • A. A data breach
  • B. An intrusion
  • C. A misconfigured access control
  • D. An unauthorized user login

Learn more about Network: brainly.com/question/8118353

#SPJ4

_________ help(s) prevent a person from being a single point of failure.

Answers

Answer:

Internet access

Explanation:

Answer:

The correct word for the blank space is: Access controls.

Explanation:

Access controls regulate who has access to sensitive information in a company. Access controls can be physical -grant access to data centers, restricted rooms or buildings- and virtual -grant access to servers, networks or certain types of files or data.

The utilization of a subset of the performance equation as a performance metric is a pitfall. To illustrate this, assume the following two processors. P1 has a clock rate of 4 GHz, average CPI of 0.9, and requires the execution of 5.0E9 instructions. P2 has a clock rate of 3 GHz, an average CPI of 0.75, and requi res the execution of 1.0E9 instructions. One usual fallacy is to consider the computer with the largest clock rate as having the largest performance. Check if this is true for P1 and P2.

Answers

Answer:

Given Data:

Clock rate of P1 = 4 GHz

Clock rate of P2 = 3 GHz

Average CPI of P1 = 0.9

Number of Instructions = 5.0E9 =  5 × 10^9

Clock rate of P2 = 3 GHz

Average CPI of P2 = 0.75

Number of Instructions = 1.0E9 = 10^9

To find: If the computer with largest clock rate has the largest performance?

Explanation:

Solution:

As given in the question, clock rate of P1 = 4 GHz which is greater than clock rate of P2 = 3 GHz

According to the performance equation:

CPU Time = instruction count * average cycles per instruction/ clock rate

CPU Time = I * CPI / clock rate

Where instruction count refers to the number of instructions.

Performance of P1:

CPU Time (P1) = 5 * 10^9 * 0.9 / (4 * 10^9)

                        = 5000000000 * 0.9 / 4000000000

                        = 4500000000 / 4000000000

                        =  1.125s

Performance of P2:

CPU Time (P2) = 10^9 * 0.75/ (3 * 10^9)

                        = 750000000 / 3000000000

                        = 0.25s

So the Performance of P2 is larger than that of P1,

                          performance (P2) > performance (P1)

                                         0.25 is better than 1.125

But clock rate of P1 was larger than P2

                             clock rate of P1 > clock rate of P2

                                                  4 GHz > 3 GHz

So this is a misconception about P1 and P2.

It is not true that computer with the largest clock rate as having the largest performance.

A _____, or spider, is a search engine program that automatically searches the web to find new websites and update information about old websites. ​a.
​crab

b.
web ​robot

c.
​database

d.
​runner

Answers

Answer: B) Web robot

Explanation:

Web robot or spider is the search engine program which automatically visit the new web site and update the information. Basically, it is the internet bot that helps in store the information from the search engine to the index.

Spider searches the web site and read the information in their given page for creating the entries from search engine.

Web robot is also known as web crawler, this type of programs are use by different search engine that automatically download and update the web content on web sites.  

How do you suppose the Anagram Server works?

Answers

Answer:

 The anagram is the type of word and phase that are formed by the rearranging the another letter with the word and phase.

The anagram is the type of network server that produce the anagram and it is use as the code and pseudonyms.

If the anagram is create by someone then, the person is known as anagrammatist. Its main goal is to produce the anagram which reflect on their particular subject. The anagram word can also be represented or rearranged into the nag a ram.