menu
Qamnty
Login
Register
My account
Edit my Profile
Private messages
My favorites
Answer four (4) questions from this section 1. What is a browser? b. Give three examples of browsers. List five uses of browsers. Differentiate between a webpage and a website.<…
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Answer four (4) questions from this section 1. What is a browser? b. Give three examples of browsers. List five uses of browsers. Differentiate between a webpage and a website.<…
asked
Aug 26, 2024
180k
views
2
votes
Answer four (4) questions from this section
1. What is a browser?
b. Give three examples of browsers.
List five uses of browsers.
Differentiate between a webpage and a website.
Computers & Tech
college
Matin H
asked
by
Matin H
9.1k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
4
votes
Answer:
See my comment, couldn't post it here because of "Innapropritate words".
Andrew Hershberger
answered
Aug 30, 2024
by
Andrew Hershberger
8.1k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Jul 11, 2022
230k
views
You are embedding a video in your Webpage. What three formats should you specify in the source element to ensure that most browsers and devices can access your video? a b MP4, MP3 and Wav WebM, Ogg and
David LeBauer
asked
Jul 11, 2022
by
David LeBauer
7.7k
points
Computers & Tech
high-school
1
answer
3
votes
230k
views
asked
Jul 19, 2024
103k
views
What is it called when unsuspecting users visit an infected website and their browsers download code that targets a vulnerability in the user's browser? Option 1: Drive-By Download. Option 2: Phishing.
ZeWaren
asked
Jul 19, 2024
by
ZeWaren
8.5k
points
Computers & Tech
high-school
1
answer
1
vote
103k
views
asked
Sep 22, 2024
69.2k
views
what is it called when unsuspecting users visit an infected website and their browsers download code that targets a vulnerability in the user's browser?
Daniel Teply
asked
Sep 22, 2024
by
Daniel Teply
7.7k
points
Computers & Tech
high-school
1
answer
0
votes
69.2k
views
Ask a Question
Welcome to Qamnty — a place to ask, share, and grow together. Join our community and get real answers from real people.
Categories
All categories
Mathematics
(3.7m)
History
(955k)
English
(903k)
Biology
(716k)
Chemistry
(440k)
Physics
(405k)
Social Studies
(564k)
Advanced Placement
(27.5k)
SAT
(19.1k)
Geography
(146k)
Health
(283k)
Arts
(107k)
Business
(468k)
Computers & Tech
(195k)
French
(33.9k)
German
(4.9k)
Spanish
(174k)
Medicine
(125k)
Law
(53.4k)
Engineering
(74.2k)
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qamnty