Answer:
a tag is a way of representing an HTML element in the program, while an attribute is a way of describing the characteristics of an HTML element.
Explanation:
Answer:
A tag is a way of representing an HTML element in the program, while an attribute is a way of describing the characteristics of an HTML element.
Complete the following sentence by choosing the best answer from the options listed below.
Hardware refers to the _________________ of a computer.
physical components
programming instructions
information processing cycle
short-term memory
Answer:
Physical components
Explanation:
hope it helps
Answer:
A. physical components
Explanation:
During a slide show, Luis wants a picture to appear on one of his slides after the slide appears on the screen. Which type of animation should he use
The type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.
What is an Entrance Animation?An entrance animation is an effect that controls how an object appears on a slide, starting at the start point of the object.
For example, using the entrance animation, Luis can make the object move slowly into the slide using a float-in effect.
Thus, the type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.
Learn more about entrance animation on:
https://brainly.com/question/20082198
What are two advantages and disadvantages of using computer software?
Answer:
Advantages:
Multitasking
Multitasking is one among the main advantage of computer. Person can do multiple task, multiple operation at a same time, calculate numerical problems within few seconds. Computer can perform millions or trillions of work in one second.
Speed –
Speed –Now computer isn’t just a calculating device. Now a day’s computer has vital role in human life. One of the most advantages of computer is its incredible speed, which helps human to finish their task in few seconds.
Disadvantages:
Virus and hacking attacks –
Virus and hacking attacks –Virus may be a worm and hacking is just an unauthorized access over computer for a few illicit purpose. Virus can go to other system from email attachment, viewing an infected website advertisement, through removable device like USB etc.
Online Cyber Crimes –
Online Cyber Crimes –Online cyber-crime means computer and network may have utilized in order to commit crime. Cyberstalking and fraud are the points which comes under online cyber-crimes.
Identify the correct wireless technology from the drop-down menus.
A manager is in charge of 30 retail associates. Some of her duties include scheduling and keeping an updated list of each associate's information for payroll processing. She uses a wireless device to do these tasks. Her boss has offered her an upgraded wireless device that can also make phone calls, send text messages, and even access the Internet. She agrees this will make her job much easier, especially because she cannot always access her e-mail from the store's desktop computer. She has to be on the sales floor to make sure everything is running smoothly.
----------------------------------------------------------------------------------------------------------------------------
Which wireless device does the manager most likely have before being offered the upgrade by her supervisor? ()
Which wireless device is the supervisor most likely offering to the manager as an upgrade? ()
Which wireless device, if offered, would the manager probably find cumbersome if she needs to have her hands free to move about the sales floor? ()
Answer:
PDA, SMARTPHONE, LAPTOP COMPUTER
Explanation:
i just took this.
15-Points answer quickly please. Select the correct answer. How can you make a search phrase more effective?
A. by framing it as a question
B. by using more specific search terms
C. by using a different search engine
D. by using all the search terms you can think of
4. How can a document's organization help us better understand the document's purpose?
Answer:
a document organization can help because it's organized and easy to read on a document.
What is the term for when software is installed on a computer without authorization and encrypts files and demands payments in bitcoin before the password to encrypt the files will be provided?.
Please help me with this.
Answer:
2 3/4
Explanation:
its 2 6/8 and divide that by 2 to simplify its 2 3/4
!!GIVING 100 POINTS AND BRAINIEST T IF YOU HELP IMMEDIATELY!!
Cameron oversees inventory tracking in her school store. Which feature in a database allows her to organize the items from highest to lowest price?
Graph
Filter
Search
Sort
Sort allows Cameron to sort the data lowest to highest price or highest to lowest.
search = find a specific data input.
filter = remove and find specific data inputs.
graph = to display every database data on a graph and compare.
Answer:
sort
Explanation:
She needs to sort out the items The order is from highest to lowest.So the sort feature is best help for her1. What projects would Excel best be used for?
Please be sure to say the name of the project(s) and how you would go about creating it.
Answer:
Charting, inventory tracking, accounting and calculating
Explanation:
im assuming you are writing the response instead of a multiple choice.
hope this helps :D
4 brainly
What do Web designers do? *
What's the difference between web design and web development? *
How many types of web design are there? *
Is Web Design graphic design
What are the 3 types of websites? *
Define a function below, posodd_number_filter, which takes a single numerical argument. Complete the function to return accepted if the input is positive and odd. Otherwise, return rejected.
The program is an illustration of functions.
What are functions?Functions are set of program statements that are executed when called or evoked.
The main programThe function written in Python, where comments are used to explain each line of the program is as follows:
#This defines the function
def posodd_number_filter(num):
#This checks if the function is odd and positive
if num >0 and num%2 ==1:
#If yes, this returns Accepted
return "Accepted"
#If no, this returns Rejected
return "Rejected"
Read more about functions at:
https://brainly.com/question/14284563
Help this toddler┐(´ー`)┌
Mainframe Computer is the powerful supercomputer which is capable of great processing and huge data storing tasks.
Also note: they are pretty really huge in size and varies- contains many fast processors, storage space and operate banking sites and transactions.
Example of such computers - IBM
They are costly and operated by huge companies.
Answer:
mainframeExplanation:
hope it helps you
Carly was given a writing assignment. In three to five sentences, give her some advice to help her plan and organize her writing.giving brainliest
what is auser mannual
Answer:
Contains information for user to make use of all information
Explanation:
What is output by the following program?
def mult(a, b = 1, c = 1):
print(a * b * c)
mult(2, 5)
The output of the program is 10.
def mult(a, b = 1, c = 1):
print(a * b * c)
mult(2, 5)
Code explanation:The code is written in python.
A function is declared named "multi" and the function has parameter of a, b and c. The default value of b and c are 1.Locally, we print the product of a, b and c.Finally, we call the function with its inputted parameters. Notice we only had 2 argument while calling the function. This simply implies that the default value for c is used. Therefore, we will have 2 × 5 × 1 = 10learn more on python here: https://brainly.com/question/22796383
What security trade-offs or options should an administrator consider when confronted with a potentially extraneous service, such as FTP or SMTP, running on a web server? *
FTP or File Transfer Protocol was never designed to be hack-safe. Files exchanged using FTP are not encrypted. Hence, this service is susceptible to various kinds of security risks such as spoofing, sniffing, etc.
What tradeoff must the Administrator consider when using FTP?Although the FTP is insecure, it is a very fast way of transferring files.
When the connection is lost during file transfer, it is possible to resume such a transfer.
It also allows for queuing, scheduling, uploading, and downloading of files.
The full meaning of SMTP is Simple Email Transfer Protocol.
Learn more about FTP and SMTP at:
https://brainly.com/question/17506968
https://brainly.com/question/14396938
Which microsoft word tool can help you find synonyms to improve your word choice?.
Using the thesaurus, you can look up synonyms and antonyms
an existing technology that would allow users to transfer images from the camera to the computer without connecting them
Answer:
wireless technology i guess??
Anyone knows the answer for 6. 1. 4 Happy Birthday! codehs
The birthday program is an illustration of a sequential program
What are sequential programs?Sequential programs are programs that do not make use of loops and conditional statements
The main programThe program written in Python, where comments are used to explain each line is as follows:
#This prints Happy birthday
print("Happy birthday")
Read more about Python programs at:
https://brainly.com/question/26980955
What is it called when two or more devices connect together?.
Answer:
When two or more computers are connected together so they can communicate with one another, they form a network. The largest computer network in the world in the Internet.
Answer:
When two or more computers are connected together so they can communicate with one another, they form a network. The largest computer network in the world in the Internet.
Explanation:
Help me people ┐( ˘_˘)┌
A browser is an example of :
System applicationThe applications (apps) that are designed to help us perform different activities on a computer are called Software applications..
Give reasons why you care for your sense organs
Answer:
You care for your sense organs because they help you give awareness and help us to have contact with your surroundings. If you don't care for it the results may be severe.
Write the use of the Goto statement with the help of an example.
What needs to be done before depositing a check using a mobile app?
Answer:
The check needs to be signed in the back by you or whoever is depositing it.
Answer:
Choose the account you want to deposit the check to. Enter the check amount. Take a photo of the front and back of the check using your mobile device's camera. Review the deposit details, then hit submit, if they're correct, to process your deposit.
Explanation:
Project: Design and Development Research Project
a team at work
A team (Imagery supplied by RicardoImagen/iStock via Getty)
Your Task
Your teacher may ask you to work in groups. Check with your teacher to see if this is required.
Choose a topic from the unit.
Identify a problem or issue to research.
Write a question (or questions) to be answered by your research.
Find at least four sources; these can be a journal article, a website from a reputable organization, an encyclopedia, a newspaper, or a documentary. When in doubt, ask your teacher.
Unacceptable sources include Wikipedia, an individual’s blog, and social media, except as examples not counted as sources.
Create a document using Word (or a similar word-processing application) as described below.
Your Word Document Requirements
Part 1: Name
Your name
Names of your partner(s) (Include the names of people in your group if this is a group project.)
Part 2: Title
Part 3: Questions to Answer
Part 4: Introduction
A paragraph that introduces your topic and the question(s) to be answered
Part 5: Exposition
An explanation of how you answered the question(s); give credit to your sources, whether using direct quotes or not
Part 6: Conclusion
A paragraph summarizing your analysis
Part 7: Bibliography
Part 8: Partner Participation (only included for those working in groups)
Describe the role and responsibilities of each member of the group.
What to Submit
You will submit the Word document described above. You can use this rubric to evaluate your project before you submit it.
The correct steps which are used to make a research are as follows:
Choose a topicFind out what problem needs to be fixed about the topicWrite your research questionsMake use of reputable sourcesWrite out your conclusionsWhat is a Research?This refers to the systematic study of a particular thing or phenomena to find out why it occurs and why it occurs the way it does and the frequency of occurrence.
With this in mind, we can see that making a research requires meticulous steps and some sources for research should not be considered because they are not reputable and this can include; individual blogs, social media, etc.
Read more about research here:
https://brainly.com/question/968894
Answer:
sorry i know this is late, but hopefully it will help someone else!
have a lovely day <3
How to create drop down list in excel with multiple selections.
Answer:
elect the cell or cells you want the drop-down list to appear in.
Click on the Data tab on Excel's ribbon.
Click on the Data Validation button in the Data Tools group.
In the Data Validation dialog, in the Allow: list select List.
Click in the Source: box.
Explanation:
help! giving a lot of points I need this asap!
Answer:
89.3
you add them all & then divide
Explanation:
What is the name of the proicess of submitting and checking credentials to valideate or prove user identiy
Answer:
Authentication
How to turn off notifications for a class in canvas.
Answer:
by clicking the View Course Notifications button and then on the resulting screen, clicking the green check next to Enable Notifications.
Explanation:
Follow This Step and Read