Answer:
is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.
what is the correct way to write h1 tag
Answer:
[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]
Explanation:
The h1 tag in HTML is used to create title-like text.
HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.
Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.
Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.
<h1> Hello there! </h1>
The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.
Hope this helped!
Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?
budgeting
scientific analysis
creating presentations
number formatting
computer programming
Answer:
number formatting,
scientific analysis computer programming
Answer number formatting,
scientific analysis computer programming
Explanation: its right
Select the three careers in the creative side of digital media.
broadcasting
web designer
animators
filmmaker
project management
Answer:
I would pick A B and D to be my answer
Answer:
web designer, animators, and filmmaker.
Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she is only running part of the computer program. Which is she using
Answer:
breakpoints.
Explanation:
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Debugging and maintenance.
In this scenario, Kerry is debugging a program and identifies a line of code to begin execution and another line of code to end execution so that she is only running part of the computer program. Thus, Kerry is using breakpoints.
Basically, one of the fundamental debugging techniques used by software developers and programmers are breakpoints. They are generally set at any point where a pause debug-ger execution or an execution of a code is required based on certain conditions.
At every breakpoint address, a debug-ger temporarily stores a set of instruction and overwrites it with another special instruction.
Answer:
C for Edge
Explanation:
pls help me pass my finals!!
Answer:
(a): power(2&-2)
The code is as follows:
power = 2**-2
print(power)
(b): Largest and smallest in a list
The code is as follows:
num = [33,6,11,100,456,109,-4,366]
smallest= min(num)
largest= max(num)
print(smallest)
print(largest)
(c): Loop in Python
(i) Loop are instructions that are repeated until a certain condition is met;
(ii) For loop, in python are used to iterate over a sequence or through a certain range;
The syntax is:
for loop_element in range(iterating_range):
The following is an illustration of for loop that iterates 5 times
for i in range(5):
Explanation:
(a): power(2&-2)
The ** is used to calculate power.
So, 2**-2 represents 2 raise to power -2
power = 2**-2
This prints the calculated power
print(power)
(b): Largest and smallest in a list
This initializes the list
num = [33,6,11,100,456,109,-4,366]
This calculates the smallest using min() function
smallest= min(num)
This calculates the largest using max() function
largest= max(num)
This prints the smallest and the largest
print(smallest)
print(largest)
(c): See answer section
Select the correct answer from each drop-down menu.
Complete the sentence about emphasizing data in a worksheet.
Formatting a cell can refer to _____ formatting and to ____ formatting.
First blank:
1. Unhiding
2. Inserting formulas in
3. Highlighting
Second blank:
1. Changing the font size in the cells that contain the data
2. Moving the data to a separate row or column
3. Creating a header for the row in which the data appears
Answer:
Highlighting
Changing the font size in the cells that contain the data
Explanation:
I got it right on the Edmentum test.
The complete sentence about emphasizing data in a worksheet is given below:
Formatting a cell can refer to highlighting formatting and to changing the font size in the cells that contain the data formatting.Thus, the correct options for blanks are C and A respectively.
What is data formatting?Data formatting may be defined as the process of organization of information according to preset specifications usually for computer processing in order to execute with respect to the instructions.
The concept of data processing deals with the sequential arrangement of sources and information on the basis of certain specifications. The formatting of a specific cell refers to highlighting them for easy identification.
The process of formatting must be done in order to alter the size of the font within the cells that significantly contain the data.
Therefore, the correct options for blanks are C and A respectively.
To learn more about Data formatting, refer to the link:
https://brainly.com/question/25051360
#SPJ2
In the table below, identify the data type that would be most suitable for the second field.
Name Age Gender
Mary 22 female
Joe 24 male
Kate 21 female
Frank 20 male
A.
binary
B.
Boolean
C.
autonumber
D.
text
E.
number
Answer:
e num
Explanation:
Answer:
A
Explanation:
639820- 2852478
425867- 369514
Answer:
639,820 - 2,852,478 = -2,212,658
425,867 - 369,514 = 56,353
Have a nice day!
The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.
Answer: destination unreachable
time exceeded
Explanation:
You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.
The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:
• destination unreachable
• time exceeded
Q3.What are the hardware requirement of the multimedia system?
Answer:
• The processing unit
• The memory
• Universal Serial Bus (USB) Device
• Graphics Card and Graphical Processing Unit (GPU)
• Hard drive
• Monitor
• External storage and optical device
3. The art or technique of decorating wood or leather by burning a design on the surface
with a heated metallic point.
A. Pyrography
C. Wood Turning
B. Gilding
D. Hand Carving
4. Combines several techniques that involve inserting decorative pieces into a base
object to incorporate new designs on the original products.
A. Flocking Technique
C. Inlying
B.
Hand Carving
D. Gilding
5. Lines the interior of drawers and boxes with a soft velvety finish
A. Flocking Technique
C. Inlying
B. Hand Carving
D. Gilding
6. It is used to color wood to give an illusion of texture. This may come in two varieties.
A. Staining
C. Pigment-based
B. Dye-based
D. Inlaying
7. Stain will color small pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
8. Stain will color large pores of the wood
A. Pigment-based
B. Dye-based
C. Flocking Technique
D. Painting
9. Decorative technique in which powder is applied on wood or other materials to give a
thin coating of gold from.
A. Inlaying
C. Gilding
B. Staining
D. Wood Carving
10. The simplest way of decorating wood since there are a variety of colors that you can choose from.
One may also add a lacquer finish to make, it shiny and glossy,
A. Flocking Technique
B. Staining
C. Gilding
D. Painting
due tomorrow pls help I'll make brainliest I promise unrelated answer will get reported
Answer:
The answer of number three is pyrography.
please answer this question
Answer:
17. True
18. Backup
Explanation:
Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.
When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.
what is the behavior of an element with static positioning in regard to the page layout?
Answer:
The element is positioned according to the normal flow of the document.
The top, right, bottom, left, and z-index properties have no effect. This is the default value.
The behavior of an element with static positioning in regard to the page layout is that it implies that one put the element in its original position in the aspect of document flow.
What does Static positioning implies?Static positioning is known to be the normal way that all element have or gets. It implies that one should "put the element into its original place in the document flow as there is nothing special that one needs to see here."
Hence, the behavior of an element with static positioning is known to be the same and thus If a person do save and refresh, there will be no changes except when there is an updated background color.
Learn more about page layout from
https://brainly.com/question/988590
How can data be calculated?
Answer:
Data can be calculated by solving an equation
Explanation:
Express 42 as a product of its prime factor
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions
Answer:
privilege escalation.
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.
In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.
Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.
Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.
Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.
it crashed a lot
it could only run one application at a time
it didn't use a pointing device
it provided a shell for MS-DOS
Answer:
it providrd a shell for MS-DOS
Explanation:
It basically was a shell to make MS-DOS different. MS-DOS was still the underlying operating system.
Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?
Answer:
1. Antenna Software
2. Cloud9 Analytics
3. CVM Solutions
4. Exoprise Systems
5. GageIn
Explanation:
1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems
2. Cloud9 Analytics - manages the warehouse separately from the solutions
3. CVM Solutions - Enables users to "clean" supplier information and to centralize and standardize information
4. Exoprise Systems - It avoid use of complex database and Web servers
5. GageIn - It uses Networking and social tools to connect users and facilitate communications
Answer:
1. Antenna Software
2. Cloud9 Analytics
3. CVM Solutions
4. Exoprise Systems
5. GageIn
Explanation:
What is a blank workbook?
Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard
Answer:
Your answer is D Storyboard
Explanation:
Storyboarding is a process where you plan how things will look on your website just as described.
What is a worm?
the process of using e-mail to trick a user to share personal information
a type of virus that targets programs and files, and duplicates itself like a biological virus
O a type of software designed to secretly capture personal information and track online activities
O a type of virus that spreads from computer to computer through a network connection
Answer:
Answer is a type of virus that spread from computer to computer through a network connection
Explanation:
How can you make a search phrase more effective?
O A. by framing it as a question
O B. by using more specific search terms
C. by using a different search engine
OD. by using all the search terms you can think of
Let's solve this together.
To make a search term more accurate, you must keep it simple and you must be able to use more specific terms. The more specific you are with what you are asking the engine about, the more friendlier it will respond.
The answer is Option B. I hope this answer helped you!
Match each code snippet to its appropriate markup language name
Answer:
Please find the complete solution in the attached file.
Explanation:
We can draw crescent using ?
Answer:
I think it's B
hope this helps
have a good day :)
Explanation:
The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag
in python write a code to find power (2 & -2)
Explanation:
b) (c) ... Want to see the step-by-step answer ? ... Q: Write a python program with comments
Which term describes the part of a file name after the period that indicates which application can create or open it?
O CSV
O path
O extension
O delimiter
RELIGION QUESTION
What is the meaning of prayers of adoration and thanksgiving:
Answer:
prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration
Explanation:
which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive
Answer:
microphone
Explanation:
when you are using a microphone once it stop it done
explain the verbal method of communication
Answer:
verbal method of communication means using kaomji, emojis gifs and stickers although you know how to use the keyboard.
Answer:
The Verbal Communication is a type of oral communication wherein the message is transmitted through the spoken words. Explanation: Here the sender gives words to his feelings, thoughts, ideas and opinions and expresses them in the form of speeches, discussions, presentations, and conversations.