Answer:
[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]
Explanation:
The h1 tag in HTML is used to create title-like text.
HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.
Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.
Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.
<h1> Hello there! </h1>
The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.
Hope this helped!
what is peopleware?
need help
Answer:
Peopleware is a term used to refer to one of the three core aspects of computer technology, the other two being hardware and software.
Match each code snippet to its appropriate markup language name
Answer:
Please find the complete solution in the attached file.
Explanation:
Q3.What are the hardware requirement of the multimedia system?
Answer:
• The processing unit
• The memory
• Universal Serial Bus (USB) Device
• Graphics Card and Graphical Processing Unit (GPU)
• Hard drive
• Monitor
• External storage and optical device
Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest
Answer:
Motion sensor.
Explanation:
I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor
When using the “rule of thirds,” where should focal points be placed?
Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.
Have a nice day!
please answer this question
Answer:
17. True
18. Backup
Explanation:
Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.
When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.
which of the following has the highest storage capacity?
a.digital versatile disc
b.computer disc
c.floppy disk
d.hard disk
Answer:
d. Hard disk
Explanation:
The storage capacity of the given options are presented as follows;
[tex]\begin{array}{lr}Device& Storage \ Capacity\\ Digital \ versatile \ disc\ (DVD)& 4.7 \ GB\\ \begin {flushleft} Computer \ disc \ (CD)&703 \ MB\\Floppy \ disk & 2.8 \ MB\\Hard \ disk & 1,000 \ GB\end{array}\right][/tex]
Therefore, the device with the highest storage capacity from among the options is the hard disk with a storage capacity of 1,000 gigabytes of data
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:
Answer:
Software piracy.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, softwares are categorized into two (2) main categories and these are;
I. Open-source software.
II. Proprietary software.
A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.
Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.
Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.
Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).
Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.
Select the three careers in the creative side of digital media.
broadcasting
web designer
animators
filmmaker
project management
Answer:
I would pick A B and D to be my answer
Answer:
web designer, animators, and filmmaker.
639820- 2852478
425867- 369514
Answer:
639,820 - 2,852,478 = -2,212,658
425,867 - 369,514 = 56,353
Have a nice day!
defination of Wi-Fi plz
Answer:
A facility allowing computers,smartphones and other devices to connect to the internet or communicate with one another wirelessly.
Select the correct answer.
Which formula below will return the same result as the formula =SUM(B1:B5)?
A.
=B1+B5
B.
=B1+B2+B3+B4+B5
C.
=B1,B2,B3,B4,B5
D.
=B1,B5
E.
=#B1:#B5
A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?
Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”
The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.
Answer: destination unreachable
time exceeded
Explanation:
You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.
The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:
• destination unreachable
• time exceeded
____ feet is used when the width of the material is not a factor. (6 letters)
Answer:
footin dhhdhdn bsbsbdb
Write an expression that evaluates to true if the value of the int variable widthOfBox is not divisible by the value of the int variable widthOfBook. Assume that widthOfBook is not zero. ("Not divisible" means has a remainder.)
Answer:
The expression is:
if widthOfBox % widthOfBook != 0
Explanation:
Given
Variables:
(1) widthOfBox and
(2) widthOfBook
Required
Statement that checks if (1) is divisible by (2)
To do this, we make use of the modulo operator. This checks if (1) is divisible by 2
If the result of the operation is 0, then (1) can be divided by (2)
Else, (1) can not be divided by (2)
From the question, we need the statement to be true if the numbers are not divisible.
So, we make use of the not equal to operator alongside the modulo operator
Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to
Answer:
She is referring to composite primary key
Explanation:
Composite primary key comprises of several columns with each having column having its own individual uniqueness.
In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.
pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE
Answer:
?
Explanation:
What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit
Answer:
it's D
Explanation: i had this question before and i got it right :)
Answer:
D. An initial deposit
Explanation: Hope this helps :)
Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use a footer element as a ______ of the contact information.
Answer:
Parent
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of a HTML document contains the contents or informations that a web page displays.
In this scenario, Roger wants to give semantic meaning (an element conveying informations about the type of content contained within an opening and closing tag) to a contact information placed at the bottom of a webpage. Thus, in order to do this, he should use a footer element as a parent of the contact information and as such all instance variables that have been used or declared in the footer class (superclass) would be present in its contact information (subclass object).
A two-dimensional array is essentially?
A primitive date type
A looped data structure
Answer:
A looped data structure
Explanation:
A two-dimensional array is an array of another array. You can traverse it using nested loops, one to traverse row and one to traverse columns.
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions
Answer:
privilege escalation.
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.
In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.
Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.
Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.
Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?
Answer:
1. Antenna Software
2. Cloud9 Analytics
3. CVM Solutions
4. Exoprise Systems
5. GageIn
Explanation:
1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems
2. Cloud9 Analytics - manages the warehouse separately from the solutions
3. CVM Solutions - Enables users to "clean" supplier information and to centralize and standardize information
4. Exoprise Systems - It avoid use of complex database and Web servers
5. GageIn - It uses Networking and social tools to connect users and facilitate communications
Answer:
1. Antenna Software
2. Cloud9 Analytics
3. CVM Solutions
4. Exoprise Systems
5. GageIn
Explanation:
RELIGION QUESTION
What is the meaning of prayers of adoration and thanksgiving:
Answer:
prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration
Explanation:
Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?
budgeting
scientific analysis
creating presentations
number formatting
computer programming
Answer:
number formatting,
scientific analysis computer programming
Answer number formatting,
scientific analysis computer programming
Explanation: its right
When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may display a _________ before allowing you to move forward. Select one: Red Flashing Lights Red X Warning Bell Warning Page
Answer:
the last option
warning page
I will give free brainiest if you guess my favorite car among these 3
Corvette
LaFerrari
Porsche
Answer:
LaFerrari
Explanation:
When attaching a file or files in outlook 365 you select the attach command and then select the files location
Answer:
When you click the attachment button a window pops up allowing you to select the file/s you want to upload
You can also drag and drop file/s this is an alternative method
Explanation:
Microsoft Outlook is a personal information manager software system from Microsoft.
Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia
We can draw crescent using ?
Answer:
I think it's B
hope this helps
have a good day :)
Explanation:
You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them. Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location
Answer: Windows Configuration Designer (WCD)
Explanation:
The other software that will be needed to build the package which is vital in bulk enroll the devices through USB or network location is Windows Configuration Designer (WCD).
Windows Configuration Designer typically allows the configuration of several aspects of Windows devices such as Active Directory, Connect to WiFi, Device name, and install applications.