If an element contains text or another element, it is marked using a ______tag set in which an opening tag and a closing tag enclose the element content.

a. single-sided
b. two-sided
c. one-sided
d. double-sided

Answers

Answer 1

Answer:

b. two-sided

Explanation:

If an element contains text or another element, it is marked using a two-sided tag set in which an opening tag and a closing tag enclose the element content.

For example, <p>it is very important to "check" the expiration date of goods before buying them.</p>. In this scenario, the <p> represents the opening tag while the </p> represents the closing tag in HTML programming.


Related Questions

how we can search someone's name here?​

Answers

you can search someone’s name on here...?

Answer:

Umm

Explanation:

I guess we can only search for answers here!

Write the definition of a function that evaluates three double numbers and returns true if the floor of the product of the first two numbers equals the floor of the third number; otherwise it returns false.

Answers

Answer:

The function is written in C++

bool products(double num1, double num2, double num3) {

if(floor(num1 * num2) == floor(num3)){

    return true;

}

else

{

    return false;

}

}

Explanation:

I answered this question using C++ programming language.

This line defines the function with three parameters; num1 to num3

bool products(double num1, double num2, double num3) {

This checks if the floor of num1 * num2 equals floor of num3

if(floor(num1 * num2) == floor(num3)){

If yes, this returns true

    return true;

}

else {

If otherwise, this returns true

    return false;

}

The method ends here

}

I added the full program as an attachment that include the main method

Cryptography is the process of transforming data from cleartext into ciphertext.

a. True
b. False

Answers

Answer:

B) false

Explanation:

Encryption can be regarded as

the process involving encoding of information. It brings about convertion of of original information ( plaintext) to another alternative form (ciphertext). While While cryptography can be regarded as the science that deals with encrypting as well as decrypting of information. plaintext is unencrypted data while ciphertext is encrypted data. It should be noted that encryption is the process of transforming data from cleartext into ciphertext.

Which web browser was created by Microsoft?
Chrome
Edge
Firefox
Safari

Answers

Answer:

firefox

Explanation:

Answer:

Edge was created by Microsoft.

Explanation:

Your organization uses a federated identity provider to login to your Oracle Cloud Infrastructure (OCI) environment. As a developer, you are writing a script to automate some operation and want to use OCI CLI to do that. Your security team doesn't allow storing private keys on local machines. How can you authenticate with OCI CLI?

Answers

Answer:

Run OCI session authenticate and provide your credentials

Explanation:

The OCI CLI when in combination with a shell script can be fastly used in the creation of shareable scripts. It uses API keys, private and public scheme as it's default authentication. The command to use is the oci set up keys, to create these keys. Since you cannot store private keys, you run OCI authentication and then you give your credentials

The I/O modules take care of data movement between main memory and a particular device interface.A. TrueB. False

Answers

Answer:

A: True

Explanation: hiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

A software is made from​

Answers

Answer:

Two or more languages are used for making one particular software.

Fill in the blanks, so the print statement displays the result of the function call in order.

1 # This function compares two numbers and returns them
2 # in increasing order.
3 - def order_numbers(number1, number2):
4. if number2 > number1:
5 return numberi, number2
6 else:
7 return number2, number1
8
9 Run # 1) Fill in the blanks so the print statement displays the result # of the function call
10 ---, --- = order_numbers(100, 99) print(smaller, bigger)

Answers

Answer:

Rep;ace the blank with

smaller, bigger

So, the complete line is:

smaller,bigger=order_numbers(100,99)

Explanation:

From the question, we understand that the program is to return the order of a number from least to highest

This has been well implemented in order_numbers function

Because the order function returns two values, the order_function must be called in order to accept two values and the syntax is:

value1,value2 = function(return-value1,return-value2)

In this case, the statement is:

smaller,bigger=order_numbers(100,99)

So, in the next line of the main, the values of smaller and bigger are printed:

print(smaller,bigger)

See attachment

The SQL WHERE clause:___________.a) Limits the row data that are returned. b) Limits the column data that are returned. c) ALL Limits the column and row data that are returned.d) All of the above

Answers

Answer:

D. All of the above.

Explanation:

• To limit the number of rows use the WHERE clause.

• The WHERE clause filters for rows that meet certain criteria.

• WHERE is followed by a condition that returns either true or false.

• WHERE is used with SELECT, UPDATE, and DELETE.

3. A year contains 365 days normally, so on
what number day does Christmas fall on?

Answers

Answer:

359 is December 25 in a 365 day year.

Explanation:

Answer:

For western christian churches, Christmas day always occurs on December 25, though some cultures observe the main celebration on the night prior, Christmas Eve.

_______ are the best visual aids for showing the relationship between ideas in a presentation.

Answers

Answer:

A graphic organizers

Explanation:

Graphic users are the best visual aids for showing the relationship between ideas in a presentation.

What are Graphic user?

By the use of menus, icons, and other visual cues or representations, a user interacts with electronic devices like computers and smartphones using a graphical user interface (GUI) (graphics).

Unlike text-based interfaces, where data and commands are purely in text, GUIs graphically show information and related user controls. A pointing device, such as a mouse, trackball, stylus, or a finger on a touch screen, is used to manipulate GUI representations.

The first keyboard input and prompt system was used for the human-computer text interaction (or DOS prompt). At the DOS prompt, commands were entered to request responses from a computer.

Therefore, Graphic users are the best visual aids for showing the relationship between ideas in a presentation.

To learn more about Graphic user, refer to the link:

https://brainly.com/question/14758410

#SPJ6

g A peer-to-peer PLC network: has no master PLC. uses the token passing access control scheme. each device is identified by an address. all of these.

Answers

Answer:

All of these

Explanation:

A peer-to-peer network is a type of computer network that computer devices directly to each other, sharing information and other resources on the network.

It does not have a centralized database, there are no master or slave as each device in the network is a master on its own, and the devices all have unique addresses assigned statically for identification.

Define a new class Fighter that inherits from Spaceship. Add a variable property weapon that defaults to an empty string and a variable property remainingFirePower that defaults to 5.

Answers

Answer:

class Fighter(Spaceship):

   weapon = ""

   remain_fire_power = 5

Explanation:

The class "Fighter" is a python class that inherits all the variables and methods from the Spaceship class. The Fighter class is considered the child class while the Spaceship class is known as the parent class. The weapon and remain_fire_power variables are class variables unique to the fighter class and defaulted to an empty string and 5 respectively.

One of the keys on my keyboard doesn’t work but It’s used to login to windows. I’m trapped outside. What should i do :(

Answers

uhm- sorry, could explain this in a simpler way?

g Write a general-purpose program with a loop and indexed addressing that calculates sum of the values of elements of a DWORD array that are located at multiple of 4 location. For example for the array 1,2,3,4,5,6,7,8,9,10,11,12,13,14

Answers

Answer:

def sumD4th(dword):

   select = dword[3::4]

   print(sum(select))

mylist = [1,2,3,4,5,6,7,8,9,10,11,12,13,14]

sumD4th(mylist)

Explanation:

The python program above defines a function called "sumD4th" that accepts a list as its argument. The variable "select" is created which is the subset of the list argument "mylist" containing the index items that is a sum of four. The output of the function is the sum of the items in the "select" list.

Adding effects that move your text or pictures in your presentation is called:

Answers

the answer should be it’s a transitionl

The method definition, or declaration, is defined as the method __________ followed by the method ________.

a. name, parameters
b. name, return
c. header, body
d. header, signature
e. signature, body

Answers

Answer:

The answer is option C "header, body"

Explanation:

Like a class, a method definition has two significant parts: the method revelation and the method body. The method declaration characterizes all the method's attributes, for example, access level, return type, name, and contentions. The method body is the place where all the activity happens. It contains the guidelines that actualize the method.

The lone required element of a method declaration are the method's name, return type, and a couple of brackets: ( and ). A method declaration can give more data about the method, including the return type of the method, the number and sort of the contentions needed by the method, and which different classes and objects can call the method.

In spite of the fact that a method name can be any legitimate identifier, code shows limit method names. By and large, method names should be action words  (verbs) and should be in upper case, with the principal letter in lowercase and the primary letter of each inside word in capitalized.

Write a function solution that, given an array A consisting of N integers, returns the number of fragements of A whose sum equals 0 (that is, pairs (p,q) such that P

Answers

Answer:

#include <iostream>

using namespace std;

void fragment(int arr[], int n){

   for (int i = 0; i < n; i++){

       for (int x = 0; x < n; x++){

           if (x != i && arr[i] + arr[x] == 0){

               cout<< arr[i] << " , " << arr[x];

           }

       }

   }

}

int main(){

   int n = 7;

   int myArr = {1, 2, -1, -2, 0, 0, 3};

   fragment(myArr, n);

}

Explanation:

The C++ source code defines an array called "myArr" in the main program and its array size n. The void function "fragment" prints out the pairs of the array whose sum equates to zero.

SEMMA is a proprietary model? True or Flase

Answers

Answer:

true

Explanation:

SEMMA is a proprietary model is a true statement

Proprietal model in this context is a product or services that is exclusive to a company. SEMMA, is a property of SAS institute.

SEMMA simply means Sample, Explore, Modify, Model, and Assess. It is simply a list of sequential steps which was a product of SAS Institute. This institute is among the largest producers of statistics and business intelligence software. This product or property was made for passing or implementation of data mining applications.

Conclusively, we can say that SEMMA is a proprietary model is a true statement

Learn more from:

https://brainly.com/question/12719360?section=newest_q

1. Write a function called changeLetter that can directly alter the value of a character variable. It takes one argument: a reference to a character. It returns nothing. If the passed in character is alphabetic ('a' to 'z' or 'A' to 'Z'), then make the character become the next higher ASCII value ('a' becomes 'b' etc.). If the passed in character is not a letter, don't alter it.
2. Write a calling statement for the changeLetter function. It takes one argument: a reference to a character and returns nothing. The calling statement should pass the char variable ch so that it is (potentially) altered.
3. Write a calling statement for the changeLetter function. It takes one argument: a reference to a character and returns nothing. The calling statement should pass the 2nd character in a char array called chAr (by second, I mean the sub-oneth) so that it is (potentially) altered.
4. Assume the following function header:

void fn( int &n )

Write an instruction for the function body that will store 10 into the caller's variable referred to by n.
5. Write a calling statement for the fn function. It takes one argument: a reference to an integer and returns nothing. The calling should pass the integer variable num to the function so that it can be altered.
6. The strlen() function returns
A. the number of chars in an array of char, including the null
B. the number of chars in an array of char not including the null
C. the declared number of chars an array can hold
7. What must be true of the arguments to strcat(s1, s2); More than one answer may be correct
A. s1 must be valid strings
B. s2 must be a valid string
C. s1 must have room to contain the result
D. s2 must have room to contain the result
8. How is a structure different from an array?
9. Write a definition for a structure called Part that can hold a part name (an array of characters that can hold 24 characters plus a null terminator), a part weight (int), and a part price (float). Make up appropriate names.
10. Assume the following structure definition:

struct Person

{

char name[50];

int age;

};

Write a declaration for a variable of type Person and initialize it with your name and the age 10. This should be done as part of the variable declaration statement.

11. Assume the following structure definition:

struct Person

{

char name[50];

int age;

};

Write a declaration for a variable of type Person and initialize it with your name and the age 10. This should be done as several executable statements.

12. Declare an array of 10 Person structures named peopleArray.

13. Assume the following structure definition and declaration:

struct Person

{

char name[50];

int age;

};

Person people[265];

Assuming that the people array contains 265 valid structs, write code to print out the age member for each item in the structure.

Answers

Answer:

1. Void changeLetter( char &ref )

{

If( isalpha(ref) )

{

Ref++;

}

}

2. changeLetter( ch );

3. changeLetter( chAr[1] );

4. n = 10;

5. fn( num );

6. (B) the number of chars in an array of char not including the null.

Explanation:

Functions are blocks of codes in any programming language. In C++, a void function is a function that does not return a value, while other types of functions have a return statement. There are three ways to pass an argument to a function in C++, by value, by reference and by pointer.

When a variable argument is passed as a value to a function, the value of that variable cannot be altered by the function, but when it is passed as a reference or a pointer, it can be altered.

To call a function in C++, specific the function name and the opening and closing parenthesis with the required arguments in between. The call must end with a semi-colon.

How to start the ms excel​

Answers

Answer:

The answer is below

Explanation:

To start Microsoft Excel, a user can click on the start menu and look for the Microsoft Excel icon in the list of programs available.

If this is not found, a user can either search it from the start menu or click on the All program menu, from there the user can look for Microsoft Excel then click on it to launch the application.

If Microsoft Excel can't be found, a user is recommended to click on Microsoft Office, from there Microsoft Excel will be found, then the user can click on it to launch the application.

After clicking, the Excel Starter startup screen shows, and an empty page called the spreadsheet is shown.

Python - write a program that lets the user enter a string and displays the character that appears most frequently in the string.

This is my attempt so far, I know it needs a lot of changes:

# This program has the user enter a string and displays the
# character that appears most frequently in the string.

def main():
# Create a variable to use to hold the count.
# Start the variable with 0.
count = 0

# Have the user enter a string.
my_string = input('Enter a sentence: ')

# Count the character that appears most frequently in the string.
for ch in my_string:
if ch == 'A' or ch == 'a':
count+=1
if ch == 'B' or ch == 'b':
count+=1
if ch == 'C' or ch == 'c':
count+=1
if ch == 'D' or ch == 'd':
count+=1
if ch == 'E' or ch == 'e':
count+=1
if ch == 'F' or ch == 'f':
count+=1
if ch == 'G' or ch == 'g':
count+=1
if ch == 'H' or ch == 'h':
count+=1
if ch == 'I' or ch == 'i':
count+=1
if ch == 'J' or ch == 'j':
count+=1
if ch == 'K' or ch == 'k':
count+=1
if ch == 'L' or ch == 'l':
count+=1
if ch == 'M' or ch == 'm':
count+=1
if ch == 'N' or ch == 'n':
count+=1
if ch == 'O' or ch == 'o':
count+=1
if ch == 'P' or ch == 'p':
count+=1
if ch == 'Q' or ch == 'q':
count+=1
if ch == 'R' or ch == 'r':
count+=1
if ch == 'S' or ch == 's':
count+=1
if ch == 'T' or ch == 't':
count+=1
if ch == 'U' or ch == 'u':
count+=1
if ch == 'V' or ch == 'v':
count+=1
if ch == 'W' or ch == 'w':
count+=1
if ch == 'X' or ch == 'x':
count+=1
if ch == 'Y' or ch == 'y':
count+=1
if ch == 'Z' or ch == 'z':
count+=1
#Print the result.
print('The most popular character appears ', count, 'times.')

# Call the main function.
main()

Answers

def main():

   my_string = input("Enter a sentence: ").lower()

   character = ""

   count = 0

   for x in my_string:

       if x.isalpha():

           if my_string.count(x)>count:

               count = my_string.count(x)

               character = x

   print("The most popular character,",character,"appears",count,"time(s)")

main()

I wrote my code in python 3.8. I hope this helps

The program which will let the user enter a string and displays the character will be written in computer language.

What is programming?

The process of producing a set of instructions that tells a computer how to complete a task is known as programming. Computer programming languages such as JavaScript, Python, and C++ can be used to create programs. Programming is widely regarded as one of the most difficult disciplines to master.

def main():

my_string = input("Enter a sentence: ").lower()

character = ""

count = 0

for x in my_string:

if x.isalpha():

if my_string.count(x)>count:

count = my_string.count(x)

character = x

print("The most popular character,", character,"appears",count,"time(s)")

main()

Therefore, the coding for the given program is written above.

To learn more about programming, refer to the link:

https://brainly.com/question/11023419

#SPJ5

pls helppp <3 In the following nested loop structure, which loop does the program EXIT first?
for (initialization 1; condition 1; loop variable 1 increment;)
for (initialization 2; condition 2; loop variable 2 increment;)
for (initialization 3; condition 3; loop variable 3 increment;)
for (initialization 4; condition 4; loop variable 4 increment;)
{ statement block;}


A.
for (initialization 1; condition 1; loop variable 1 increment;)
B.
for (initialization 2; condition 2; loop variable 2 increment;)
C.
for (initialization 3; condition 3; loop variable 3 increment;)
D.
for (initialization 4; condition 4; loop variable 4 increment;)

Answers

Answer:

D. The 4th one

Explanation:

The loops are nested, and the program ends when loop 1 is completed. Since loop 4 is the innermost one, that one is completed first.

The appropriate semaphore in C to give one more turn to writer so it can clean up IPC objects is WRITE_SEM. Is it true or false

Answers

Answer:

True

Explanation:

Semaphores are variables of abstract data types in programming used to control or restrict access to resources by multiple concurrent processes to avoid system failure like race conditions, by evaluating the available resources. There are various types of semaphores like the binary and counting semaphores which is used to lock and count resources respectively.

In C, the semaphore used to clean up the IPU objects is the WRITE_SEM.

Consider the following relational database that stores information about bars and customers: Drinker (name, address) Bar (name, address) Beer (name, brewer) Frequents (drinker, bar, times a week) Likes (drinker, beer) Serves (bar, beer, price) Write the following queries in relational algebra: 1. Find all drinkers who frequent only those bars that serve some beers they like. 2. Find all drinkers who frequent every bar that serves some beers they like.3. Find those drinkers who enjoy exactly the same set of beers as Amy.

Answers

Answer:

simeso  

le

Explanation:

nd
Assume you have already imported the time module.
Which line of code will pause the program for 6 seconds?
time.pause(6)
time sleep()
O time.pause()
O time sleep(6)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Time Module:  

Python's time module has a function to pause a program to the given time in seconds called sleep(). Essentially, as the name implies, it pauses your Python program.

The syntax of the sleep() function is given below:

time.sleep(second)

So, the given options for this question are :

time.pause(6) time.sleep() time.pause() time.sleep(6)

To pause a program for 6 seconds, option 4 is correct:

time.sleep(6)

While the other remaining options are not correct because to pause a program in python for 6 seconds, the correct statement is given in option 4.

write a program that creates a dictionry containing course numbers and the room numbers of the rooms whhere the courses meet

Answers

Answer:

course_class = {'CS101' : '3004', 'CS102' : '4501', 'CS103' : '6755',  'NT110' : '1244', 'CM241' : '1411'}

Explanation:

A dictionary is a data structure in python that is unordered and unindexed. It stores data in key-values pairs with each pair separated by a comma and all the items enclosed with curly braces. It is also assigned to a variable name.

The dict() function can also be used to create a dictionary variable.

A cyberbully is someone who invades another person’s privacy by posting mean-spirited messages. repeatedly sending text messages. visiting questionable websites. stealing original work.

Answers

Answer:

Its A.

Explanation:

Took the exam review

Answer:

A

Explanation:

on edge

Sound technology has been influenced the most by the ___.
microphone
phonograph
record player
cassette recorder

Answers

I think its the phonograph i hope this helps!
The phonograph because it helped with hearing and seeing things

HUURRY
The line after an if statement should begin with what?
#
a print statement
a colon
indentation

Answers

Answer:

colon

Explanation:

The line after an if statement should begin with a colon. Next time please be more specific towards which language you need help with as you didnt specify and all languages are different.

Answer:

Yes it should start with a colon after

have a good day hopefully it helped :)

Explanation:

Other Questions
Why would a scientist want to replicate another scientist's experiment? Find the slope given the 2 points, (-7, -3) and (-2,7). What is the value of x in the equation 8+4 = 2(x-1)? 0511/213/27 HELP !!! I'm stuck any help would be appreciated What is the total cost of a $95.00 item with a sales tax of 6%? what problems might a country have if it is not next to a ocean TJ rented a truck to move to a apartment the regular price of a Truck Rental is $200 TJ has a 50% off coupon he wants to know the sale tax of the truck rental Which of these is a negative impact of lobbying? It makes businesses too transparent. It favors groups over the individual. It enables outsiders to influence lawmakers. It offers advantages to those with money. If y=3x+5, what is y when x=2/3? In contact freezing _____ are used for _____ freezing of foods immersion -- cryogenic liquids refrigerants -- immersion immersion -- refrigerants cryogenic -- immersion The cytoplasm of a plant cell has a Golgi, endoplasmic reticulum, and chloroplasts. true or false In what phase of mitosis do the chromosomes line up along the center of the cell? Please help! What does c equal 3c + 9 - 2c -6 mention any six uses of heat Give a polynomial of degree 3 that has zeros of 18, 10i, and -10i and has a value of -3434 when x = 1. Write the polynomial in standard form What does inhalants look like? which of the following Enlightenment thinkers was exiled from his home country for being too outspoken against the nobility of the country DBQ: Portuguese Transformation of the Indian Ocean in the Early Modern Era If m 1 = 122, what is the value of x? What is a documentary? Discuss the first documentary and its creator Steam Workshop Downloader