ANSWERS FOR PLATO!!!

What does the second element in a pair of HTML tags contain?

ANSWER: /

when would you use the code snippet <input...(randome code stuff)...> American?

ANSWER: while inserting a RADIO BUTTON

assume you are creating a website for school... yada yada,

ANSWER: <img>

Why is it preferable to code web pages in HTML format?

ANSWER: to display properly as search results in all browsers

drag tiles, somthinf about creating a web page and wich dose the html tags define


new paragraph ---> <p>

define a term ---> <dd>

define single line break ---> <br>

define heading ---> <h3>


HOPE THIS HELPS GUYS YOU GOT THIS KEEP ON KEEPING ON <3<3<3<3 #platogang #edementumegang​

Answers

Answer 1

The thing which the second element in a pair of HTML tags contain is "/" and is known as the Closing Tag.

What is an HTML Tag?

This refers to the keywords that are used in the building block of a website to indicate how a web browser would interpret and display the content.

Hence, we can see that in HTML tags, there are always the Opening and Closing Tags that are used to enclose lines of code and when paired together are known as container tags.

Read more about HTML elements here:

https://brainly.com/question/9069928

#SPJ1


Related Questions

The destination transmission control protocol (TCP) process has set a 1,000-byte receive buffer window. The source TCP sequence number starts at 23,100 and sends the following segments, in order: Segment 1-200 bytes; Segment 2-300 bytes; Segment 3-200 bytes; and Segment 4-300 bytes. The last acknowledgment the source received was sequence number 23,600 saying the receive buffer can now hold 800-300 byte streams. The retransmission timer for sequence number 23,600 has expired, so what will the source TCP do next

Answers

Because the retransmission timer for sequence number 23,600 has expired, the source TCP will trigger a process that resends segments 3 and 4.

What is TCP/IP?

A term in Computer Networking Protocol, it stands for Transmission Control Protocol/Internet Protocol.

It serves the function of indicating how data is transported over the internet by ensuring that there is communication from end to end.

This end-to-end communication process is able to spot how such data can be sectionalized into packets, addressed, routed, transmitted and how it is received when it gets to the terminal point.

Learn more about TCP at:
https://brainly.com/question/17387945
#SPJ1

A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing information protocol) on an edge router in a network so that it demands more memory and cpu power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. identify and analyze which characteristic of ospf signifies this.

Answers

The option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

What is OSPF about?

The OSPF is known to be called an open Shortest Path First protocol.

It belongs to the family of IP Routing protocols as it serves as  Interior Gateway Protocol (IGP) used mainly for the Internet, and the option that can be used to  identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.

See full question below

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.

Shared data

Low overhead, fast convergence

Stability

Multi-vendor routers

Learn more about OSPF  from

https://brainly.com/question/14604232

#SPJ1

In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.

Answers

They were worried that the software had too many bugs.

The function ____ can check whether an expression meets the required conditions; if the conditions are not met, it terminates the program.

Answers

Answer:

assert()

Explanation:

The assert function takes a boolean as an input, and when true, it just continues the flow, however if false it prints an error and calls exit.

Give three reasons why it is important to have hci-based software programs.

need this soon

Answers

The three reasons why it is important to have HCI-based software programs As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

What is HCI and why is it important?

The Role of Human Computer Interaction withinside the Workplace. Human Computer Interaction (HCI) and User Experience (UX) are interdisciplinary fields that draw on human-focused disciplines like psychology and sociology to layout and increase technological merchandise that meet human needs.

As its call implies, HCI includes 3 parts: the user, the pc itself, and the methods they paint together.HCI is vital on account that it'll be important for items to be extra successful, safe, helpful, and functional. It will make the users revel in extra fun withinside the lengthy term. As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.

Read more about the software programs:

https://brainly.com/question/1538272

#SPJ1

Please help quick!! 20 points

a table is a ___ of rows and columns that provides a structure for presenting data.

Answers

Answer:

vertical and horizontal

Why is it important for companies to invest in building a complete data and analytics platform?.

Answers

Companies need to invest in data and analytics platform as it  generates insights by housing data in one place and converting it into easily consumable information at high speed.

Why is it vital to use the analytics of a platform?

Analytics platforms is known to have helped a lot of data scientists as it has help to boast access to a lot of data sources and hardware.

Note that Companies need to invest in data and analytics platform as it  generates insights by housing data in one place and converting it into easily consumable information at high speed.

See options below

It produces cultural support and alignment, a growth mindset, and new ideas and priorities to improve business processes.

It creates awareness of what data can do to improve business processes.

It generates insights by housing data in one place and converting it into easily consumable information at high speed.

It stores large amounts of data that are easily retrievable for future business growth.

Learn more about analytics platform from

https://brainly.com/question/26468036

#SPJ1

Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original string in reverse. For example, calling reverse with the string goodbye returns the string eybdoog.Reversing a string involves:

Answers

The program is an illustration of recursive functions in Python;

Recursive functions are functions executed from within itself

The python program

The program written in python, where comments are used to explain each action is as follows:

#This defines the function

def revStr(myStr):

   #This returns an empty string if the string is empty

   if myStr == "":

       return myStr

   #If otherwise, this returns the reversed string recursively

   else:

       return revStr(myStr[1:]) + myStr[0]

Read more about python recursions at:

https://brainly.com/question/19089783

#SPJ1

pls help will mark as brainliest i need help in html.​

Answers

Answer:

This is how I did it. Try it out and see if it works for you

What do you prevent when you use data validation in your database forms?
O code injection
O phishing
O botnet
O denial-of-service

Answers

Answer:

code injection

Explanation:

Validating the data in a database prevents someone from sneaking code to run without permission, aka code injection.

Phishing - this is disguising as a reputable company/person and trying to steal info (passwords, credit card numbers)

Botnet - this is a network of computers (most likely in the network because of a virus) that are used as a group for malicious purposes (like spam)

Denial-of-service - this is an attack which aims to deny users from accessing the content they want. a common example of this is flooding a server with spam requests, rendering it overloaded and unable to handle any user requests

write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000

Answers

Using the computational language in C++ it is possible to write a code that uses the salary values ​​of the employees of a company dividing between the number of employees.

Writing the code in C++ is possible:

#include<stdio.h>

#inc1ude<conio.h>

void main()

{

int i, n, count = 0;

Long int salary[25];

clrscr();

printf(“\n Input salary of 25 persons:- ");

for(i=0;i<25;i++)

scanf("%ld", &salary[i]);

for(i=0;i<25;i++)

{

if(Salary[i]>30000 && salary[i]<40000)

count++;

}

printf("There are %d persons whose salary is in between 30000 and 40000",count);

getch();

}

See more about C++ code brainly.com/question/17544466

#SPJ1

Question an administrator of a linux network is writing a script to transfer a list of local host names, contained in a file called hostnames, directly into the syslog file. predict the cli command the admin is likely to use to accomplish this. a.

Answers

The Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

What is a Linux command?

A Linux command simply refers to a software program that is designed and developed to run on the command line, in order to enable an administrator of a Linux network perform both basic and advanced tasks by entering a line of text.

In this scenario, the Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."

Read more on Linux commands here: https://brainly.com/question/25480553

#SPJ1

Consider the following method: public int mystery(int n) { if(n > 6) { return 1 mystery(n - 1); } return n % 3; } What is the value of mystery(10)

Answers

Answer:

Ans1--- The output is 9 Explanation--- mystery(5)=mystery(4)+2 mystery(4)=mystery(3)+2 mystery(3)=mystery(2)+2 mystery(2)=2+1=3

The entities on which data are collected are _____.

Answers

The entities on which data are collected is known as variables.

Answer:

The entities on which data are collected is known as variables.

Explanation:

Who invented Napier's Bones and when? Write its functions. field of comm​

Answers

Explanation:

Napier's Bone was invented by Scottish mathematician John Napier in 1617 AD.... It's function is that it was very useful for finding multiplication at that time...

Complete the following sentences using each of the words provided ONCE only. KEYBOARD DESKTOP STORE PRINTER COMPUTER MOUSE MONITOR CD Bay PRINTER TOWER CASE CENTRAL PROCESSINGENIT is an electronic device that retrieves, and processes shows you what is going on in the computer. is the first image you see on your screen when the computer is is used for telling the computer what to do. is used for typing documents. is used for putting documents on paper. you can insert a CD or Compact Disc. is is box inside and shaped 1) A 2) The 3) The data. switched on. 4) The 5) The 6) The 7) In the 8) The it​

Answers

Answer:

Explanation:

Monitor is an electronic device that retrieves, and processes shows you what is going on in the computer.

Desktop is the first image you see on your screen when the computer is is used for telling the computer what to do.

keyboard

is used for typing documents. Printer is used for putting documents on paper. CD Bay you can insert a CD or Compact Disc. is is box inside and shaped


in which part of the scratch interface does a programmer combine code blocks to build the program?

a. sprite info pane
b. block palette
c. stage
d. scripts area

Answers

Answer:

D

Explanation:

The sprite info pane is for an overview over your sprites and their visibility, coordinates, etc.

The block palette is where you select blocks from.

The stage is where your figures move and do stuff.

The scripts area is where you combine blocks from the palette together.

This program has a bug. When the green flag is clicked, nothing happens. How would you fix it?
A. Change the number inside the “Move” block
B. Change the number inside the “repeat” block
C. Make the sound louder with the purple block
D. Connect the event block directly to the “repeat” block

Answers

The correct answer is D, if you connect it, the program will operate properly.

A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includes a few macros designed to secretly gather and send information to a remote server. how is the malicious actor accomplishing this task

Answers

Thay is the malicious actor accomplishing this task is done by using the VBA code.

What is The Visual Basic button?

It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.

To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.

Read more about the spreadsheet :

https://brainly.com/question/26919847

#SPJ1

The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a

Answers

The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a TCP/IP protocol suite.

What is TCP/IP protocol suite?

The TCP/IP protocol suite is known as the Internet Protocol Suite (IPS), this is because it is said to receives from the layer above in form of data, and places its own header in front  of it.

Therefore, The Internet Protocol adds its own network layer header to the segment or datagram, and this network layer message is now called a TCP/IP protocol suite.

Learn more about Internet Protocol from

https://brainly.com/question/17820678

#SPJ4

Match the Job description with the job titles.

Answers

1) Bricklayer 2) Roofer 3) Architectural drafter 4) landscape architect
number 1 to first box
number 2 to second box
number 3 to third box
number 4 to forth box


Which statement best describes one reason why assembly language is easier
to use than machine language?

Answers

Answer:

machine language uses binary code and assembly language uses mnemonic codes to write a program.

Explanation:

In a nutshell, machine language uses binary code, which is almost impossible for humans to decipher, whereas assembly language uses mnemonic codes to write a program. Mnemonic codes make it simpler for humans to understand or remember something, and so make the language a bit easier for humans to use than machine code.

To notify the browser that we have JavaScript code, we should use .............

Answers

Answer:

almost all browsers allow you to type JavaScript code directly into the browser, using something called the “console

A good algorithm should have which three components?
OA. Commands, inputs, and outputs
OB. Clarity, readability, and sequencing
OC. Steps, order, and outcomes
OD. Clarity, simplicity, and brevity

Answers

A good algorithm should have these three components: C. steps, order, and outcomes.

What is an algorithm?

An algorithm simply refers to a standard formula which is made up of a set of finite steps and instructions that are executed on a computer system, in order to enable a software solve a particular problem under appropriate conditions.

In Computer technology, there are three (3) components that a good algorithm should have these include the following:

StepsOrderOutcomes

Read more on algorithm here: brainly.com/question/24793921

#SPJ1

advantages and disadvantages of algorithm​

Answers

Answer:

\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\

Explanation:

It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program

Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.

Which programming best practice does saving code snippets help you achieve?

O using consistent indentation and formatting

O documenting all changes and tracking revisions

O avoiding repetition of the same code in a program

O avoiding having to re-create code that you or another programmer has already written

Answers

Answer:

When it comes to formatting your code (not just strings), the Python programming community has spent a long time establishing and documenting best practice.

Missing: tracking ‎| Must include: tracking

Pls help me po:{

I need the answer lang po talaga , pls:{

Answers

Answer:

for cutting it's scissors for measuring it's the tiny measurement spoonlikes for mixing it's the blender and preparatory

What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.

Answers

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.

What type of hackers are motivated by social or political issues?

Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated  aim or reason.

The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.

Learn more about Hacktivism from

https://brainly.com/question/5483494

#SPJ1


what is a program answer these question
of grade-6​

Answers


a series of coded software instructions to control the operation of a computer or other machine.

Write a Java expression that converts the value of 'y' into an integer, and assigns the value to 'x'.

Answers

[tex]\huge{\purple{\underline{\underline{\mathfrak{\red{\bigstar answer:: \bigstar}}}}}}[/tex]

int y = (int) y;

int x = y;

Hope it helps..♪
Other Questions
The beginning balance on the monthly bank statement for Tristan's checkingaccount was $268.53, and the ending balance was $387.66. What can be saidabout Tristan's transactions for the month?A. He had $656.19 more in debits than in credits.B. He had $119.13 more in debits than in credits.OC. He had $119.13 more in credits than in debits.O D. He had $656.19 more in credits than in debits. transportation of seedling is not done for1 rice 2 maize 3 onion 4 brinjal There are 11 cookies in a jar, as listed below. The cookies are all the same size and shape.6 chocolate chips 5 oatmealOne cookie is randomly selected from the jar and not replaced. Then a second cookie israndomly selected and not replaced. What is the probability they are both chocolate chips? Can I pass 6th grade with these grades:ELA: 50.8%History: 25.6%Math: 60%Science: 91.3% (PLEASE SOMEONE HELP BRO). Use the drop-down to complete the following inequality. Please help i'm stuck on this and it's due soon, questions are in the images, will give brainliest!(the images go with part A and B)Part A : In a wooded area in North Carolina, two teenagers discovered an abandoned pistol and a few other items that led them to call 911. Crime scene personnel and investigators processed the scene and found human remains along with other items. They then photographed all the evidence at the crime scene. Analyze the photographs of the skeletal remains and other items and determine the gender and age of the victim.Part B: Examine visible trauma marks and other evidence found at the crime scene and make a preliminary hypothesis on the cause and manner of death.Part C:Research four databases and describe how these databases would help you investigate this case. The american heart association recommends strength training how many days per week for healthy adults and many low-risk cardiac patients?. How many 5-digit numbers are there, that are "even"? Show all work/ calculations. Which of these is a recurring cost of car ownership?A. Windshield replacementB. Driver's license application feeC. GasO D. Bumper replacement Dana receives the writing prompt below.Write an informative essay about the first woman in Greek mythology, Pandora. Summarize her myth and explain the impact of her story on todays culture.Danas first research question is What events occurred in the myth of Pandora? What should her second research question be, and what would be the most credible source for research?Dana should ask, What are some modern examples of Pandoras influence? using an encyclopedia entry for research. Dana should ask, What are some modern examples of Pandoras influence? using a blog for research.Dana should ask, What was the effect of Pandoras box upon Greek culture? using an encyclopedia entry for research.Dana should ask, What was the effect of Pandoras box upon Greek culture? using a blog for research. Science I need to know the answer PLEASE HELP ME!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Six students each make an electromagnet for an investigation. Each student wraps copper wire around a nail and attaches each end of the wire to a 9-volt battery. The students use their electromagnets to pick up paper clips. The table shows the number of paper clips each student picks up with their electromagnet.a) Write one question about how the electromagnets were made that the students could answer that would help explain the differences in the numbers of paper clips picked up by the electromagnets. Explain your reasoning.b) Identify one factor, other than how the electromagnets were made, that would affect the number of paper clips picked up by the electromagnet. Explain your reasoning. Read the excerpt from "A Genetics of Justice by Julia Alvarez. Periodically, Trujillo would demand a tribute, and they would acquiesce. A tax, a dummy vote, a portrait on the wall. To my father and other men in the country, the most humiliating of these tributes was the occasional parade in which women were made to march and turn their heads and acknowledge the great man as they passed the review stand. If you did not march, your cdula would not be stamped, and without a stamped identification card, you could do nothing; in particular, you could not obtain your passport to leave the country under the pretext of wanting to study heart surgery. This was the second escapethis time with his whole familythat my father was planning. The day came when my mother had to march. The parade went on for hours in the hot sun until my mother was sure she was going to faint. Her feet were swollen and hurting. The back of her white dress was damp with sweat. Finally when she thought she could not go one more step, the grandstand came into sight, a clutter of dress uniforms, a vague figure on the podium.Which statement best analyzes how the author develops the central idea across the paragraphs?A. Alvarez traces how Trujillo demanded the tributes, how her family reacted, and how it was finally her mothers turn to pay tribute.B. Alvarez describes how her family reacted to Trujillos demands and how that affected their lives when they left the Dominican Republic.C. Alvarez retells her mothers humiliating experience of paying tribute to a dictator she did not support.D. Alvarez describes how Trujillos mandatory taxes and tributes affected her mother in a negative way. Most academic essays are written for a specific audience.1) True2) False Please help on my final most Yall Can doesnt have to be all the answers rainbow's is having a discount on swimsuits for the start of summer. the original price of the swimsuit is $30 and it is marked as 25% off. what is the sale price that the customer will pay? Larry has $4$-cent stamps and $9$-cent stamps, which he can combine to produce various amounts of postage. For example, he can make $40$ cents by using four $9$-cent stamps and a $4$-cent stamp, or by using ten $4$-cent stamps. However, there are some amounts of postage he can't make exactly, such as $10$ cents. What is the largest number of cents that Larry cannot make exactly from a combination of $4$- and/or $9$-cent stamps Write your personal reaction to this event. you have to sing all alone for the p.t.a. program. what are ways we affect the environment positively