what do you mean by HDML coding ​

Answers

Answer 1

Answer:

hdml coding is a standard markup language for documents designed to be displayed in a web browser.

Explanation:

it can be assisted using things like CSS or JS


Related Questions

Your computer has been operating without problems for some time, but on your most recent startup, nothing appears on the monitor screen. The lights for the keyboard, floppy drive, and hard disk flash at startup. Your computer has an American Megatrends, Inc. (AMI) BIOS program, and the computer generates one long beep followed by eight short beeps at startup. Which item is most likely to be defective

Answers

the board if not try a restart a couple more times and we see what happens from there

j. A computer on a network that acts as the central storage location for

programs and data used on the network

Answers

Answer:

Una unidad central (en inglés mainframe) es una computadora grande, potente y costosa, usada principalmente por una gran compañía para el procesamiento ...

Explanation:

Ron is an electrician. He loves to work with wires and switches. What type of input does Ron carry when called for fixing an electric problem?
(Correct answer only)

A. tools
B. information
C. capital
D. people
E. power

Answers

I think the answer would be tools cause that what Ron would use. The answer is tools

Fault tolerance refers to

how a network fails.

how well a network recovers after a failure.

mirror operations.

servers.

Answers

Answer:

servers

Explanation:

because it good for servers

Answer: How well a network recovers after a failure.

Explanation:

The game begins with the player having 20 POINTS

The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.

If the POINT is a 7 or 11, the player wins his POINT

If the POINT is a 2, 3, or 12, the player loses his POINT

If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until

The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT

The player rolls a 7 and then he loses his POINT.

The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS

After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work

Answers

Answer:

Following are the code to this question:

import random#import package for using random method  

def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable

   dice1 = random.randint(1,6)

   dice2 = random.randint(1,6)

   return dice1 + dice2

def rolling(): # defining method rolling

   n_roll = 0  # defining num variable that initial value that is 0.

   p = 20 # defining variable p for looping, that points in between 1 and 59

   while p > 0 and p < 60: # defining loop that counts value dice value two times  

       d = rolling_dice()#defining d variable that hold method value

       n_roll+= 1 #defining n_roll that increment n_roll value by 1

       if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable

           p+= d   # use p variable that adds d variable

       elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator  

           p-= d#defining d variable that decreases d variable variable

       else: # defining else block

           p1 = d # using p1 variable that store d value  

           while True:# defining loop that calculates values

               d = rolling_dice()#defining d variable that holds method values

               n_roll += 1 #increment the n_roll value by 1

               if d == 7:#defining if block that checks d value equal to 7

                   p -= p1#subtract the value of p1 in p variable  

                   break # exit loop

               elif d == p:#defining elif block to check d value is equal to p

                   p += p1#adds the value of p1 in p variable  

                   break#using break keyword

   if p<= 0:#defining if block that checks p-value is less then equal to 0  

       print('Player lost')#using print method

   elif p>= 60:#defining else block that checks p-value is greater than equal to 60

       print('Player won')#using print method to print the value

   print('number of dice rolls:', n_roll)#use print method to print n_rolls value

rolling()

Output:

Player lost

number of dice rolls: 38

Explanation:

In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.

In the next step, another method the "rolling"  is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.  

Question 55 :You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission?

Answers

Answer:

The protocol will drop the packets

The application will automatically re-transmit the packets

Explanation:

Based on design, the routers will drop the packets as allowed by the Internet Protocol, due to the collision that resulted from the router being busy and the network is congested or that the packet is corrupt as indicated by the check sequence of the Ethernet frame or the IPv4 header checksum

Given that the application uses User Datagram Protocol (UDP) which does not allow recovery of lost packets, but have their defined methods of overseeing lost packets, as such the application will re-transmit the packet.

In python,_______ are used to define the conditions necessary for a while loop to run.

Answers

Answer:

Relational Operators

Explanation:

We can make a while loop run only when some variable or whatever is relative to something else.

The valid operators are:

<, >, =, <=, >=, and =!

Hope this helped!

Answer:

sorry not sure

Explanation:

&. Give three differences between a
web browser
and web page​

Answers

Answer:

The three differences between the Web page and Web browser are given below.

Explanation:

A web browser seems to be a search application that enables internet connectivity. A web-page seems to be a single document containing Website content.A web browser, including Google Chrome as well as Firefox, has become a program on oneself machine. A web page, like Google or Twitter, is what you will need the application to accessWeb browsers can view the contents of the site via the application. Webpage should be any web page and sometimes web destination. If something is opened on the internet, it's a website.

What steps are needed for word to create an index

Answers

Answer:

Do this:

Position the insertion pointer where you want the index to appear. If you want the index to start on a new page, create a new page in Word. ...

Click the References tab.

In the Index group, click the Insert Index button. The Index dialog box appears. ...

Click the OK button to insert the index into your document.

Answer:

Position the insertion pointer where you want the index to appear.

(the insertion point is the point where the next characters typed from the keyboard will appear)

If you want the index to start on a new page, create a new page in the program you're using

Then you click the References tab.

In the Index group, click the Insert Index button.

When the Index dialog box appears, click the OK button to insert the index into your document.

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Answers

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

This attack is aimed to avoid legal customers of one's website from accessing it.  In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  One other way to successfully attack is to send fake requests from the attacker.

Analog computers are general purpose computers : true ? or false ?​

Answers

Answer:

false

Explanation:

Analog Computer is functioned to do mathematical model of analog computers. This model consists several basic units which are interconnected in order to compute some function.

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

Order the steps a user needs to follow to preview and then print a document

Answers

Answer:

Click file tab, click print tab, preview document, print document.

Answer:

Click file tab, click print tab, preview document, print document.

Explanation:

Click file tab, click print tab, preview document, print document.

What are the file extensions of files created with: - Microsoft Office Access - Microsoft Office Publisher

Answers

Answer:

The file extensions of files created with Microsoft Office Access is .adb for Access project

The file extension of files created with Microsoft publisher is .pub

Explanation:

The file extensions of files created with Microsoft Office Access are;

.adp = Access project

.adn = Access blank project template

.accdb= Access database for 2007, 2010, 2013, and 2016 versions

Other file extensions include

laccdb, .accdw, .accdc, .accda, .accdr, .accdt, .mdb, .mda, .mdw, .mdf, .mde, .accde, .mam, .mad, .maq, .mar, .mat, .maf

The file extension of files created with Microsoft publisher is the .pub

learn to accept your mistakes even when you have done your ​

Answers

Answer:

besttttttttttttttttttttttt

Answer: done your best :)

How a student can use computer to improve academic performance?

Answers

Answer:

k Nishant

Explanation:

he can learn many things internet by using computer he change his self by learning about many things

Answer:

A student can use it by searching up things with his/her computer.

Browse for different new things everyday that gives knowledge.

Ask questions.

Do new things everyday.

A computer can easily input grades and send data.

Explanation:

Okay.

Can you recommend me a movie? ​

Answers

Ice age definitely……….


What is the difference between hacking and cracking

Answers

Explanation:

The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.

What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation of an organization, its information systems, and its facilities?

Answers

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

The IT manager has tasked you with installing new physical machines. These computer systems are barebone systems that simply establish a remote connection to the data center to run the user's virtualized desktop. Which type of deployment model is being used

Answers

The type of deployment model that is used is referred to as Thin client.

A thin client is also referred to as lean client. It is a model that runs on the resources that are stored on a central server rather than in the resources if the computer.

A thin client is useful for shared services, and desktop virtualization. The work carried out by the server include storage of data, performing if calculation, launching software programs etc.

On conclusion, since the information given in the question explains that there's a remote connection to the data center to run the user's virtualized desktop, then the deployment model is a thin client.

Read related question on:

https://brainly.com/question/13934016

What is the role of a design tWhat is the role of a design tool in a Robotic Process Automation (RPA) solution?

Answers

Answer and Explanation:

Robotic Process Automation(RPA) are software tools that apply artificial intelligence(AI) technology to automate digital routine tasks for business executives. It mimics everyday tasks and automatically executes them for the user.

Design tools in RPA play the role of infusing the best design into RPA software, it works with the popular phrase "design thinking". Robotic process automation software are now in tune with the popular buzz of a user centered approach to design of RPA tools. This ideology focuses on deploying RPA software that appeals to users and are therefore market friendly.

this help me please. ​

Answers

Answer:

1) 1011010

2) 1100100

3) 1010101

4) 23

5) 22

6) 24

When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database

Answers

Answer:

Database

Explanation:

Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.

what's the answer to this​

Answers

Answer:

S

Explanation:

The index operator will address individual characters in the string.

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a

Answers

Answer:

A reverse proxy.

Explanation:

A service that might appear to be a single server to external clients, but actually represents many servers living behind it, is known as a reverse proxy.

In Computer Networking, a single server can be configured to appear as the endpoint for many other servers acting behind it through the use of a reverse proxy.

Hence, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?

Answers

Answer:

The correct answer will be "Semi-structured data".

Explanation:

Semi-structured data comprise evidence that just isn't data collected in some kind of a traditional database management system, but then neither is content typed. It's indeed descriptive information or structured data, but that's not organized into a theoretical design, like a chart or perhaps a graph centered through an entity.

So that the given scenario is the example of semi-structured data.

How should you behave in an online academic environment?

Answers

Answer:

as u want lol

I think it's funny

Answer:

Maintain discipline

Ask questions

Try not to crack jokes

dress smartly

be friendly

don't underestimate anyone each person have their own unique skills

A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.

Answers

Answer:

A. Document findings, actions, and outcomes.

F. Run a virus scan.

Explanation:

what are the features of dot net ???​

Answers

Answer:

1) interperability

2) portability

3) security

4) simplified deployment

5) base class library

6) language indepence

Other Questions
What is the range for the followingnumbers?5, 1, 12, 3, 4, 2, 10 Each lap around a park is 1 15 miles. Kellyn plans to jog at least 7 12 miles at the park without doing partial laps. How many laps must Kellyn jog to meet her goal? Logan is a religious man, and he has been hearing a voice in his head for the past several months. The voice asks him to purge out the sinners from the world. He kills 9 people to obey the command of the voice. Which of the following symptoms of schizophrenia is Logan showing? A. Impulsivity symptoms B. Negative symptoms C. Cognitive symptoms D. Positive symptoms Solve for angles A-D Write the explicit rule by writing each term as the product of the first term.1.) N 1 2 3 4 F(n) 3 15 75 3752.) 40, 60, 90, 135, Find the arc length of the partial circle. Consider a world named Square World. In this world a person can move only up,down, left, right squares and only one square at a time. The squares are numbered. Insquare number 3, there is our hero Yellow. His dream girl Pinky is in square number16. There are bombs in the red squares and if someone goes there, he/she will bebusted! Yellow wants to see Pinky as quickly as possible and starts his journey fromsquare 3. Help him to find the shortest route. Which search technique will you use tohelp Yellow? Demonstrate your idea by showing your simulation step by steps. PLEASE HELP!!!! i need to compare and contrast between Mohandas Gandhi and augusto pinochet!! needs 500-600 words or just try and make it long please!!! Horton Corporation is preparing a bank reconciliation and has identified the following potential reconciling items. Indicate how each would be reported on a bank reconciliation.a. Deposit in transit $5,500. b. Bank service charges $25. c. Interest credited to Hortons account $31. d. Outstanding checks $7,422. e. NSF check returned $377. *Do the equations have solutions? x2=x Which are features of myths? Check all that apply. 1 supernatural gods or animals 2 fantastic settings 3 humorous elements that entertain the reader 4 an attempt to explain the origin of the universe 5 characters found in everyday life 6 conflicts between worlds, beings, self, or natural elements 7 everyday events Mr. Cistern opened up a financial services company in a small close-knit retirement community. He promised large returns and little risk using his special system. He convinced many retirees to invest their entire savings. After several months, he suddenly disappeared with all of the firm's assets. An investigation revealed that Mr. Cistern had done this many times in the past. Mr. Cistern may have:___________. Select one: A) Narcissistic personality disorder B) Borderline personality disorder C) Histrionic personality disorder D) Antisocial personality disorder In the figure above, O is a circle. What is themeasure of obtuse angle AOB, in degrees? Find combinations using a school cafeterias meal! (20 POINTS! PLEASE HELP) Fruits: Apples, Bananas, and Grapes. Vegetables: Cauliflower, Carrot, and Corn. Protein: Green beans, Salmon, and Almonds. List all possible combinations and count the total number of possibilities. 1. In a mechanical design, it is recommended to use standard size/dimension to overcome uncertainties in stress or material strength.A. TrueB. False2. Steels' surface fatigue strength can be correlated to their Brinell hardnesses. A. TrueB. False3. If a material point has three principal stresses 01 = 02 = 03 = 300kpsi, then the maximum shear stress is Tmax = 150kpsi. A. TrueB. False4. The endurance limit of a material is independent on the size of a part. A. TrueB. False5. The tensile stress in a bolt is usually calculated through tensile force divided by area of unthreaded rod's cross-section area. A. TrueB. False6. Edge shear-out or tear-out is one failure mode in bolted or riveted joints. A. TrueB. False7. Pretension of bolts can be controlled by a torque wrench. A. TrueB. False8. The material ultimate tensile strength of a spring coil is dependent on its coil diameter. A. TrueB. False9. Adhesive joints are much stronger in tensile loading than shear loading.A. TrueB. False 10. The dominated loading condition in a helical spring is torsion along coils.A. TrueB. False11. The principal advantage of conical springs is that the its spring rate is non-linear.A. TrueB. False 12. The dimensions of a bearing is coded by two-digit series numbers according to ABMA, one digit for width and the other one for diameter. A. TrueB. False13. Three key things to determine selection of bearing are load, life and reliability. A. TrueB. False14. Straight roller bearings can carry large radial loads and small amount of axial load.A. TrueB. False 15. In the AGMA method of gear analysis, gear strength values are the true material strengths. A. TrueB. False16. A planetary gear train allows for two degrees of freedom.A. TrueB. False Solve the equation for x. the square root of the quantity x plus 4 end quantity minus 7 equals 1 x = 4 x = 12 x = 60 x = 68 Want our companion from birth to death , familiar as the seasons or the earth varying only degrees .Which theme is represented in this excerpt from Nectar in a Sieve?A. Knowledge as powerB. The necessary of hope for survivalC. Suffering as a way of lifeD. The imminence of loss Find the center, vertices, and foci of the ellipse with equation 4x2 + 9y2 = 36. Center: (0, 0); Vertices: (-3, 0), (3, 0); Foci: Ordered pair negative square root 5 comma 0 and ordered pair square root 5 comma 0 Center: (0, 0); Vertices: (-9, 0), (9, 0); Foci: Ordered pair negative square root 65 comma 0 and ordered pair square root 65 comma 0 Center: (0, 0); Vertices: (0, -3), (0, -3); Foci: Ordered pair 0 comma negative square root 5 and ordered pair 0 comma square root 5 Center: (0, 0); Vertices: (0, -9), (0, 9); Foci: Ordered pair 0 comma negative square root 65 and ordered pair 0 comma square root 65 For which writing prompt would you use an explanatory thesis? A.) Analyze the differences between yoga and aerobics, and then explain which one is better for your body. B.)Describe the poetry of Shel Silverstein and the poems of Jack Prelutsky and then decide which poems are funnier. C.)Compare and contrast traveling by ship with traveling by airplane, discussing the pros and cons of each. D.) Compare and contrast the Great Chicago Fire (1871) and the San Francisco Earthquake of 1906 to determine which was worse. riefly explain ONE example of how contact between Native Americans and Europeans brought changes to Native American societies in the period 1492 to 1700.