Answer:
The body tag
Explanation:
HTML has several tags; however, the tag that handles the description in the question is the body tag.
It starts with the opening tag <body> and ends with closing tag </body>
i.e.
<body>
[Website content goes in here]
</body>
Any text, image, object etc. placed within this tag will be displayed in the website
what type of device is a projector ?
a. input
b. memory
c. output
d. storage
Answer:
output
Explanation:
if I'm wrong sorryyy
Answer:
Output
Explanation:
:D
A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by
O clicking on the View tab.
O saving a contact.
O creating an appointment.
O flagging an email.
A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.
What is a Variable Expense?Business expenses can be classified as either fixed (invariable) or variable. A fixed expense does not change based on a business’s other activities. Costs like rent and administrative salaries are fixed costs, which remain the same no matter how much a business is producing. Imagine a factory that produces pencils — the cost of renting the factory building will remain the same, month after month, no matter how many pencils the company actually produces.
Variable expense ratio expresses variable expenses as a proportion of a company's sales. To calculate the variable expense ratio, simply divide the company's total variable expenses by the company's total net sales. To express the result as a percentage, simply multiply it by 100.
Therefore, A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.
Learn more about variable expense on:
https://brainly.com/question/13097236
#SPJ5
Problem decomposition means
O Fixing the problem
O Solving the problem
O Breaking down tasks into smaller, manageable parts
0 None of the above
PLEASE HELPPPPPP
Answer: Breaking down tasks into smaller, manageable parts
Explanation:
The word decomposition means to break down so Problem decomposition means to break down the problem being faces into smaller parts with the reason being to be able to manage it better.
Some problems are simply too large to handle singularly because of the amount of resources that would have to be devoted. It would be better to break them down into smaller tasks that can then be be confronted one at a time with enough resources to solve them each.
Which of the following variable names follows the rules for naming variables?
A. snack $
B. favorite_snack
C. lunch time
D. 15 minute snack
Define a class named person that contains two instance variables of type string that stores the first name and last name of a person and appropriate accessor and mutator methods. Also create a method named displayDetails that outputs the details of a person
Answer:
Answered below
Explanation:
//Program is written using Java programming language.
Class Person {
private string firstName;
private string lastName;
void set firstName(string a){
firstName = a;
}
string getFirstName(){
return firstName;
}
void setLastname( string b){
lastName = b;
}
string getLastName( ){
return lastName;
}
void displayDetails( ) {
System.out.print(firstName);
System.out.print (lastName);
}
}
//Test program
Class Main{
public static void main(String args [] ){
Person person = new Person( )
person.setFirstName("Karen")
System.out.print(person.getFirstName)
person.displayDetails()
}
}
The illegal copying of program
Answer:Software piracy
Explanation:
What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centimeters?
Answer:
guys all you have to do is divide and multiply 812x913=741356
and this answer they give you going divide 741356. 1225
so easy guys let me in the comment
Explanation:
what security issues could result if a computer virus or malware modifies your host file in order to map a hostname to another IP address
Answer:
Man-in-the-middle attack
Explanation:
In this type of attack, the hacker uses the virus or malware to get and change his IP address and hostname to match the address and hostname of the target host computer. The allows the hacker to gain access to information sent to the target IP address first.
Write a program that asks the user how many names they have. (If they have a first name, two middle names, and a last name, for example, they would type 4.) Then, using a for loop, ask the user for each of their names. Finally, print their full name.
Answer:
The solution is implemented in python:
numnames = int(input("Number of Names: "))
nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]
names = []
for i in range(numnames):
name = input(nametitle[i])
names.append(name)
print("Your fullname is: ",end=" ")
for i in names:
print(i,end=" ")
Explanation:
This prompts user for number of names
numnames = int(input("Number of Names: "))
This lists the name titles in a list
nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]
This initializes an empty list
names = []
The following for loop get names from the user
for i in range(numnames):
name = input(nametitle[i])
names.append(name)
The following instructions print the user fullnames
print("Your fullname is: ",end=" ")
for i in names:
print(i,end=" ")
An example program in Python that asks the user for the number of names they have and then prompts them to enter each name.
It will then print their full name based on the names provided:
python
Copy code
num_names = int(input("How many names do you have? "))
names = []
for i in range(num_names):
name = input("Enter name {}: ".format(i + 1))
names.append(name)
full_name = " ".join(names)
print("Your full name is:", full_name)
In this program, we first ask the user to enter the number of names they have. The input is converted to an integer using int() since input() returns a string.
Then, we initialize an empty list names to store the names provided by the user.
Next, we use a for loop that iterates num_names times to ask the user for each name. The loop variable i starts from 0, so we add 1 to it when displaying the prompt using i + 1.
Inside the loop, we prompt the user to enter the name and append it to the names list. After the loop completes, we join all the names in the names list using the join() method with a space as the separator. This creates a single string representing the full name.
Learn more about python on:
https://brainly.com/question/30391554
#SPJ6
please help me
Match the technology with the appropriate task.
1. graphics software
2. word processor
3. CAD
4. laptop
5. GPS
Complete Question:
Match the technology with the appropriate task.
Column A
1. Graphics software
2. Word processor
3. CAD
4. Laptop
5. GPS
Column B
A. Create a company logo.
B. Get directions to a customer’s office.
C. Type a report.
D. Complete many types of tasks on a computer away from the office.
E. Design a building.
Answer:
1. A
2. C
3. E
4. D
5. B
Explanation:
1. Graphics software: it can be used to create a company logo. Some examples of software applications or programs are Adobe photoshop, Core-draw, illustrator etc.
2. Word processor: it is typically used for typing a text-based document. For instance, type a report. Some examples are notepad, Microsoft Word, etc.
3. CAD: design a building. CAD is an acronym for computer aided design used for designing the graphical representation of a building plan. An example is Auto-CAD.
4. Laptop: complete many types of tasks on a computer away from the office. A laptop is compact and movable, so it can be easily used in any location.
5. GPS: directions to a customer’s office. GPS is an acronym for global positioning system and it is typically used for locating points and directions of a place.
Answer:
1. A
2. C
3. E
4. D
5. B
Write a list comprehension statement to generate a list of all pairs of odd posi
Answer:
Print([(a,b) for a in range(10) for b in range(10) if (a < b and a%2 == 1 and b%2 == 1)])
Explanation:
Here, we declared a range of value for a and b using a for loop and the range function. The values are the first 10 numeric digits. The we used the if statement to establish our constraints;
In other to ensure that ;
Lower digit is written first ; (a < b) ;
Only odd numbers are considered,
a%2 == 1 ; b%2 == 1 (remainder when a and b are divided by 2 is 1.
Both a and b are declared as a tuple in other to obtain a pair of odd values.
draw internal architecture of computer
Answer:
If this is good, let me know in the comments and I'll draw it
Explanation: