Write true or false:-
1. The start attribute always accept an integer value.
2. Description list is used to create a bulleted list.
3. The <DT> tag is used to create a table in HTML.
4. The <TR> tag is used to create cells in the table.
5. The VALIGN in attitude of the <TD> tag is used to Align the position of text in the cell vertically.

And please don't give only one answer, if you are giving, then please give all the answers. ​

Answers

Answer 1

Answer:

false

true

false

true

false

Explanation:

.


Related Questions

hiiiiiiiiihwdawdfgthnythgrfergthyjuhgfd

Answers

Answer:

Your answer would be gas.

Explanation:

Steam is just water just evaporated.

no i will not marry u

a network consisting of nodes covering a small geographic area is a

Answers

Answer:

that is a Local Area Network (LAN)

Can someone please help

Answers

Answer:

Explanation:

la reponse est le premier et le 3 eme pointcar en effet le premier point c est logiqye e le 2 e aussi  

In the earliest stages of human history, what was the only medium?
ink
books
the human body
magazines

Answers

The only medium that was used for the dissemination of information during the earliest stages of human history is: C. the human body.

Information sharing is an integral part of human life because no human is able to live comfortably in isolation without the need to share or receive messages from others through a particular medium, especially for awareness, growth, development and proper decision making.

Prior to the medieval period, which is the earliest stage of human history, the human body serve extensively as the only medium that was used for the dissemination of information from one person to another.

This ultimately implies that, various symbols, signs and objects that were  mutually understandable to the people were drawn or written on human body, so as to serve as a medium during the process of communication.

Read more: https://brainly.com/question/14810228

The ________ font is applied to titles and the ________ font is applied to all other text in slides.

Answers

Answer:

cursive on tile and original micky fount in the storybook

Explanation:

which route would be used to forward a packet with a source ip address of 192.168.10.1 and a destination ip address of 10.1.1.1?

Answers

Considering the available options, the route that would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1 is "O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0"

What is Route in IP address?

IP routing generally transmits packets from one network to another host on another remote network.

The process of IP routing involves evaluating routing tables to specify the following hop address of the packet that should be sent.

IP Routing in this case

Considering the IP address in the question, the best match is the route in the routing table that contains the highest number of far-left matching bits.

Hence, in this case, it is concluded that the correct answer is "O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0"

The available options are:

C 192.168.10.0/30 is directly connected, GigabitEthernet0/1

S 10.1.0.0/16 is directly connected, GigabitEthernet0/0

O 10.1.1.0/24 [110/65] via 192.168.200.2, 00:01:20, Serial0/1/0

S* 0.0.0.0/0 [1/0] via 172.16.1.1

Learn more about IP Routing here: https://brainly.com/question/6991121

I need an If else statement that sorts three numbers from a file from least to greatest

Answers

void sort3(int& a, int& b, int& c)
{
if (a > b)
{
std::swap(a, b);
}
if (b > c)
{
std::swap(b, c);
}
if (a > b)
{
std::swap(a, b);
}
}

PA theme is a major message that a writer convoys through a text. you have explored many themes in the hobbit one theme in the novel is that good has the ability to triumph over evil. using specific examples from the text, explain how this theme develops over the course of the novel

Answers

Answer:

The Hobbit’s main theme is Bilbo’s development into a hero, which more broadly represents the development of a common person into a hero. At the beginning of the story, Bilbo is timid, comfortable, and complacent in his secure little hole at Bag End. When Gandalf talks him into embarking on the quest with Thorin’s dwarves, Bilbo becomes so frightened that he faints. But as the novel progresses, Bilbo prevails in the face of danger and adversity, justifying Gandalf’s early claim that there is more to the little hobbit than meets the eye.??????

Explanation:

Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after tax and tip, for a passed in price, assuming tip is always 15% and tax is always 8%?

a. public double getFinalPricel double tips, double tax).
b. public double getFinal Price double tax)
c. public double getFinalPrice/double basePrice, double tips)
d. public double getFinalPrice double basePrice, double tips, double tax)

Answers


D. I hope it helped

Your grandmother tells you a dollar doesn't go as far as it used to. She says the "purchasing power" of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer. ​

Answers

Answer:

The obtaining influence of a dollar is substantially less on the grounds that more cash is made and causes the value of the dollar greenback to diminish, making things increasingly costly. This is called swelling. In any case, when less cash is made, the value of a dollar greenback increments and things turn out to be more affordable. This is called flattening. As the years go on, the purchasing power of a dollar decreases and decreases.

Hope that helps. x

Which type of relationship is responsible for teaching you values and how to communicate?
a.
online
b.
friend
c.
colleague
d.
family


Please select the best answer from the choices provided

A
B
C
D

Answers

answer:

its either b or d

explanation:

On the following page, write a static method print Short Words that accepts two parameters:_____.
a. a String str containing a list of words (separated by spaces), and an integer maxLength .
b. This method should print out the words in str whose lengths are at most maxLength.
c. You can assume there will always be a space after the last word in the string.

Answers

Methods in Java are collections of program statements that are named, and executed when called/invoked

The printShortWords method in Java where comments are used to explain each line is as follows:

//This defines the static method

public static void printShortWords(String str, int maxLength){

    //This iterates through each word in the string

    for(String word: str.split(" ")){

        //The compares the length of each word to maxLength

        if(word.length()<=maxLength){

            //If the length of the current word is atleast maxLength, the word is printed

        System.out.print(word+" ");

        }

    }

}

Read more about static methods at:

https://brainly.com/question/19360941

Vivo critique 6 sentences

Answers

Answer:

im sorry i cant understad

I need help fixing “Love Nikki” game on my phone. I had it on my phone and it worked just fine but then igot a new phone and tried theDownload it but when I opened up the app it kept saying update the game so I clicked update but then after that it wouldn’t even update and it just said update feel rule out mistake. I thought it was just my new phone so I went back to my other phone but it was doing the same thing. I have 5G on my new phone so internets not the problem.

does anybody know how to fix it so I can play the game again?

Answers

Answer:

Try resetting your phone multiple times or uninstall and add the game again. If not, check settings and see whats wrong. Or just sign out of your phone and sign in again. Hope this helps :D

python Better Password Prompt
Write a program that uses a loop and a half to prompt a user for a password. You should prompt the user for the password. If they get it correct, break out of the loop. If they don’t get it correct, you should give them an error message and ask again.

Sample Run:

Enter password: 123123
Sorry, that did not match. Please try again.
Enter password: password
Sorry, that did not match. Please try again.
Enter password: CODEHS
Sorry, that did not match. Please try again.
Enter password: abc123
You got it!
Note: You need to set SECRET to abc123 to run the tests

Answers

We use an indefinite while loop to keep the user entering the password. In the loop, we use if-else structure to check the password. If it is "abc123", the password is found and stop the loop using a break. Otherwise, the password is not correct. Note that since we do not use any break statement in the else part, the loop will continue asking for the input

Comments are used to explain each line of the code.

You may see the output in the attachment.

#set the SECRET

SECRET = "abc123"

#create a loop

while True:

   

   #ask the user to enter a password

   password = input("Enter password: ")

   

   #check if the password is equal to SECRET

   # if it is, state that password is correct and stop the loop using a break

   # otherwise, state that password is not correct

   if password == SECRET:

       print("You got it!")

       break

   else:

       print("Sorry, that did not match. Please try again.")

Here is another question related to the loops:

https://brainly.com/question/25694810

Which devices are managed through device management?
Device management is the process of managing devices.
NEED ANSWER ASAP PLS HELP

Answers

Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software

How does a cell phone change the
incoming signals from a caller into sound that
you can hear

Answers

Answer:

they send electrical signals to the buzzer. The buzzer changes those electrical signals into sound. You hear the buzzer sound and know that someone is calling you.

Explanation:

Answer: Cell phone or any electric device you can say changes the electric signal to radio waves at transmitting end which is converted back to electric signal and perceived as sound waves at receiving end

Explanation:

Question 11
Methods that return a decimal value must be declared using what type?


a. int

b. void

c. double

d. String

e. null


Question 12

Which of the following is true when x = 15?


a. (x >= 15) && (x < 13)

b. !(x > 13) || (x > 16)

c. (x > 13) && (x < 17)

d. (x < 15) || (x > 15)

e. (x <= 13) || (x >= 17)

Answers

Answer:

11. a, 12.c

Explanation:

bc numbers must be declared as ints and 15 is greater than 13 but lesser than 17

what actions can be performed via voice commands using 2022 versa’s siri® eyes free?

Answers

The actions that can be performed via voice commands using 2022 versa's siri® eyes free are;

- Send and receive text messages

- Make and receive calls

- Select and play music

2022 versa's siri® eyes free is a media feature that can be connected to your iPhone in the latest car by Nissan called Nissan 2022 versa.

Now Siri® Eyes Free Available functions include:

Making and receiving callsSending and reading text messagesSelecting and playing musicReading notificationsRequesting directions or other

This Siri® Eyes Free is usually located on the steering wheel and the way to operate it is by;

Press THIS button on the steering wheelSpeak a command.Wait for Siri® Eyes Free to reply. Within 5 seconds, press THIS button on the steering wheel to reply or give another command.

Read more on cars at; https://brainly.com/question/25981194

You can protect yourself from identity theft by using ____ when transmitting information over network connections. a. cookies b. port-scanning c. biometrics d. encryption

Answers

Answer:

D

Explanation:

Encryption secures transmissions on the internet to or from your PC

I need some questions and answers in spreadsheet​

Answers

Answer:

you need to show what you need help with

Explanation:

Is this statement true or false? While in slide show mode, if you are not careful you can close the application by clicking the x on the menu bar. True false.

Answers

Considering the Microsoft PowerPoint application, it is False that while in slide show mode, if you are not careful, you can close the application by clicking the X on the menu bar.

Why is it False?

During the slide show of documents whereby the pages of documents are being passed or moved automatically, or by itself, when a user mistakenly or intentionally presses the X on the Menu Bar, the window will ask the user if he wants to save the document before closing.

Slide show in Microsoft PowerPoint is one of the techniques in which a user or Speaker can make a presentation to the audience.

Hence, in this case, it is concluded that the correct answer is False.

Learn more about Microsoft PowerPoint here: https://brainly.com/question/14388120

Answer:

"False"

Explanation:

I took the test!

what is font tag? write the name of attribute which is used in font tag​

Answers

Answer:

The font tag is used to change the color, size, and style of a text.The font tag is having three attributes called size, color, and face to customize your fonts. To change any of the font attributes at any time within your webpage, simply use the <font> tag.

A PIN of four digits has 10,000 (or 104) combinations. This could theoretically be guessed by a computer in milliseconds. The most popular PIN numbers are 1111, 1234 and 0000 making up around 20% of PIN numbers. Anything beginning with 19XX is also very common, as is 2580. Why?

Answers

Answer:

19xx could be a birth year, easy to remember

2580 is easy to remember because on a keypad the numbers are aligned vertically.

Note that from the statement above, one can say that 19xx is common as it is linked with birth year and thus easy to recur and also 2580 is very easy to recur because on a keypad the numbers are soften matched vertically.

What is pin about?

Pin or digit code are often used in our debit cards, credit cards and in a lot of mobile phones for security purposes.

Note that Note that from the statement above, one can say that 19xx is common as it is linked with birth year and thus easy to recur and also 2580 is very easy to recur because on a keypad the numbers are said to be aligned vertically.

Learn more about digits code from

https://brainly.com/question/3118454

#SPJ9

List three (3) features of first generation computer
PLEASE HELP!!!!!

Answers


Features of first generation computers:

Technology used: vacuum tube.

Machines languages were used to instruct the computer.

Magnetic core memory was used as primary memory.

Electrostatic tubes, Parer tape, punch card, magnetic tape.

An animation of a person standing with their arms extended out to their sides. There are 3 dimensional boxes around the torso of the person showing how to create a shirt. What animation process does the photo above help you visualize? a. Morphing c. Motion capture b. Building 3 dimensional models d. Animation rendering Please select the best answer from the choices provided A B C D

Answers

Answer:

c

Explanation:

What security setting can cause a mobile device to erase installed apps and data if the passcode is incorrectly entered a number of times

Answers

Answer:

A Hard Reset. Aka a data wipe

Explanation:

a hard reset will allow you to completely clear all information on a device without having to log into it. It will set the phone back to factory defaults.


HELP IMPORTANT!!

i need help with Java basics

Answers

Answer:

C

Explanation:

Strings should be concatenated with +.

Tom is not sure how to code contents such as title and meta elements. These are coded as ____ elements.

Answers

Answer:

Tom is not sure how to code contents such as title and meta elements. These are coded as head elements.

Hope that helps. x

Answer:

head elements

Explanation:

answer is above

Is this statement true or false? Title text boxes on every slide must be the same format. True false.

Answers

false as you can adjust the boxes to your liking even add more if needed
Other Questions
How many fish are in the aquarium in the restaurant? why was the colonists response stronger in 1774 than it had been in 1765 what part of the brain is responsible for happiness? If Alex is 14 years old, and Ben is 17 years old, in how many years will the sum of their ages be 169 years? Solve for x in the hanger below Describe a vibration that is not periodic. NO LINKS PLEASE Review the steps of summarizing. Use your notes to write a brief summary of the interview of Miep Gies. List the angles of A KLM with verticesK(-2,-2), L(2, 6), M(7, -2) in orderfrom smallest to largest. Over what interval is the graph ofy=-2 + 1x - 2 increasing? sectional differences developed in the united states largely because Offering 50 points and brainliest if you answer without links. Suppose you have 5 different colored shirts (grey, white, black, brown, and orange) and 4 kinds of pants (jeans, sweatpants, khakis, and plaid).What is the probability on Monday you wear a grey shirt with jeans and put it in the laundry, then on Tuesday wear a black shirt with sweatpants?OA)OB)OC)ODDone and ReviewNext Question2021 McGraw-Hill Education. All Rights ReservedPrivacy and Cookies | Terms of Use | Minimum Requirements Platform StatusSign outINTL 0 The offensive team gets _________ attempts to advance the ball ten yards in football.2345 How did Washingtons Farewell Address affect the United States Please guys I need help!Can someone write me a narrative essay about a road accident CalculatorWhat is the value of x PLS WILL MARK BRAINLIEST Solve the equation for all values of x by completing the square.x^2 + 6x 27 = 0 This poster from the 1850s appeared in response to the: asu; Mis bnuestros, Mis cnuestro; Mi dsus; Mi Short-term goals areO limited steps toward the accomplishment of long-term goals.desires relating to major accomplishments that take some time to achieve.O daily tasks one must accomplish throughout the day.O dreams about the ultimate job.