For this step, submit your work in the programming environment by running your code, checking your code for a score. The score you get will show a percentage - this is a percentage of the 10 possible points. For example, if you check your code and earn a 50%, this means you have earned 5 out of 10 points. You can check your code more than once, until you earn a score you are happy with.

You must include all of the following requirements in your webpage to earn full points:

A page title
At least three headers (h1, h2, etc)
Paragraph tags
Font styles (for example, using to change the font's color)
At least two images (see below for more information about images)
At least one link to another website
One email link
A background, using either of the following techniques:
Inserting a background image (does not count as one of the two images above)
Changing the background color (using the tag)
Once you complete the steps on this page, proceed to Step 2 on the next page. You must complete both steps to complete this unit's assignment.

Answers

Answer 1

A sample HTML code that contains headers, paragraph tags, hyperlinks is

<h1> This is a header </h1><h2> This is a subtitle heading </h2><p> This is a paragraph </p><a href=”www.brainly.com”> Brainly Website </a>

What is HTML?

This is the building block of a website and is an acronym that means Hypertext Markup Language.

The HTML code that can be used to add a sample image is: "<img src="pic_Brainly.jpeg" alt="Brainly" width="500" height="333">

The src code means the specific location of the external resource

The width and height show how tall and wide the image would be.

The alt shows the alternative information for the image that can be seen when a person hovers over the image on the website.

Read more about HTML and CSS here:

https://brainly.com/question/24051672

#SPJ1


Related Questions

Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain controllers. the attacker initiated the query from a client computer. what type of injection attack did the attacker perform

Answers

Based on the above scenario, the type of injection attack that the attacker perform is LDAP injection

What is LDAP Injection?

This is known to be a  kind of  an attack where one do exploit web via the use of applications that create LDAP statements as a result of on user input.

Note that if an application fails to rightly sanitize user input, it's very easy to modify LDAP statements via the use of local proxy and as such, Based on the above scenario, the type of injection attack that the attacker perform is LDAP injection

Learn more about open connection from

https://brainly.com/question/5338580

#SPJ1

If there is no author to a website you are citing you cannot cite it.

Answers

This is false, if I remember correctly you are supposed to put ‘np’ or something along those lines to represent that there was no author name given. As long as you have other details you CAN cite the website.

(I don’t even know if this is a question but if it is I think was a true or false question?)

Tick the best alternatives 1. Which one of the following is input device? a) Speaker b) Printer c. Monitor d. Mouse​

Answers

Answer:

d. Mouse

Explanation:

A mouse is used to move a the cursor around the screen. You use the mouse to open applications or drag and drop files. It gives the computer instructions (input) . Therefore it is an input device.

Output devices :A speaker is an output device because it outputs sounds.A printer is an output device which is used to output information(print) on paper.A monitor is used to display.

Answer:

D. Mouse

Explanation:

An input device is a device that help input data or commands. A mouse here helps to issue commands to the computer

write the home cell of MS Excel.​

Answers

Answer:

MS Excel

Explanation:

A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includes a few macros designed to secretly gather and send information to a remote server. how is the malicious actor accomplishing this task

Answers

Thay is the malicious actor accomplishing this task is done by using the VBA code.

What is The Visual Basic button?

It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.

To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.

Read more about the spreadsheet :

https://brainly.com/question/26919847

#SPJ1

Suppose you need to create the variable fullname by concatenating the values of firstname, which contains first names, and lastname, which contains last names. what's the best way to remove extra blanks between first names and last names

Answers

The right way to remove extra blanks between first names and last names is

data temp;

set cert.maillist;length FullName $ 40;

fullname=trim(firstname)||' '||lastname;

run;

What is TempData?

This is known to be a term that is used to  transfer data from view to controller and it is one that saves the data temporarily.

Note that The right way to remove extra blanks between first names and last names is

data temp;

set cert.maillist;length FullName $ 40;

fullname=trim(firstname)||' '||lastname;

run;

Learn more about data from

https://brainly.com/question/25639778

#SPJ1

An intentionally disruptive program that spreads either from program-to-program or from disk-to-disk is known as a(n)

Answers

Answer:

Explanation:

A computer virus


what is a program answer these question
of grade-6​

Answers


a series of coded software instructions to control the operation of a computer or other machine.

A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques. they would like to further enhance the solution to recognize signs of potential check fraud and alert their security teams accordingly.

which technology could be combined with the current solution to do this?

Answers

In the case above, Machine Learning technology could be combined with the current solution.

How will Machine Learning help?

Machine Learning is known to be a tech that can help to streamline the bank operations  in terms of receiving and processing checks/cheques.

Therefore, In the case above, Machine Learning technology could be combined with the current solution.

Learn more about Machine Learning  from

https://brainly.com/question/25523571

#SPJ1

You are developing control software for a car whose latest model will have a network connection. software upgrades will be delivered over the air rather than at service visits, so that any security vulnerabilities can be patched quickly. this in turn means that you will have to provide patches, to deal with both security and safety issues for the next 25 years. discuss how this is likely to affect your development process, and the implications it will have for costs.

Answers

Answer:
Explanation:

koszty będoł spadać dla osoby z autem

Which original VPN protocol is supported by most platforms but offers low levels of security?

IPsec
PPTP
L2TP
SSL VPN

Answers

Answer:

vpn

Explanation:

PPTP is the least secure. ...

L2TP/IPsec is a good VPN solution for non-critical use; however, this protocol, like PPTP, has been compromised as well. ...

Across many areas of the IT world, OpenVPN is easily the best all-around VPN solution.


type the correct answer in the box. spell all words correctly.
james wants to create a digital portfolio to show case his work and experience. which supporting document should he include to show the
purpose, subject, and technical details of the designs

Answers

The supporting document that he should include to show the purpose, subject, and technical details of the designs is a link and also user experience.

How do you create a digital portfolio?To create a good Digital Portfolio, one can:Use their strongest samples. Include all the detailed information. Look into the user experience. Test run digital portfolioShow forth your unique creative style.

Note that in the above case, The supporting document that he should include to show the purpose, subject, and technical details of the designs is a link and also user experience.

Learn more about portfolio from

https://brainly.com/question/24811520

#SPJ1

pls help will mark as brainliest i need help in html.​

Answers

Answer:

This is how I did it. Try it out and see if it works for you

Can someone tell me what’s wrong with this?





def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5


while secretNum!= userGuess:
userGuess = int(input("Guess a number between 1 and 20: "))
numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")


main()


Answers

This code is running without any syntax error. All I did is indented the code correctly. (Look at the attachement.)

Declaring a member as ____ in the base class provides access to that member in the derived classes but not to anyone else. a. public b. protected c. private d. constant

Answers

When a member is declared as b. protected in the base class, it provides access to that member in the derived classes but not to anyone else.

What is a derived class?

A derived class can be defined as a type of class that inherits the information or members of a base (parent) class such as a car in a syntax.

Basically, a public class is accessible to everybody while a private class can only be accessed by users within the declared class. Also, a constant is a class whose value remains unchanged.

In Computer programming, when a member is declared as protected in the base class, it ultimately provides access to that member only in the derived classes but not to other members or anyone else.

Read more on data types here: brainly.com/question/20264183

#SPJ1

At what point in the app-development process is it essential to include the developer?

coding
marketing
programming
scripting

Answers

At coding in the app-development process, it is it essential to include the developer.

What comes first in app development?

The first stage is known to be Strategy where a person needs to work out everything from what they want the app to do.

Note that At coding in the app-development process, it is it essential to include the developer as one needs to ask them what the app is really made for and carry them along.

Learn more about app-development from

https://brainly.com/question/11352260

#SPJ1

How do people and computers approach problems differently

Answers

Answer:

These technologies can assist humans in problem-exploring. According to Whitworth and Ryu, some tasks difficult for humans may be easy for computers and vice versa. Emergent computational technologies under Industry 4.0 present an opportunity for application in problem-exploring.

Explanation:

help me my homework on tle

Answers

Answer:

from left to right

emergency telephone

first aid

caution (slip hazard)

not eating or drinking

toxic

wear shoes/boots

safety helmet

goggles

wear gloves

no access

Designed to be small enough to be used on your lap:

A. Desktop
B. Laptop
C. Supercomputer ​

Answers

Answer:

B. laptop

Explanation:

hjji0hbvjjnh.

B. Laptop

It’s very easy to carry around and be used on your lap! I recommend a razor or an apple laptop!

You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue

Answers

A command that should be used to remove these two print jobs from the print queue is cancel Printer1-17 Printer1-21.

What is printing?

Printing can be defined as a process that typically involves sending print jobs from a computer system to a printer, especially through the print queue.

In Computer technology, "cancel Printer1-17 Printer1-21" is a command that should be used to remove the two (2) print jobs from the print queue of Printer1 which is yet to start printing.

Read more on printer here: https://brainly.com/question/17100575

#SPJ1

help me help you...........

Answers

Answer:

the 4th answer

Explanation:

w stage for width, h for height.

Sophia wants to purchase and use a mat board that will be the safest option for long-term use. What would likely be the BEST option for her?
A. Installation board
B. velveteen mat board
OC. acid-soaked board
OD. archival rag board

Answers

The most likely best option for Sophia  is installation board is  Installation board.

What can I use in place of a mat board?

An alternative forms of matboard is Scrapbooking papers as it is made up of a wide range of options that one can be able to see at any craft store.

Therefore, the most likely best option for Sophia  is installation board is  Installation board. as it is the best option.

Learn more about board from

https://brainly.com/question/5016185

#SPJ1

Answer:

archival rag board

Explanation:

I just took it and this is the correct answer

introduce yourself by following the rule

Answers

My name is Trisha Davis, I am a first year medical student and i love to read and write books. I hate lies and i love anyone who is honest.

What is self introduction?

My name is Trisha Davis, I am a first year medical student and i love to read and write books. I hate lies and i love anyone who is honest.

My goal in life is to be a medical doctor and also an entrepreneur. I love to help others and put smile on people's face. What  i want from life is good health, favor and avenue to showcase my gifts to the world.

Learn more about self introduction from

https://brainly.com/question/26685169

#SPJ1

20 ponts!!!dorothy has made a website for her hair salon on a wysiwyg editor. she wants her website to appear on the first page of the search results on any browser. how can she make her website appear on the first page?
dorothy can use the functionality of (blank) offered by wysiwyg editors to make her page appear on the first page of the search results.

Answers

Dorothy can use the functionality of (blank) offered by WYSIWYG editors to make her page appear on the first page of the search results by Creating engaging, wonderful web websites in your organization. No programming competencies are needed.

How does determine what comes up first?

When a consumer enters a query, our machines seek the index for matching pages and go back to the effects we consider are the best first-rate and maximum applicable to the consumer. Relevancy is decided through loads of factors, that can consist of records that include the consumer's location, language, and device (computing device or phone).

First Page Ranking Guaranteed in 7 Steps (Beginner's Guide)\Know wherein you Stand.Keyword studies smartly.Figure out the quest intent.Create search engine marketing optimized content. Keyword-wealthy URL.

Read more about the search engine:

https://brainly.com/question/1153322

#SPJ1

Explain why the receptionist responded as indicated in the following scenario.

Situation: Jim and Roger are meeting with the executives of the company. They are both wearing blue jeans, polo shirts, and ties. As they walk past the receptionist, he stops them and reminds them the dress code is white collar.

Answers

The receptionist is aware of the every day attire as he works there. Jim and Roger are undressed, since they were wearing blue jeans. The receptionist lets them know of what’s expected.

Hope this helps!

You want to add a caption to a table. which tab contains this option?.

Answers

In the above case, you want to add a caption to a table by the use of the References tab option.

What is the Add captions about?

In  this case, one can click on the object ( be it table, equation, other object) that a person intend  to add a caption to via the use of the References tab, as seen in the Captions group, then one can click Insert Caption and via the Label list, one can click on the label that best tell more about the object, or figure.

Note that In the above case, you want to add a caption to a table by the use of the References tab option.

Learn more about table from

https://brainly.com/question/24277490

#SPJ1

Name two driving factors in the development of computers.

Answers

The two driving factors in the development of computers are the  Skill set of the team. [If the team is well versed in a specific stack, then the performance will be good as compared to any other stack].

What re the matters?

There are some matters to consider. For business programs, I'd say gaming. A lot of what the common laptop makes use of for enterprise doesn't require that kind of electricity.

The skill set of the team. [If the team is well versed in a specific stack, then the performance will be good as compared to any other stack]Process familiarity. [If dev team knows the stack but the deployment/service team is new, then you may run into deployment and maintenance issues.]

Read more about the computers:

https://brainly.com/question/24540334

#SPJ1

The Cisco ____ model does not describe how communications take place. Rather, it focuses on how best to design a network, especially a relatively large network or one that is expected to grow.

Answers

The Cisco three-layer hierarchical model doesn't describe how communications take place.

What is Cisco three-layer hierarchical model?

The Cisco three-layer hierarchical model is also referred to as a hierarchical internetworking model and it can be defined as a three-layer model that's used for the design of an enterprise (large) network based on the following layers:

Core layerDistribution layerAccess layer

In conclusion, the Cisco three-layer hierarchical model doesn't describe how communications take place, but it focuses on how best to design a an enterprise (large) network.

Read more on Cisco three-layer hierarchical model here: https://brainly.com/question/3787380

#SPJ1

Mention one application of AI from the real world?
What are the benefits of using this application?
What is type of learning used in this application (Supervised or Unsupervised Learning?

Answers

The application of AI from the real world is the digital assistants. The benefit of using the digital assistants is that it helps in making the business more easy and reduces the burden of employees. The type of learning used is Supervised Learning.

What is Artificial Intelligence?

The AI is the application that combines the computer science with the robot datasets, that helps in problem solving. It makes the work easy for the human resources such as visual perception, speech recognition and many more.

The digital assistants is used in the companies in the form of solving the customer queries. It reduces the work load of employees of customer help desk.

Learn more about artificial intelligence, here:

https://brainly.com/question/22678576

#SPJ1

Question #1
Dropdown
Complete the sentence.
[_____] are essentials for the hearing impaired.

Answers

Answer:

The answer is Transcripts

Explanation:

I just got it wrong in Edge so I know trust me dude :)

Cybercrime is the illegal use of the internet, computers, or other digital technologies to harm or exploit individuals.

What is Cybercrime?

Cybercrime is illegal to use of computers, the internet, and other digital technology in order to harm or take advantage of people, businesses, or governments.

In the given case, the context is missing so the answer is written in a generalized manner by describing Cybercrime.

Serious repercussions from cybercrime can include monetary loss, damage to reputation, and legal accountability. People are becoming more concerned about it, and law enforcement organizations are concentrating more on looking into and investigating cybercrime incidents.

Cybersecurity is a precautionary practice that involves instructing users and commercial organizations' end users in order to safeguard their devices from potential threats to servers, networks, software, and sensitive data.

Read more on cybersecurity here:

brainly.com/question/14286078

#SPJ7

Other Questions
The nurse provides instruction when the beta-blocker (BB) atenolol is prescribed for a client | with moderate hypertension. Which client statement indicates to the nurse that further teaching is needed Why should you not send images of yourself doing suggestive or illegal activities, ect.? PURPOSECreate a presentation that describes your plan and findings for a personal finance budget.ASSIGNMENT PROMPTIn this assignment, you will create a multimedia presentation to communicate your findings from yourprevious budget assignment. You will describe your budget, explain your reasoning, provide evidence,address opposing perspectives, and educate your audience.Step 1: Review your planned budget.a) Open your planned budget you created for your previous assignment.b) Think about your main findings.Step 2: Consider the required elements of a multimedia presentation.a) Create your presentation on the computer using presentation or video-editing software.b) Include digital media such as images, video, or audio.c) Use text when appropriate to convey main ideas.d) Have an introduction, body, and conclusion.e) Present supporting evidence while conveying your perspective clearly.f) Address other perspectives while explaining your own reasoning.g) Include a list of resources that you used, including websites, textbooks, or othermaterials.Step 3: Think about these steps for creating a successful presentation.a) Plan: Sketch your presentation before you begin. Establish the order in which you willpresent your information and what media you are going to include.b) Draft: Create a rough draft of your presentation.c) Revise: Review your work, correct mistakes, and make improvements**Last assignment is attached for reference**I need help on where to start and how I should layout this presentation. If you could point me in the right direction, I plan on using PowerPoint. If you tell me what to do slide for slide, I'll give brainliest. Even advice is a huge help though! Make sentences on your own by using the following idioms and phrases. Once look back at the text and see how they are used and in what context. a. give up (stop doing) b. fade away (to become very weak) c. powerful enough (able) d. none other than e. keep on (continue) What political opponents were also targeted? Which sentence BEST states a theme in the play?Friends make sacrifices for each other.It is hard to let go of the past.Friends support each other.It is helpful to have more than one talent. You will be required to write a 1500 words review paper (+-10% excluding references) on a selected project case study, e.g. Similar to the Gautrain example in Assignment 3 (You can not use the Gautrain example as this was used in assignment 1).Case study or Programme can include any industrial/engineering sector such as; construction. Examples could include South Africas FIFA 2010 games, vaccine development, etc. NO fictious projects may be used. Your individual paper must include the following sections:1. Project or Programme description. (5 marks)2. Include stakeholders involved. (5 marks)3. Strategic alignment (the role the project plays in the strategic management process andhow is it linked to the strategic plan). (10 marks)4. Were both sociocultural or technical element factors in the success or difficulties in theprojects.5. Challenges faced and how these challenges were addressed.6. Your paper will need to include the following technical aspects. Identify the first five terms of the sequence in which an = 3n 1 + 1. Indus Valley Lesson TemplateDirections: Answer the reflection questions in your own words using complete sentences.Compare and contrast the three Indus Valley civilizations. How were they similar and different? Think about geography, culture, and economies.Explain the cultural changes the Aryans brought to the Mohenjo-Daro/Harappa and Dravidian people who lived in Ancient India.How do we know that Mohenjo-Daro/Harappa were an organized society?Which of these civilizations would you want to live in and why? Explain the three ways you can accelerate a golf cart? Shyam saw a cylindrical copper rod in his store room he realise that it can be used for various purposes it can be used as a flower ways by covering it one side face with any metal it can be used as a conductor or it can be used as a cylindrical box by covering both the side face with metal he measure the radius of the rod with 3% and length of rod with 7% error error percentage is measuring the volume of the cylinderical box is You wish to take a flight from Nevada to New York. Use the point (-4, 0) to represent Nevada, and the (5, 2) to represent New York. The airline has partitioned the flight so that you have a layover. The flight distance is partitioned in a ratio of 3:1. Determine the ordered pair that represents the location of the layover. negative and positive impact of monopolies in south Africa Que significa los versos fresca maana/en el invierno se juega/ el Sol dormita ayudaaaa 4- If 10 ml of a 1.5 M H2SO4 solution has been diluted by adding 100 ml of water to the original solution, what is the final concentration of the solution? 2. How did the running boy get his nickname? hoot The graph below represents which system of inequalities?A) y > 2x 3y > x 3b) y < 2x 2y < x + 3C) y 2x 2y > x + 3D) None of the above Your parents are going to drop you off at a family friends house while they are out of town for a week. Write a one paragraph to convince them that you will do just fine on your own at home.WRITE ONE SENTENCE IN ETHOS, ONE IN LOGOS, AND ONE IN PATHOS!!! Please show work! Factor sin^2 + sin^2 cos^2 guys help just with part b for number 2!