A(n) _____ is created using the select and option elements that present users with a group of predefined possible values for the data field.a. texa area.b. option button.c. selection list.d. check box.

Answers

Answer 1

Answer:

c. selection list.

Explanation:

A selection list is created using the select and option elements that present users with a group of predefined possible values for the data field.

In Computer programming, the selection list is used to avail the end users with the ability to engage in an operation such as a predefined possible values for the data field.


Related Questions

Which are accurate statements about how self-reflection affects learning? Check all that apply.
ACDE

Answers

dude show the options to check ‍♂️

Its an HTML5 anyone kwons
After the computer executes the following code, what value will be stored in the variable result?

let x = 2, y = 6, z = 5;
let result = (x < 3 && y == 6);

Answers

Answer:

1 will be stored in result

Explanation:

Given

The lines of code

Required

Determine the value stored in result

The value stored in result is determine by the condition (x<3 && y ==6)

In the first line, the value of x is 2 and the value of y is 6

So: x<3 is true because x = 2 and 2 is less than 3

y == 6 is also true because y = 6 and 6 is equal to 6

So, the condition (x<3 && y ==6) is true and true will be saved in variable result

Because result is a Boolean variable which can only take true or false value

1 represents true

0 represents false

So, 1 will be stored in result

what's the component of the hardware?​

Answers

Some component of the hardware are central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.

I’m sure theirs more but here’s so. Hope this helps!
Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.

how do you copy from a file to another document

Answers

Answer:

you highlight it then double tap and click copy or after it is highlighted press ctrl and c together then to paste you double tap and click paste or you can press ctrl v

Explanation:

Answer: yes

Explanation:

Open File Explorer by pressing Windows+E and navigate to the file you want to copy. Highlight the files you want to copy, and then click “Copy” in the File menu or press Ctrl+C on the keyboard to add them to the clipboard. If you’d rather move items instead, highlight the files you want to move.

The ____ attribute can be used only with input boxes that store text. Group of answer choices type pattern required value

Answers

Answer:

Pattern.

Explanation:

The pattern attribute can be used only with input boxes that store text.

Generally, the pattern attribute cannot be used with other types of data in computer programming.

Basically, it comprises of data types which mainly includes an attribute of the text, e-mail, telephone, uniform resource locator (URL), search input types and password which must all be matched with the input value in order to pass an authentication or authorization.

Which best describes what databases do? A.) They guarantee users find needed data B.) they create categories for data. C.) They identify important data. D.) They enable users to search for data.

Answers

Answer:

the answer is c

Explanation:

i rly hope this helps if it does plz may u thank it and rate plz and thank u

Answer:

C

Explanation:

Took the test

Which key(s) will launch the Spelling Checker dialog box? F8 F7 Ctrl+H F2

Answers

Answer:

F7

Explanation:

Mostly in MS Office products, although a lot of other products will mimic the same well known key sequences as a way of enticing you to their platform.

Answer:The answer to your question is F7

Explanation:

Match the definition to the word.
1. establish as law
ordain
2. having the nature of a miracle
retinue
3. a great many
miraculous
4. keep alive and well with food
liege
5. an iron block on which metals are hammered
arms
6. the lord who has the right to homage
multitude
7. a group of attendants
successor
8. weapons; fighting
wrangling
9. a person who follows another person
anvil
10. a noisy quarrel
nourish

Answers

Explanation:

1. establish as law - ordain;

2. having the nature of a miracle - miraculous;

3. a great many - multitude;

4. keep alive and well with food - nourish;

5. an iron block on which metals are hammered - anvil;

6. the lord who has the right to homage - liege;

7. a group of attendants - retinue;

8. weapons - arms;

9. a person who follows another person - successor;

10. a noisy quarrel - wrangling;

What sort of technique would you use to sort 10,000 items using just 1000 available slot in your RAM?

a. Heap sort
b. Quick sort
c. Bubble sort

d. Merge sort

Answers

Answer:

d. Merge sort

Explanation:

Merge sort is example of an efficient sorting alogrithm. The Divide and conquer rule is used in this technique. This method breakdown the list into multiple sublists and each sublist contains a single element. This technique merged in the form of sorted lists. This technique uses external memory of the system while sorting.

Merge sort is used to sort the 10,000 items using only 1,000 slots available in the RAM.

Find io(t) for t > 0 in the network in the circuit. (Hint: 1. Find C equivalent first. 2. This is a First Order System)

Answers

Answer:

hello your question is incomplete attached below is the complete question

answer : [tex]( 2/3 - 8/3 e^{-1.875t} ) In A \geq 0[/tex]

Explanation:

attached below is a detailed solution

Finding  io(t) for t > 0 in the network in the circuit.

[tex]( 2/3 - 8/3 e^{-1.875t} ) In A \geq 0[/tex]

A member function that allows the user of the class to change the value in a data member is known as

Answers

Answer:

an accessor function.

Explanation:

An accessor function can be regarded as"set and get function" it's function are seen in the accesment of private object member, it give room to know the value of instance variable even though it's not in the same class.

It should be noted that member function that allows the user of the class to change the value in a data member is known as an accessor function.

what are the two parts of the uniform resource locator

Answers

Answer:

URL - Uniform Resource LocatorProtocol identifier :  indicates what protocol to use. Resource name :  specifies the IP address .

Explanation:

Answer:

The protocol identifier and the resource name

Explanation:

just did it got a 100%... like for more plz

Pat practices on the keyboard to improve his typing speed. When he typed the sentence It was a rainy day, he missed typing the letter r in the word rainy. Assuming he typed this sentence in a minute, what is Pat’s typing accuracy and error rate?

Answers

Answer:

94.4% Typing accuracy

1 error per minute

Explanation:

The sentence "It was a rainy day" contains five words and 18 characters (including spaces). Therefore, since Pat typed this sentence in a minute then his typing accuracy is

(17 / 18) * 100 = 94.4% Typing accuracy

That is because he typed 17 out of the 18 characters correctly in the sentence. Pat's error rate on the other hand is

1 / 1 = 1 error per minute

This is because in the span of one minute that it took to type the entire sentence Pat only made one error.

Answer:

94.7% and 1 error per minute

Explanation:

It was a rainy day is 19character and he typed 18.

Accuracy is 18/19

Write a program that uses key events to make a circle larger and smaller.

Your circle should start at a radius of 100 and a position of 250, 250. Each time the user hits the left arrow, the circle should decrease by 10. If the user hits the right arrow, it should increase by 10.

Hint: Use the get_radius() and set_radius() method to change the size of your circle. Find more details and examples on these functions in the DOCs tab.

Challenge: Can you prevent the circle from getting smaller than a radius of 10 and larger than a radius of 400?


in python code

Answers

Answer:

circ = Circle(100)

circ.set_position(250, 250)

circ.set_color(Color.yellow)

add(circ)

def grow_circle(event):

   if event.key == "ArrowLeft":

       circ.set_radius(circ.get_radius() - 10)

   if event.key == "ArrowRight":

       circ.set_radius(circ.get_radius() + 10)

   

add_key_down_handler(grow_circle)

Explanation:

By making it that when the left/right arrow is clicked the radius of the circle is first taking into account before anything else, then each time the arrow is clicked the current radius either gets 10 added or removed from it.    

Find the max and min of a set of values using recursion Find the max and min of a set of values using recursion. First input the values. The first value inputted is the number of additional data items to input. For instance, if the input is: 3 1 2 3

Answers

Answer:

This question is answered using Python programming language

def MaxSet(mylist, count):  

     if (count == 1):  

           return mylist[0]  

     return max(mylist[count - 1], MaxSet(mylist, count - 1))  

def MinSet(mylist, count):  

     if (count == 1):  

           return mylist[0]  

     return min(mylist[count - 1], MinSet(mylist, count - 1))  

count = int(input("Length of set: "))

mylist = []  

for i in range(count):

     inp= int(input("Input: "))

     mylist.append(inp)

   

print("Minimum: "+str(MinSet(mylist, count)) )

print("Maximum: "+str(MaxSet(mylist, count)) )

Explanation:

This defines the recursion that returns the maximum

def MaxSet(mylist, count):  

This following checks for the maximum using recursion

     if (count == 1):  

           return mylist[0]  

     return max(mylist[count - 1], MaxSet(mylist, count - 1))  

This defines the recursion that returns the minimum

def MinSet(mylist, count):  

This following checks for the minimum using recursion

     if (count == 1):  

           return mylist[0]  

     return min(mylist[count - 1], MinSet(mylist, count - 1))  

The main begins here

This prompts user for length of set

count = int(input("Length of set: "))

This defines an empty list

mylist = []  

The following iteration gets user input

for i in range(count):

     inp= int(input("Input: "))

     mylist.append(inp)

This calls the minimum function    

print("Minimum: "+str(MinSet(mylist, count)) )

This calls the maximum function

print("Maximum: "+str(MaxSet(mylist, count)) )

Plz help!! ASAP!! And thank you!!

Answers

Answer:

first one, become vulnerable to online harassment

It may be the first one because the other person said so

In a mobile phone network, how many times as strong would

Answers

Answer:

how many times as strong would what?

put your question in the replies to this answer and I'll gladly answer it

Explanation:

May I have brainliest please? :)

Which ways can you locate a function if you cannot remember the specific name? Check all that apply. searching in the Tell Me bar looking it up in the Formula tab looking it up in the Data tab using the Insert Function and typing a description using the Insert Function and selecting a category

Answers

Answer:

A, B, D, E

Explanation:

Just did it in Edge.

Answer:

A, B, D, E

Explanation:

In the Unified Process (UP) methodology, most of the Implementation activities occurs during the _____ phase.

a) Inception

b) Elaboration

c) Construction

d) None of the Above

Answers

Answer:

C) construction

Explanation:

The unified process is one of the software development process frameworks. It is an incremental and iterative software building process. The process is carried out in four phases which include; inception, elaboration, construction and transition.

The construction phase is the largest part and is where most of the implementation activities happen. Here the system features are implemented iteratively to enable the executable release of the software.

Who designed the Apple I computer in 1976

Answers

Answer:

Steve Wozniak

Explanation:

Answer:

Steve Wozniak i believe

Add a data attribute tricks of type list to each Dog instance and initialize it in __init__ to the empty list. The user does not have to supply a list of tricks when constructing a Dog instance. Make sure that you test this successfully. >>> sugar.tricks []

Answers

Answer:

Following are the method to this question:

def __init__(self, _name, _breed):#defining Constructor

       """ Constructor """

       self.name = _name#assigning value in name variable

       self.breed = _breed#assigning value in breed variable

       self.tricks = []#defining tricks an empty list

Explanation:

In the above code, a parameterized constructor is defined, that hold two-variable "name and breed" in its parameter, and another object self is created for storing the value.

Inside the constructor two-variable, and one empty list variable "tricks" is defined that hold value in the name and breed variable, and the next step an empty list is defined, that store its value.

Which program will have the output shown below?
10
11
12
13
>>> for count in range(14):
print(count)
>>> for count in range(10,13):
print(count)
>>> for count in range(10, 14):
print(count)
>>> for count in range(13)
print(count)

Answers

Answer:

for count in range(10, 14):

   print(count)

hope i helped :D

Answer:

for count in range(10, 14):

  print(count)

What are the assignable addresses for the 12th subnet with the network address of 220.100.100.0 and the number of needed subnets is 45? a. 220.100.100.42 to 220.100.100.51 b. 220.100.100.52 to 220.100.100.55 c. 220.100.100.45 to 220.100.100.46 d. 220.100.100.40 to 220.100.100

Answers

Answer:

C. 220.100.100.45 to 220.100.100.46

Explanation:

The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.

The useable host IP addresses are gotten from the formula '[tex]2^{n}[/tex]-2', with n=2 bits.

useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.

While the 12th subnet is 12 x 2^2 = 44.

This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.

EMERGENCY- I am giving 55 points for this, please help. WITH working out
What would be the size of a sound file, which is 30 seconds in length and has a bitrate of 96kbps? You must show your working out.

Answers

Answer:

360 kilobytes

Explanation:

(Time × Bitrate) / 8

30 × 96 = 2880 / 8

360 kilobytes

8: kilobits in a kilobyte

Time is always in seconds to obey the kb*ps* rule

Bitrate is always on bits so thats kilobits not kilobytes purpose of conversion

Suppose a package pkg1 contains a class named MyClass and another package pkg2 contains a different class named MyClass. What happens when you impot both classes?

Answers

Answer:

Following are the solution to this question:

Explanation:

In this question, two packages "pkg1 and pkg2" is defined, that hold a class that is "MyClass", in which the class name is the same. If we import the package so, it can't import both classes in the very same file. If we really need to apply to both, then must completely specify one class name, and in the class name is different so, we simply use both classes by creating the instance.  

The "persistent interrupt" is a bug in the code that exhibits a behavior that’s similar to an infinite loop. The ISR exits and gets called back immediately an infinite amount of times even though the interrupt event occurred once. The persistent interrupt occurs when three conditions are met. What are these conditions? How do we avoid a persistent interrupt from occurring?

Answers

Answer:

1. the 3 conditions have been listed below

2. to avoid persistent interrupt, we break any of the 3 conditions.

Explanation:

The persistent interrupt occurs when these three conditions below are met.

They are as follows:

1. GIE=1

2. xIE=1

3. xIFT=1

in avoidance of the persistent interrupt from occurring, we break any of these 3 conditions that I have listed above.

in order To break any one of the 3 conditions, we clear the flag that corresponds to the associated

we can also avoid the persistent interrupt occurrence by having the Interrupt Service Routine (ISR) clear maybe one or all of the three bits mentioned above before the ISR terminates, so it wouldn't get called back again. clearing any of the bits will not allow the ISR to be called again.

Insert in the Current Values section at the top of the worksheet summary functions that use the range I9:I54. In cell I2, calculate the total of all the Current Values. In cell I3, calculate the average current value. in cell I4, calculate the lowest current value. In cell I5, calculate the highest current value

Answers

Answer:

Cell I2: =SUM(I9:I54)

Cell I3: =AVERAGE(I9:I54)

Cell I4: =MIN(I9:I54)

Cell I5: =MAX(I9:I54)

Explanation:

I wasnt able to find the worksheet referenced, however it is not needed to answer correctly.

The question states there are several values in the cell range I9:I54, and we need to perform different operations:

In cell I2, calculate the total of all the Current Values

To obtain the TOTAL calculation, we use the SUM function for all the range of values

=SUM(I9:I54)

In cell I3, calculate the average current value

Average is calculated with the function named the same

=AVERAGE(I9:I54)

In cell I4, calculate the lowest current value

The lowest value of all the range is found with the MIN function

=MIN(I9:I54)

In cell I5, calculate the highest current value

The highest value of all the range is found with the MAX function

=MAX(I9:I54)

what is an operating system​

Answers

Answer:

the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

Explanation:

Answer:

nbv

c

.

l

lmmmm

n

pp

Explanation:

p

ll am ll..

__________________ is the capacity for the system to change in size and scale to meet new demands.

Answers

Answer:

The answer is Capacity planning

Which of the following is NOT one of the three testing phases of a JavaScript application?a) trying to make the application fail b) using the W3C Markup Validation Service to validate the HTML c) testing the application with valid data d) testing the application with invalid data

Answers

Answer:

b) using the W3C Markup Validation Service to validate the HTML

Explanation:

A JavaScript is one of the mainly used programming language. It is famous all over the world. Every software uses a JavaScript which includes a productivity apps, server code, 3D games, IoT devices, robots, etc.

A JavaScript code mainly runs on a web browser. In order to provide a JavaScript in the HTML document, we code an HTML script element which contains a JavaScript. Using the W3C markup validation service in order to validate a HTML is not a testing phase of a JavaScript applications.

Other Questions
Many people left England in the 17th century to come to North America because the colonies represented a chance to worship freely. This attraction to come to a new place is known as aA) mental map.B) pull factor.C) push factor.D) mass wasting. Given Z1 and Z2, find thedistance between them.Z1 = 2 3i and Z2 = 4 + i I'll give you the brainly thing.The 14th Amendment guaranteed African Americans equal protection and the 15th Amendment established black male suffrage. Explain why neither of these rights were realized in the Jim Crow South. Which of the following correctly represents the givendata in the problem?A survey of 80 students found that 24 students both playin the band and play a sport. But 22 students are not inband and do not play a sport. There are 48 students inthe band. If being in band is the row variable and playingsports is the column variable, fill in the labels the table.a = 24, g = 48, h = 22, i = 80a = 22, c = 80, d = 24, = 48a = 24, b = 48, c = 22, i = 48Play aSportDo NotPlay aSportTotala=24, c = 48, e = 22, i = 80In BandabcNot in BanddefTotalghi Are the two triangles below similar? (1 point)01) Yes; they have congruent corresponding angles0 2) No; they do not have congruent corresponding angles3) Yes; they have proportional corresponding sides04) No; they do not have proportional corresponding sides Michael drinks 355 milliliters of orange juice and puts 6 centiliters of syrup on his pancakes for breakfast. How many milliliters of liquid did he consume? milliliters Match each table to its corresponding explicit formula. A 2.5-meter piece of framing lumber has been used to cut a piece 1.65 meters long. How much of the original piece of lumber remains, in meters? What is the federal bureaucracy, and what are some of its characteristics? Ok I'm sorry I'm just making sure this is right 1.Lo opuesto de (the opposite of) viejo es .2.Una cebra (zebra) tiene los colores .3 ocano es de color . 4 opuesto de pobre es .5 casa del presidente de EE.UU. es de color .6 opuesto de corto es . 7 opuesto de barato es .8 banana es de color.9 tomate es de color .10 opuesto de feo es . Vinegar and milk forming solid clumps of solid (curds) is a Change in temperature Formation of gas/bubbles Formation of precipitate Release of energy (fire/light)Change in color PLEASE HELP!!Drag each label to the correct locationMatch each example with the system where it belongsmountain rangepondgaseous nitrogenlakecoastal vegetationmicroorganismHydrosphereGeosphereAtmosphereBiosphere Simplify: 3(4x-5) - (3x+2) What is the right thing to do when we see a member of the military? is it true or false iii. Rosewood, ebony, mahogany are common trees of tropical deciduous forests iv. The temperate evergreen forests are located in the mid latitudinal coastal region. A pair of shoes is currently priced at $55.00. If the store manager marks it down to $22.00, by what percent did he mark down the shoes? Sheridan Company reports the following information (in millions) during a recent year: net sales, $17,371.2; net earnings, $481.6; total assets, ending, $6,899.2; and total assets, beginning, $6,806.4. Calculate the (1) return on assets, (2) asset turnover, and (3) profit margin ratios. (Round answers to 1 decimal place, e.g. 15.2% or 15.1.) Find the unit rate: $7.40 for 5 pounds HELP ASAPPPPP 5 POINTSSSSS