HTML coding ......plz help​

HTML Coding ......plz Help

Answers

Answer 1

Answer:

<html>

<title=succes secrets>

<bg color="orange">

<body>

success...........all those text on isde


Related Questions

Which type of design is used when a web site is correctly and effectively displayed on small, mobile devices (as well as desktop devices)

Answers

Answer:

system analysis and design

Explanation:

a broad term for describing methodologies for developing high quality information Sytem which combines Information Technology, people and Data to support business requirement...A methodology is essentially a procedure to get something done.

A ________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to legitimate users wishing to log on or utilize the attacked server.

Answers

Answer: Botnet

Explanation:

What do we call the time it takes for all of the sub-pixels on the panel to go from pure black to pure white and black again

Answers

Answer:

response rate

Explanation:

The term being described in the question is known as the response rate. In other words, this is the amount of time it takes for your monitor to shift from one color to another. This is data tends to be measured in milliseconds with the average response times of typical LCD monitors being ten milliseconds (10ms) and the fastest response times of higher-end displays being as fast as one millisecond (1ms)

Write a method mirror that accepts an ArrayList of Strings as a parameter and produces a mirrored copy of the list as output, with the original values followed by those same values in the opposite order. For example, if an ArrayList variable called list contains the values ["a", "b", "c"], after a call of mirror(list); it should contain ["a", "b", "c", "c", "b", "a"].

Answers

Answer:

Here is the JAVA program:

private static void mirror(ArrayList<String> list) { // method mirror that accepts ArrayList of Strings as a parameter

       for (int i = list.size() - 1; i >= 0; i--) {//iterates through the array list

           list.add(list.get(i));        } //produces a mirrored copy of the list

       System.out.println(list);    } ///prints the mirrored copy of list

Explanation:

This is the complete program:

import java.util.ArrayList; //to use dynamic arrays

public class MirroredArraylist{

private static void mirror(ArrayList<String> list) {    //method to produce mirrored copy of the list

       for (int i = list.size() - 1; i >= 0; i--) {  /          

           list.add(list.get(i));        }            

       System.out.println(list);    }

public static void main(String[] args) {    

     ArrayList<String> list = new ArrayList<String>();//creates a String type array list  

//adds values to the Arraylist i.e list

               list.add("a"); .

               list.add("b");

               list.add("c");        

       mirror(list); }} //calss mirror method passing list to it

The method works as follows:

For loop variable i is initialized to the list.size() - 1 which means 1 less than the size of the ArrayList i.e list. For example the list contains the following values ["a", "b", "c"]. So

i = list.size() - 1

 = 3-1

i = 2

so i is set to the last element/value of list i.e. "c"

Then the for loop checks if the value of i is greater than or equals to 0 which is true because i = 2

So the program control enters the body of the for loop

list.add(list.get(i)); This statement has two methods; add() and get()

add() method is used to add the value/element to the ArrayList, list.

get() method is used to get the element/value in list at i-th index

So the element at i=2 means element at 2nd index is "c"

Hence value "c" is added to the list.

Then the value of  i is decremented to 1. So i=1

At next iteration

i is set to the second last element/value of list i.e. "b"

Then the for loop checks if the value of i is greater than or equals to 0 which is true because i = 1

So the program control enters the body of the for loop and gets the value of list i.e "b" and adds it to the list. Next the value of "a" is get and added to the list. So the list becomes:

["c", "b", "a"]

In the main() method

               list.add("a"); .

               list.add("b");

               list.add("c");    

The above three statements adds the values to list that are "a", "b" and "c". So the list becomes:

["a", "b", "c"]

Next statement mirror(list); calls the method mirror which returns the mirrored copy of the list. So the output is:

["a", "b", "c", "c", "b", "a"].

The screen shot of the program along with its output is attached.

Which of the following statements are true about the Internet?
1 - The Internet connects devices and networks all over the world
II - The Internet helps people collaborate to solve problems
III - The Internet helps people communicate
IV - There are no negative consequences of the Internet, it is purely positive

Answers

1, 2, and 3 are true

You can expect to see ________.
A. STOP signs or traffic lights on limited access highways
B. only traffic lights on limited access highways
C. only STOP signs on limited access highways
D. no STOP signs or traffic lights on limited access highways

Answers

Answer:

You can expect to see no stop signs or traffic lights on limited access high way.

The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization. a. ISP b. PSV c. SVP d. ASP

Answers

Answer:

Isp

Explanation:

An Internet service provider is an organisation that provides services for accessing,

using, or participating in the Internet. Internet service providers can be organised in

various forms

The platform security validation (PSV) procedure is made to identify and record vulnerabilities that can exist as a result of incorrectly configured systems being used by the company. Thus, option B is correct.

What PSV process is designed to find and document?

The preparedness and review domain's major objective is to maintain the information security program's intended functionality and ongoing improvement.

An organization that offers services for utilizing, accessing, or engaging on the Internet is known as an Internet service provider. There are several ways that internet service providers might be organized.

Therefore, The PSV process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.

Learn more about PSV here:

https://brainly.com/question/22444527

#SPJ5

when classified information is in an authorized individuals hands, why should the individual use a classified document coversheet

Answers

Answer:

Following are the answer to this question:

To inform holders of the existence of data.  To avoid misuse by unapproved employees of confidential information.

Explanation:

The classified information is also known as sensitive information, which is access to specific classes of individuals is constrained by rule or policy. It manages the classified documents or accesses the data.

It's also a formal security clearance, that has been required for the satisfying background research that is needed for the screening process.It tells the owners that confidential data is provided and avoid accidental disclosure by the unauthorized staff of classified information.

if lain and Wi-Fi were to go out at the same would the circuit break

Answers

Answer:

yes and no because the LAN circuit would stop the connection and the Wi-Fi circuit would fry

With _____, human thinking and problem-solving is performed by a machine, including learning, reasoning, and self-correction. wearable technologies quantum computers artificial intelligence Moore's Law

Answers

Answer:

THE ANSWER IS B

Explanation:

An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed produce a result and halt in a finite amount of time. In one sentence or less, what does it mean to be effectively computable

Answers

Answer:

to be effectively computable, the person is definite, explicit and 'mechanical'.

Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network

Answers

Answer:

"Point-to-Point Tunneling Protocol" is the right choice.

Explanation:

PPTP seems to be a service provider protocol which provides the protected processing of information from some kind of different client to something like an application framework through the creation of a VPN around through TCP/IP databases. It perfectly captures PPP transactions for transmission and storage and perhaps other standard TCP/IP based connections through Ip packets.

Controlling the physical world with sensors and digital devices depends on bandwidth and the ability to analyze data in real time. Select one: True False

Answers

Answer:

The answer is "True".

Explanation:

A sensor is a tool, that senses environmental changes, and reacts to the certain activity of the other machine. It converts a physical event through an analog or sometimes an electronic signal, which is translated or displayed for reading and further analysis.

It also controls the bandwidth and also the ability to analyze information in real-time rely mostly on physical universe monitoring with sensors, that's why it is true.

"An internal system behind a firewall needs to be configured for remote access. How should Network Address Translation be configured?"

Answers

Answer:

The appropriate answer will be "Port forwarding ".

Explanation:

Port forwarding seems to be a network security strategy whereby a gateway or equivalent system communicates all intercepting communication/traffic from a specific address to some of the same port on just about any interior single node.This allows the connection of an entity in this context device that is connected to an inner reference node/port usually connecting to Internet infrastructure as well as an internal private local area network.

Which definition of AI do you like best? How would you define AI? Let's first scrutinize the following definitions that have been proposed earlier: "cool things that computers can't do" machines imitating intelligent human behavior autonomous and adaptive systems Your task: Do you think these are good definitions? Consider each of them in turn and try to come up with things that they get wrong - either things that you think should be counted as AI but aren't according to the definition, or vice versa. Explain your answers by a few sentences per item (so just saying that all the definitions look good or bad isn't enough). Also come up with your own, improved definition that solves some of the problems that you have identified with the above candidates.

Explain with a few sentences how your definition may be better than the above ones?

Answers

Answer:

1. "Cool things that computers can't do"

AI is Artificial Intelligence, which can involve anything from robots to programs on computers/websites. Sure, AI can learn things and adapt in ways unlike computers, but they are still quite similar in the fact that they both are technology.

2. "Machines imitating intelligent human behavior"

This is a bit closer to the definition of AI. However, AI does not necessarily have to imitate humans - rather, it's most known for being able to adapt and learn (which is the part where this definition is correct). Also, our current AI is nowhere near the level of mimicking intelligent human behavior enough to fool us.

3. "Autonomous and adaptive systems"

This is, by far, the best definition given here yet. Most AI are autonomous and/or adaptive systems, used to automate tasks which would take time for us humans. I suppose one thing that could be wrong with it is that not all AI are made to be autonomous systems.

the_______ is a documents , spreadsheet or database that contain personalized information or data base such as name address phone number​

Answers

Answer:

Is called "data source"

the data source is the answering o

Which of the following statements is true?
1. Computers have only been around since the 1940's
II. One reason computers were first developed was to do mathematical computations faster
III. Some modern computers include laptops, cell phones, and tablets
IV. Computers are able to perform tasks by using logic

Answers

Answer: The correct answer is II, III, and IV.

Explanation: The correct answer is 2,3,4. Number 1 is wrong because computers were made in 4000BC. II is right because since the beginning of time. Hand made computers were used more as of caculators. III is right because laptops, cell phones, tablets and even toys all have digital coding that originated since 1940 when the first digital computer was made. IV is right partially. Computers do certain tasks set by humans and use's logic to complete them. (Depends). II, III, IV, are the correct answers

Define stubs for the functions get_user_num() and compute_avg(). Each stub should print "FIXME: Finish function_name()" followed by a newline, and should return -1. Each stub must also contain the function's parameters.

Answers

Answer:

Following are the code to this question:

def get_user_num():#defining a method

   return -1#return value -1

def compute_avg(n1, n2):#defining method compute_avg that accepts two parameters  

   return -1#return value -1

user_num1 = user_num2= get_user_num()#defining user_num1 and user_num2 variable that calls method get_user_num

avg_result = compute_avg(user_num1, user_num2)#defining avg_result that calls compute_avg method and store its value

print('The average value is:', avg_result)#use print method to call avg_result

Output:

The average value is: -1

Explanation:

In the given python code,  two methods "get_user_num and compute_avg" is defined, in which the second method "compute_avg" accepts two parameters that are "n1 and n2", and both methods will return its value, that is "-1".

In the next step, "user_num1 and user_num2" is defined, that calls method "get_user_num" and stores its value, and the variable avg_result is defined, which calls the "compute_avg" method and stores its value and use the print method is defined, that calls its value.

Use the drop-down menus to explain how Angelina
should complete this process.
What is her next step?
What should she do next?
What should she do last?

Answers

Answer: what is her next step: click page number

What should she do next: click current position

What should she do last: click plain number 1

Explanation:

Answer:

A, C, B

Explanation:

The network layer of the Internet model uses the _____________ protocol to route messages though the network.

Answers

Answer:

Capa de Internet. La capa de Internet, también conocida como capa de red o capa IP, acepta y transfiere paquetes para la red. Esta capa incluye el potente Protocolo de Internet (IP), el protocolo de resolución de direcciones (ARP) y el protocolo de mensajes de control de Internet (ICMP).

Explanation:

Mention any three features of an antivirus software? ​

Answers

Answer:

Real-time Scanning

Automatic Updates

Protection for Multiple Apps

Auto-Clean

Fights Against All Types of Malware

HOPE I HELPED

PLS MARK BRAINLIEST  

DESPERATELY TRYING TO LEVEL UP

✌ -ZYLYNN JADE ARDENNE

JUST A RANDOM GIRL WANTING TO HELP PEOPLE!

                     PEACE!

The three attributes of antivirus software include auto-cleaning, automatic updates, and real-time scanning.

The information regarding the three attributes of antivirus software is as follows:

The work of the antivirus software discovered malicious software. In the auto-cleaning, it rid of the viruses that could come in the laptops.In real-time scanning, it regularly checks whether there is any malicious software or not due to this the laptop does not damage.The antivirus software required regular updates so that they could track the new threats if any also at the same time it protects your laptops.

Therefore we can conclude that the three attributes of antivirus software include auto-cleaning, automatic updates, and real-time scanning.

Learn more about the software here: brainly.com/question/15937118

Measurement consists of:__________

a. the assignment of numbers (representing quantities of attributes) to objects or events according to rules.
b. using a given scale to make comparisons.
c. determining the frequency of a particular attribute.
d. assigning numbers solely for identification purposes.

Answers

Answer:

The answer is choice "a".

Explanation:

Measurement is a number allocation in which the entity or event attributes that would be comparable with other objects or events. Its scope and implementation depending on context and discipline.  

Its main purposes could be defined as measurements for efficiency, tracking, health, fitness (design, mounting), and solving problems.  Its calculation consists of the numerical assignment, representing attribute amounts according to the rules for objects and events.

what is the types of the structured programming

Answers

Answer:

I guess 1 3 4 options are true.....

I think 1,3,4 is true thank me tomorrow

Given an array, x of references to objects that implement the Comparable interface, two int variables k and j that contain valid indices to x, write some statements that exchange (or swap) the contents of the elements referenced by the integers.

Answers

Answer:

Following are the code to this question:

Comparable t; //defining interface variable t

t = x[k]; //use t variable that holds array value

x[k] = x[j]; //use array to store x[j] value

x[j] = t;//use x[j] to assign value in the t

Explanation:

In the given question it is already defined " x" is an array that is the reference object, that defines the Comparable interface "t", and in the next line, two integer variable "k and j"  is defined, that swap the values.  

In the above code, the Comparable interface "t" is defined, which uses the t variable to store array x[k] value, and x[k] stores the x[j] value, and x[j] stores t value, and perform the swapping.

The #elif and #else directives are provided as shorthand notation for the #if defined(name) and #if !defined(name).


True


False

Answers

Answer:

The answer is "False".

Explanation:

The shorthand notation operator is a quick way of expressing something, that can be accessed only in Java. In this, no function within computer programming language was introduced by shorthand procedures.  In the given question, else and elif block were used, in which elif block used in python, that's why the given statement is false.        

Define what is a PC?

Answers

PC stands for Personal Computer (generic term) This definition appears very frequently and is found in the following Acronym Finder categories: Information technology (IT) and computers.

PC stands for personal computer and can be used for anything from desktops to laptops

Disk ___________________ helps improve the speed and efficiency of a hard disk.

Answers

Disks “Response Time” and “Disks Throughput” have great impact on speed and efficiency of a hard disk.

Answer:

Defragmentation

Explanation:

PLATO - correct answer

Which of the following is true about STEM education? STEM education is focused on understanding rather than applying scientific concepts. STEM students are told to focus on a subject area and work within a certain specific field. STEM students are encouraged to blend and expand their knowledge of all four subject areas. STEM education prepares students to work in science- and math-related jobs.

Answers

Answer:

C). STEM students are encouraged to blend and expand their knowledge of all four subject areas.

Explanation:

STEM education is characterized as a learning and development approach that focuses upon an amalgamation of four subject areas including science(S), technology(T), engineering(E), and Mathematics(M). Thus, each letter stands for a subject domain and this integration of four subjects primarily aims to 'blend and expand the knowledge of the students in these areas' integratively. It helps in developing and sustaining the interests of young learners through this integrated approach which also assists them with unique opportunities. Thus, option C is the correct answer.

The answer is:

D) STEM students are encouraged to blend and expand their knowledge of all four subject areas.

Which of the following options allow you to access a computer remotely? Check all that apply.

Answers

What are the options?

Which best described most television in the 1940s and 1950s? color cable 24 hour black and white

Answers

Answer:

The answer is "black and white".

Explanation:

During this period of live TV output in the United States, from the late 1940s to late 1950, the era between the 1940s and 1950s is often regarded as the first Golden Age of Television.  

It is the monochrome broadcast tv signal transmission and reception system. At the end of the 1940s, in 50 major cities, there were 98 commercial tv channels. TV sets costs also reduced by 1949.

Other Questions
Explain how to identify if the graph of a relation is a function or not in the decameron boccaccio introduces into western literature the literary convention of? The Gulf Coast is in the_. Which characteristic of information in the statistical tables included in a comprehensive annual financial report differentiates it from information contained in the financial statements? The floor of a railroad flatcar is loaded with loose crates having a coefficient of static friction of 0.420 with the floor. If the train is initially moving at a speed of 57.0 km/h, in how short a distance can the train be stopped at constant acceleration without causing the crates to slide over the floor 10. Working in the laboratory, a student finds the density of a piece of pure aluminum to be 2.850 g/cm3. The accepted value for the density of aluminum is 2.699 g/cm3. What is the student's percent error? A parachuter, falling with a constant speed, drops 456m in 14.4s.Determine all unknowns.S =51m/sd =456mt =14.4S Ella is going to drive from her house to City A without stopping. Ella's house is 100 miles from City A and after driving for 3 hours, she will be 25 miles away from City A. Write an equation for D, in terms of t, representing Ella's distance from City A tt hours after leaving her house. What do references to sunlight most likely symbolize in the play? A. Romance and desire B. Hope and life C. Wealth and prosperity D. Love and beauty -11=r+(-2) I need to solve this problem Many clustering algorithms that automatically determine the number of clusters claim that this is an advantage. List two situations in which this is not the case The AC voltage source is connected to an inductor and a resistor in series. If the frequency of the source is increased the current in the circuit will _________. What is the measure of angle VYZ Randomly selected 110 student cars have ages with a mean of 8 years and a standard deviation of 3.6 years, while randomly selected 75 faculty cars have ages with a mean of 5.3 years and a standard deviation of 3.7 years.1. Use a 0.02 significance level to test the claim that student cars are older than faculty cars.Is there sufficient evidence to support the claim that student cars are older than faculty cars?A. Yes.B. No.2. Construct a 98% confidence interval estimate of the difference 12, where 1 is the mean age of student cars and is the mean age of faculty cars. Which of the following is the y-intercept of:2 y = x-8 ? (0.4) (-4.0) (4,0) (0,4)PLZ HELP I NEED THE ANSWER QUICK What's the value of x in the figure? A) 78 B) 57 C) 76 D) 33 The conjugate of 2+5 i (is) -2 -5 i True or false Anthony Clement is applying for a car loan. The lending institution requires a personal net worth statement. Anthony currently has $1,085.00 in cash, and his camera is worth $635.00. He also owes Vista Travel $305.00 and Kelley Electronics $83.00. Complete a net worth statement for Anthony Clement. Select Current Date in the appropriate field. Assets should be listed in order of liquidity, so Cash should be listed first. Liabilities should be reported in alphabetic order. Find an equation of the vertical line passing through the point (-4, 2). x= HELP PLEASE...TIMED QUESTION...NOT A TEST...FIRST CORRECT ANSWER WILL BE BRAINLIEST the red cross convention decreed the use of distinctive and for uniform flag for hospitals ambulances and evacuations most likely.....A. to indicate that these components can be seized for immediate enemy military use B. to distract belligerent forces and prevent them from hitting their intended targetsC. as as aid to bolster the declining morale among the sick and the injuredD. as a visual safeguard so belligerent parties would refrain from attack