Which of these statements about tags is false?
Group of answer choices

Their font is center-aligned by default.

They serve as the label for a row or column.

They automatically display as the first row or column.

Their font is bold by default.

Answers

Answer 1

Answer:

LOL i don't even know

Explanation:


Related Questions

What is a letter that is written by someone you know and is used by a college during the application process?

Answers

Letters of recommendation.

Answer:

Letters of recommedation ..

Explanation:

answer this now
and thanks

Answers

Answer:

the process of burning something

Answer:

Option D) the process of burning something

Explanation:

Combustion, or burning, is a high-temperature exothermic redox chemical reaction between a fuel and an oxidant, usually atmospheric oxygen, that produces oxidized, often gaseous products, in a mixture termed as smoke. 

Which best describes what databases do?

They guarantee users find needed data.
They create categories for data.
They identify important data.
They enable users to search for data.

Answers

Answer:

I think the first one

Explanation:

not sure you can also do some research bout it

When do you use a for loop?

Answers

Answer:

You use a for loop when you know how many times you want to run the loop

Explanation:

if you dont know, use a while loop

What predefined match policy allows viewers to watch a claimed video but does not allow ads to display on the video

Answers

Answer:

The correct response is "Track".

Explanation:

Tracks encourage the individual that listens to that same music video to miss or ignore that same starting of almost any soundtrack at a certain moment. It might also impact an individual who accompanies a facility that implements or obeys guests.

For obvious reasons, a digital ad service can track client's internet search engine behavior patterns to continue providing accurate recommendations.

Major innovations made from the establishment of abucus to the 5th computer generation

Answers

Answer:

Cogs and Calculators

It is a measure of the brilliance of the abacus, invented in the Middle East circa 500 BC, that it remained the fastest form of calculator until the middle of the 17th century. Then, in 1642, aged only 18, French scientist and philosopher Blaise Pascal (1623–1666) invented the first practical mechanical calculator, the Pascaline, to help his tax-collector father do his sums. The machine had a series of interlocking cogs (gear wheels with teeth around their outer edges) that could add and subtract decimal numbers. Several decades later, in 1671, German mathematician and philosopher Gottfried Wilhelm Leibniz (1646–1716) came up with a similar but more advanced machine. Instead of using cogs, it had a "stepped drum" (a cylinder with teeth of increasing length around its edge), an innovation that survived in mechanical calculators for 300 hundred years. The Leibniz machine could do much more than Pascal's: as well as adding and subtracting, it could multiply, divide, and work out square roots. Another pioneering feature was the first memory store or "register."

Apart from developing one of the world's earliest mechanical calculators, Leibniz is remembered for another important contribution to computing: he was the man who invented binary code, a way of representing any decimal number using only the two digits zero and one. Although Leibniz made no use of binary in his own calculator, it set others thinking. In 1854, a little over a century after Leibniz had died, Englishman George Boole (1815–1864) used the idea to invent a new branch of mathematics called Boolean algebra. [1] In modern computers, binary code and Boolean algebra allow computers to make simple decisions by comparing long strings of zeros and ones. But, in the 19th century, these ideas were still far ahead of their time. It would take another 50–100 years for mathematicians and computer scientists to figure out how to use them (find out more in our articles about calculators and logic gates).

Explanation:

Which examples demonstrate common education and qualifications for Manufacturing Production Process Development careers? Check all that apply. Answer: A. Hugo uses CAD software to create a product design. D. Latisha is a Mechanical Engineer with a bachelor's degree. E. Oliver carefully calculates the dimensions of a product.

Answers

Answer:

A D E

Explanation:

I got it right on Edge.

Answer:

A D E

Explanation:

just did the work

:)))))

can some one please help

Answers

Answer: It probably will cost a lot of money

Explanation:

Which visual novels do you recommend and why?

Answers

Answer:

I rec recommend Fate/Stay Night. It's honestly so good!

Explanation:

What is the purpose of slicing?

a. To combine characters in order to form a single string
b. To combine two or more strings into one big string
c. To pull out a group of characters from a string
d. To pull out one specific character from a string

Answers

Answer:

C

Explanation:

Because a and b are talking about combining and when you slice you don't combine when you slice and when you slice something its into 2 or more parts, unlike what d says

help plz (will give brainliest)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This is the python program in the question that is:

def sum(n1,n2):

n=n1+n2

return n

The question is: write a function CALL that displays the return value on the screen.

So, the correct program is written below:

*********************************************************************  

def sum(n1,n2):# it is function that define sum

 n=n1+n2 # variable n that store the result of n1 and n2

 return n # return the result

print(sum(3,5))# call the sum function with parameter 3 and 5 , it will print 8

print(sum(4,101))

# call the sum function with parameter 4 and 101 it will print 105

********************************************************************************

you can also store the sum result into another variable, because this function return the sum. So, you can store that return value into another vairable and using the print function, to print the value of this variable such as:

*****************************************************************************

def sum(n1,n2):# it is function that define sum

n=n1+n2 # variable n that store the result of n1 and n2

return n # return the result

result= sum(6,9) # store the sum result into another variable i.e result

print(result)# print the result variable value

*****************************************************************************

plzz help me with this question.........

Write a program to input a number find the sum of digits and the number of digits. Display the output also.......

sample input - 7359
sample digits - 24
number of digits - 4​

Answers

Answer:

please mark as brainliest!!

Explanation:

public class SumOfDigits{ public static void main(String args[]) { Scanner sc = new Scanner(System.in); System.out.println("Please enter a number to calculate sum of digits"); int number = sc.nextInt(); // Remember number/10 reduces one digit from number // and number%10 gives you last digit int sum = 0; int input = number; while (input != 0) { int lastdigit = input % 10; sum += lastdigit; input /= 10; } System.out.printf("Sum of digits of number %d is %d", number, sum); // closing Scanner to prevent resource leak sc.close(); } }

(Java)Write a program that calculates and displays the conversion of an entered number of dollars into currency denominations—20s, 10s, 5s, and 1s. Example output: $452 converted is 22 $20s, 1 $10s, 0 $5s, and 2 $1s.​

Answers

Answer:

Below!

Explanation:

This is the code I have. I am not sure what I am missing that it won't accept -  

import java.util.Scanner;

class Dollars {

   public static void main(String[] args) {

            int numTwenties,numTens,numFives,numOnes,dollarAmount;  

       Scanner sc= new Scanner(System.in);

       System.out.println("Please enter a dollar amount: ");  

       dollarAmount = sc.nextInt();

        numTwenties = dollarAmount/20;

        numTens = (dollarAmount - 20*numTwenties)/10;

        numFives = (dollarAmount - (10*numTens + 20*numTwenties))/5;

        numOnes = (dollarAmount - (10*numTens + 20*numTwenties + 5*numFives));

       System.out.println(+ dollarAmount + " converted is" + numTwenties + " $20s, " + numTens + " $10s, " + numFives + " $5s, and " + numOnes + " $1s.");  

   }

}

This is what it is giving me -

Test CaseIncomplete

Dollars 598

Input598

OutputPlease enter a dollar amount: 598

598 converted is29 $20s, 1 $10s, 1 $5s, and 3 $1s.

Results

$598 converted is 29 $20s, 1 $10s, 1 $5s, and 3 $1s

Expected Output

$598 converted is 29 $20s, 1 $10s, 1 $5s, and 3 $1s

It's mainly the price measure with one currency against the other, even as rate changes, money through one country can get relatively weak or powerful in comparison with the other currencies, and the further program can be defined as follows:

Program Explanation:

Import package.Defining a class Conversion .Defining an integer variable "twenties, tens, fives, ones, amount, n".After defining a variable, a Scanner class object is declared that inputs value in it.In the next step, a conditional statement is declared that checks value and hold its calcuated value.At the last, a print method is declared that prints its value.

Program:

import java.util.*;//import package  

public class Conversion //defining a class Conversion

{

   public static void main(String ar[])//defining a main method

   {

       int twenties, tens, fives, ones, amount, n;//defining an integer variable

       Scanner obcdf= new Scanner(System.in);//creating Scanner class object to input value

       System.out.println("Enter amount: ");//print message

       amount = obcdf.nextInt(); //input integer value

       n =  amount; //holding innput value

       if(amount > 20)//using if block that check amount value greater than 20

       {

           twenties = (int)(amount/20); //using twenties that divides amount value by 20 and hold its integer value  

           amount = amount % 20;// holding modules value in amount variable

       }

       else  //defining else block

       {

           twenties = 0;//holding 0 in twenties variable  

       }

       if(amount > 10)//using if that check amount value greater than 10

       {

           tens = (int)(amount/10);//using tens that divides amount value by 10 and hold its integer value

           amount = amount % 10;// holding modules value in amount variable

       }

       else  //defining else block

       {

           tens = 0;//holding 0 in tens variable  

       }

       if(amount > 5)//using if that check amount value greater than 5

       {

           fives = (int)(amount/5);//using tens that divides amount value by 5 and hold its integer value

           amount = amount % 5;// holding modules value in amount variable

       }

       else //defining else block

       {

           fives = 0;//holding 0 in fives variable  

       }

       if(amount > 1)//using if that check amount value greater than 1

       {

           ones = (int) amount;//holding amount value in ones variable

       }

       else //defining else block

       {

           ones = 0;//holding 0 in ones variable

       }  

       System.out.println("$"+n+" converted is "+twenties+" $20s, "+tens+" $10s, "+fives+" $5s, and "+ones+" $1s."); //print value

   }

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/4448370

Zack sees an online contest. He could win $10,000 instantly! On the sign-up form he enters his name and email address. He is also asked to enter his nickname, the name of any pets, and his mom's maiden name. Should he do it?

Answers

Answer:

Do not please! Online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.

Explanation:

In this scenario, Zack sees an online contest stating that he could win $10,000 instantly! On the sign-up form he enters his name and email address. He is also asked to enter his nickname, the name of any pets, and his mom's maiden name.

Hence, it is advisable, that Zack shouldn't do it because online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.

Basically, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

Why would it be useful to split up the coding for creating an app between multiple programmers? Select 2 options.

greater innovation

greater control over the code.

faster development.

greater consistency between sections of code.

Answers

Answer: c

Explanation:

Answer:

I'd be willing to wager it is A and D but not 100% sure.

Explanation:

what do you understand by the term "Artificial Intelligence "?​

Answers

Answer:

Artificial Intelligence (AI) is the branch of computer sciences that emphasizes the development of intelligence machines, thinking and working like humans. For example, speech recognition, problem-solving, learning and planning.

Can we trust in Avast Antivirus ⊕?⊕

Answers

Answer:

yes we can

Explanation:

im also using avast antivirus and it was no fault in avast antivirus

Answer:

Avast is a good antivirus program. It is not a scam or malware. I personely use Avast a while back and they are now basically the same thing, only with a different user interface.

Explanation:

Hope It's answer you plz mark as Brainlist

How does entertainment relate to coding?

Answers

Answer:

not sure if this is the type of answer you're looking for but: Entertainment can relate to coding because in TV shows and movies, there is lots of editing. Especially with cartoons. Inorder to make these, we have to use coding. This can even relate to real life plays and preformenses depending on how much technology you use to preform them.

BRAINLIEST!!! HELP!!! 20 PNTS!!

Which is the correct way to add a border color?

A. border-color(red);

B. border-color: red;

C. red: border-color;

D. border-color = red;

Answers

Answer:

The answer you are looking for is "B.) border-color: red"

HTML and CSS coding is fairly simple, but to assign a border color to a certain tag, you would write

Tag Name (without <>'s)

{

border-color: red

}

Remember that your border color will affect all of the tags mentioned in this command.

Which of the following best describes the protocol used on the internet?

Answers

Answer:

The protocols of the Internet are open and used by all devices connected to the network

Explanation:  

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

The Internet:

O A. only gives us access to our local communities.

O B. hinders our ability to influence people.

O C. limits us to local social networking sites.

O D. enables us to join global online communities.​

Answers

Answer:

D- it enables us to join global online communities.

Explanation:

Thanks to social media and other websites, content you produce can be seen all over the world.

If you got band from a local library, what would be the reason for it besides shouting and talking? You're answer has to fit you're personality?

Answers

Answer:

I would get a band from the library because I check out ten books and returned them in a week. I also would just be in the library all the time and they would get frustrated. That or I would spend hours talking to a librarian about my favorite books and they would get fed up with me.

What is the function of a web browser, and what are the main components of a web address?

Answers

Answer:

The primary function of a web browser is to render HTML, the code used to design or "mark up" webpages. Each time a browser loads a web page, it processes the HTML, which may include text, links, and references to images and other items, such as cascading style sheets and JavaScript functions.

Function of a web browser: A web browser allows users to access and view websites on the internet, request web pages from servers, and display their contents.

Main components of a web address (URL):

1. Protocol

2. Domain

3. Subdomain

4. Path

5. Query parameters

6. Fragment identifier

The Function of a Web Browser:

1. Requesting Web Pages: The web browser sends requests to web servers to fetch specific web pages or resources (such as images, videos, and stylesheets) associated with those pages.

2. Rendering Web Pages: Once the web browser receives the requested content from the server, it interprets and renders the HTML, CSS, and JavaScript code to display the web page's content and structure.

3. Supporting Multimedia: Web browsers are capable of handling various multimedia elements, such as images, audio, and video, allowing users to experience a rich and interactive web environment.

4. Managing History and Bookmarks: Web browsers keep track of the browsing history, allowing users to revisit previously visited sites. They also provide features to bookmark and save favorite websites for quick access.

Main Components of a Web Address (URL):

A web address, also known as a URL (Uniform Resource Locator), is the unique address used to identify a specific web page or resource on the internet. It consists of several components:

1. Protocol: The protocol is the method used to access the resource.

2. Domain: The domain is the address of the website or server hosting the resource. It is typically the main part of the URL.

3. Subdomain (Optional): Subdomains are prefixes added before the main domain.

4. Path: The path specifies the location of the specific resource on the server. It may include directories and filenames.

5. Query Parameters (Optional): Query parameters are additional data passed to the web server for processing.

6. Fragment Identifier (Optional): The fragment identifier is used to specify a specific section or anchor within a web page.

Learn more about Web here:

https://brainly.com/question/27961981

#SPJ6

PLS HELP BEING TIMED!!!!
Why do prospective lenders only accept FICO credit reports that are one or two days old, at most?
O Good credit scores can plummet quickly
O Credit scores change on a daily basis.
O Bad credit scores can improve quickly.
O Credit reports expire after two days and are no longer valid.

Answers

Answer:

O Credit scores change on a daily basis.

Explanation:

just hellllllp me plzzzzzzzzzzzzz

Answers

it should increase the amount of thrust

Answer:

It is C.

Explanation:

Hope this helped have an amazing day!

b) Describe the computer processing that is required to maintain the correct growing
conditions.​

Answers

Answer:

Explanation:To get the best plant growing conditions, the temperature and humidity (moisture in the air) have to be controlled.

The greenhouse therefore has temperature and humidity sensors linked to a computer, and the computer has a control program storing details of the correct temperature and humidity settings. The greenhouse is fitted with a heater, sprinkler and window motor which are also linked to the computer.

If the humidity falls below the values stored in the program, the computer activates the sprinklers and closes the windows. If the temperature falls outside the values stored in the program, the heater is activated by the computer.

Can someone help me get spotify premium

Answers

Answer:

Yes just go to spotify and pay for spotify premium.

Explanation:

Answer:

Buy it, go to the app store or google play and it will surely pop up like a sign saying premium.

Explanation:This is so hard :/

Which of the following is NOT true regarding fonts which should be used in memos?
O Typically serif fonts are used such as Times New Roman
O Typically sans-serif fonts are used such as Arial
O Headers should be 12-point font size
O Body text should be 10-point font size

Answers

Answer: Typically serif fonts are used such as Times New Roman.

Explanation: Have a gr8t day and pls mark me brainliest.

Which term refers to the portion of the hard drive where print jobs are stored before going to the print device

Answers

Answer:

Print Queue.

Explanation:

I majored in Technology

Printer spoolers, which queue print jobs and send them one at a time to a printer, should not be confused with printer drivers.

What print jobs are stored before going to the print device?

In order to enable control of print queue actions like stopping, restarting, or canceling tasks, a print queue provides users with printer management features. Some print queues let users rearrange the queue's order and assign print jobs a higher priority.

Messages that need to be printed are gathered in print queues. An Unspecific print queue can be started or canceled.

Applications can print with the help of printer drivers without having to be aware of the specific technical specifications of each printer model.

Therefore, The area of the hard disk where print jobs are kept before being sent to the printer is referred to as the print queue.

Learn more about print device here:

https://brainly.com/question/4005823

#SPJ6

Eli needs to export files from his mailbox into a single file that is portable and can be backed up to removable media. Which file type will he use?

Answers

Answer:

PST

Resource:

This question has already been answered here: https://brainly.com/question/18415952

Explanation:

PST is the personal storage table, which is a file built by Microsoft to store data from outlook and other services too.  Really quick, this may or may not be an option that you are looking for but, what I would do in my opinion would be to use the PST and export it on a removable USB, since USBs are removeable media.

Other Questions
A chimpanzee climbs a vine up and to the right for a total displacement of 50 m 50m50, start text, m, end text that makes a 60 6060, degree angle from the ground. What was the horizontal displacement of the chimpanzee in m mstart text, m, end text? Which detail from the excerpt best identifies a problem?O And fuel is heavyO the fuel was almost goneOthey wanted him to make the landingOthey were trying to time it to the last possible second .Do you think people would be able to survive withoutgadgets? Why A ___________ represents a relationship between two quantities. Select all that apply.equationtablefunctiongraph April is worried that she is not a "good speller" so she plans to let the spelling checker correct all her mistakes. What would be the most helpful advice for April? Read the following paragraph. Then select the author's purpose in writing the paragraph. Christopher Columbus was a famous explorer who discovered the New World while searching for a western route to the Indies. Although all other merchants had traveled eastward to the Indies, Columbus was convinced he could reach the Indies by traveling west. He begged the king and queen to give him money, equipment, and supplies for his journey. Although Christopher Columbus did not find what he was looking for, on October 12, 1492, he and his men discovered the New World. The world owes a great debt to the courageous explorations of Christopher Columbus. A delivery company is considering adding another vehicle to its delivery fleet; each vehicle is rented for $250 per day. Assume that the additional vehicle would be capable of delivering 1,750 packages per day and that each package that is delivered brings in $0.25 in revenue. Also assume that adding the delivery vehicle would not affect any other costs. Instructions: Round your answers to 1 decimal place. a. What are the MRP and MRC What was the structure of the shogunates under Tokugawa in Japan? Identify the three body regions targeted by strength training exercises. i need this pllssssssDescribe the reasons for Oklahomas suburban growth in the 1960s and 70s.(short answer) In HIJ, i = 550 inches, j = 150 inches and H=92. Find the length of h, to the nearest inch. List the pros and cons of isolationist policies in China and Japan. Do you believe that these policies would be more beneficial or harmful to these countries? Explain Why or why not? A silver bar has a mass of 368g. What is the volume in cm of the bar? The density of silver is 19.5g/cm. Pick a number between 1 and 100 A notary signing agent has been providing signing services with no incidents for over 10 years without undergone a background screning . Therefore. he or she A meal that contains 4 grams of fat, 3 grams of protein, and 3 grams of carbohydrate will provide ______ calories. Need helpp fastt plss will give brainliest to who is correct plss helppPLSSS HELPP I NEED THE ANSWER CORRECT Copper is a metal with the ability to conduct electricity, so copper wires are often used in small household appliances. The ability toconduct electricity is a drag and drop answer here property of copper. Iron, on the other hand, reacts with oxygen to form iron oxide, alsoknown as rust. The ability of iron to rust is a drag and drop answer here property of the metal As scientists characterize certain metals, theyinvestigate physical properties like drag and drop answer here and chemical properties like drag and drop answer here. How was race used to divide people during the time of American conquest and colonization A horse at rest takes 60 breaths every 5 minutes. At this rate, in how manyminutes would the horse take 300 breaths?1. 12 minutes2. 25 minutes3. 240 minutes4. 3,600 minutes