Can someone plss help me with this!!

Can Someone Plss Help Me With This!!

Answers

Answer 1

Answer:

Text

Explanation:

There is no text in between the <h1> and </h1> tags.

I hope thats correct.


Related Questions

Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to take approximately 20 minutes to run individually. However, he would like to go to lunch 15 minutes from now. He knows that he can type all of the commands on the same line and separate them with a certain character to run them sequentially.

Required:
Which character can he type after each command to have them run one after the next without requiring further input from him?

Answers

Answer:

um

Explanation:

what subject is this again?

The navigation items for a Lightning app are available on mobile: A. In a special mobile configuration in the navigation menu and in Favorites B. In the profile menu, when in the app C. In the navigation menu and the first four items of the navigation bar, when users are in the app D. In the App Launcher Check the Quiz to Earn 100 Points

Answers

Navigation items are used for moving from one part of the part to a destination using actions and also for passing information. The right option is  C. In the navigation menu and the first four items of the navigation bar, when users are in the app

There are different methods/ways to implement the Navigation component in a mobile application, we have the following type of Navigation Implementation

Bottom NavigationDrawer Navigation(Slides from Left to right)Top Navigation

Learn more about Navigation here:

https://brainly.com/question/8908486

Write a program to print sum on first 10 natural numbers.
#include
int main()
{
int i, sum;
for(i=1;i<=10;++i);
{
sum =sum + i;
}
printf("The sum is = %d",sum);
}

Answers

A program that prints the sum on the first 10 natural numbers is:

int sum=0;int i=1;for(i=1; i <= 10 ; i++) // the value of i will be from 1 to 10{sum=sum+i; //each number will get added to the variable ‘sum’}System.out.println(sum); //

What is a program?

A computer program in a programming language is a set of instructions and commands written in a language that a computer can execute or understand. 

Using the For Loop program, the variables of the first 10 natural numbers can be written as:

int sum=0;int i=1;for(i=1; i <= 10 ; i++) // the value of i will be from 1 to 10{sum=sum+i; //each number will get added to the variable ‘sum’}System.out.println(sum); //

Learn more about writing a program here:

https://brainly.com/question/23275071

2. It serves as the foundation of all crochet work. a. Chain stitch C. double treble b. Treble stitch d. slip stitch​

Answers

Answer:

a. chain stitch

because the foundation of so many crochet patterns involved a chain of × stitches followed by working sc/dc into the chain

how to connect apple pencil 2 to ipad 8th generation?

Answers

Answer:

That pencil doesn't adjust to that ipad because those two aren't compatible

Explanation:

I need help with this

Answers

Answer:

It is used for the title of a page or post

What is this on G00gel Documents , how do I fix it?

Answers

Answer:

Sorry but it donest show the picture

Explanation:

computer science

describe 3 differences between the checksum and check digit:

Answers

Answer:

A check digit, also known as a checksum character, is the number located on the far right side of a bar code. The purpose of a check digit is to verify that the information on the barcode has been entered correctly.

A check digit, even comprehended as a checksum character, stands for the number found on the far right side of a bar code. The intention of a check digit exists to confirm that the information on the barcode contains been documented accurately.

What are the differences between the checksum and check digit?

A checksum in public can be any size, although generally, they exist some suitable number of bits for computation, such as 32. The more extensive the checksum, the wider the range of errors it can capture. For instance, the checksum utilized for credit card numbers will notice changed digits that exist after each other, but not reversed digits that exist split by a single digit.

All cryptographic hashes (like MD5, SHA, etc.) can be utilized as checksums, but not all checksums exist cryptographic. CRC-type checksums aren’t cryptographic, but they’re extremely quick to calculate, and so they exist generally utilized for things like hard drive checksums where you don’t require the cryptographic functionality, but you accomplish want to notice an extensive range of probable errors.

To learn more about checksum and check digit

https://brainly.com/question/14789699

#SPJ2

Please help please help

Answers

Answer:

Bonjour,

Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.

Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…

Merci

Bien cordialement

Az

ExplanationBonjour,

Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.

Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…

Merci

Bien cordialement

Az:

you receive a text from your boss, who’s on vacation. it says she can’t connect to the network and urgently needs you to send a file using an enclosed link. what type of social engineering attack is being used here?

Answers

The type of social engineering attack that is being used here is phishing. It exploits human errors.

Phishing is a type of social engineering attack that requires human errors to obtain credentials and/or spread malicious malware.

This type of attack (phishing) represents the most common type of social engineering attack.

Phishing generally involves email attachment files or links that are infected with malicious malware.

Learn more about phishing here:

https://brainly.com/question/23021587

Which of the following rules need to be followed when using variables?
Choose all that apply.

Answers

Answer:

- All variable names must begin with a letter of the alphabet or an. underscore( _ ).

-After the first initial letter, variable names can also contain letters and numbers.

-Uppercase characters are distinct from lowercase characters.

-You cannot use a C++ keyword as a variable name.

Answer:

Variable names must begin with a letter or an underscore( _ )

After the first initial letter, variable names can also contain letters and numbers. ...

Uppercase characters are distinct from lowercase characters. ...

You cannot use a keyword as a variable name.

Explanation:

_____ are fields that are used to personalize a mail merge document
A. rows of a spreadsheet data source
B. Excel workbooks
C. columns of the spreadsheet data source
D. cells

Answers

Answer:

The answer is A; rows of a spreadsheet data source.

Explanation:

What is the correct method to reset the contents of the CMOS NVRAM on HP Desktop / Workstation computers after the AC power has been disconnected

Answers

It should be noted that in order to reset the content of the CMOS NVRAM on HP Desktop, one can turn off the power and turn it back on while the person is holding the shift key.

It should be noted that the non-volatile RAM simply means a complementary metal-oxide-semiconductor chip that can be found inside computers which is vital for storing information.

To reset the content of the CMOS NVRAM on HP Desktop, one can turn off the power and turn it back on while the person is holding the shift key.

Learn more about computers on:

https://brainly.com/question/24540334

WHEN IS THE DESIGN PROCESS FINISHED IN ENGINEERING?​

Answers

Answer:

I think answers is it never ends

How many letters is in whatyoudoingareyougood

Answers

Answer:

43847823773 letters

Explanation:

haha to easy

Answer:

22 letters, 6 words.

:) hope this helps! <3

HELP PLZ 50 POINTS
What code would add a new array item named "home" to the array below?

var titles = ["score", "points"];

titles.put("home");
titles.push("home");
titles.set("home");
array.push("home");

Answers

Answer:

titles.push("home");

Explanation:

        It depends on if you want to change the original array or not, but since you are just adding on I think this is the correct option.

        "... 5 ways to add an item to the end of an array. Push, splice, and length will mutate the original array. Whereas concat and spread will not and will instead return a new array. Which is the best depends on your use case" (www.samanthaming.com)

[] Attached is from the same source

-> I think this is correct

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

Shadow and highlight create depth (3D).
TRUE OR FALSE

Answers

Answer:

true because then it would be like not popping out

what are quantum computers and it uses​

Answers

Answer: Quantum computers are machines that use the properties of quantum physics to store data and perform computations

Which of the following described a global network connecting billions of computers and other
devices?
A) WiFi
B
ISP
C
World Wide Web
D
Internet

Answers

pretty sure its wifi
A that pretty much it! Lol

What is the default folder for text file

Answers

documents or download

It depends where you install it to

Answer:

numbers are stored as characters

Explanation:

currently saved in if another folder

Can you help me to write a code with functions,arrays,and pointers in c++?
It can be a basic game or an interesting program.
But a little bit complicated :)
Please I need help :(((​​

Answers

Answer:

Your search for complete and error-free projects in C and C++ ends here! Here, we’ve enlisted all the mini-projects, projects, games, software and applications built using C and C++ programming language — these are the projects published in our site or available with us at the moment. You can download all these projects (with source code) for free; make sure to check their individual post description as well.

First thing, most students learn C and C++ as their first programming language. They quickly become able to write programs that include functions, arrays and pointers, file handling and data structure, etc. But, when it comes to building a mini-game, an application, or a small project, incorporating all these features in one compact program becomes difficult.

In such case, reference projects always come in handy. The C and C++ projects published in our site will teach you how to get started, give you ideas and topics regarding your project, and sharpen your programming skills in C and C++. Here, you’ll find short and simple as well as long and complicated projects.

Write steps of the following operations.
a. applying borders and spacing
b. create a folder​

Answers

Answer:

b

Explanation:

first right click on an empty space

click on new from the pop up menu

finally click on new folder

which type of writing is most commonly used in the field of information technology

Answers

Answer:

Technical writing

.........

How has A.I. evolved and helped humanity in recent times?

Answers

Answer:

AI has helped many people in these days.

Explanation:

With AI adoption on the rise, the technology is addressing a number of global challenges.

Artificial intelligence is being used to help crack down on illegal activities.

It is helping to tackle over fishing in our ocean.

And it is even being used to address the issue of gender imbalance.

If you are in the Slide Master view, what are the steps to add headers and footers?

Answers

Answer:

THat is the correct order.

Explanation:

Think about a career you would like to have 10 years from now.

What role does technology play into this career?

Why is technology beneficial?




Will mark brainliest

Answers

Answer: Scientist

Explanation: Scientists use technology to record data, as well as using technology to study different things, for example scientists use computers to track DNA.

which function would you use to change the appearance of data in a cell from decimal to percentage

Answers

Answer: use the numbers behind the decimal for the percentage

Explanation:

Answer:format

Explanation: I took the test

10. What Microsoft program is frequently used to develop pictorial representations
of a database's logical relationships?
A. Visio
B. Access
C. Excel
D. Word

Answers

Answer:

A. Visio

It's a "powerful tool for diagramming needs". In other words, pictures.

This is an image of the ...................... Topology. * If you get it right i will mark you brainlist ​

Answers

Answer:

Tree

Explanation:

6. Which devices of computer is known processing devices? las >​

Answers

Answer:

CPU is known as processing devices..!

Other Questions
What factors were common in 19th-century European revolutions? Choose three correct answers.the rise of nationalismthe expansion of national territorythe desire for national self-rulethe desire to unify territoriesinspiration from other revolutions Almost 99% of the Earth's atmosphere is made up of two gases. What ere the two gases and the percents of each? Where does meiosis occur in male and female? Y=-1,X+2y=-6 solve by substitution show all work 1 pointA jacket is on sale for $48 in a Texas store. The sales tax in Texas is 6,25%.How much does the jacket cost with sales tax included? * 11.Which of the following best describes how the generations view themselves in regards to the idealistic trait?(A) Millennial respondents are the least likely to consider themselves idealistic.(B) Each group is less likely to identify as idealistic as they get older.(C) Baby-Boomer respondents are more likely to consider themselves idealistic than Generation X respondents.(D) Silent Generation respondents are the most likely to consider themselves idealistic. In order to solve the following system of equations by elimination, which process creates opposite coefficients to eliminate the y variable?2x + y = 5 x + 4y = -7 A. Multiply the first equation by 4B. Multiply the second equation by 2C. Multiply the first equation by -4D. Multiply the second equation by -2 the people of the roman town of pompeii were killed by Let f(x)=x* + 14x and g(x) = 6 - X. Find the domain off f + g. Determine the domain of f + g. PLEASE HELP ME I AM ON A TEST PLEASE!!!!!!!!!!!! the first screenshot is the top of the page the second is the bottom of the page Figure A is a scale image of Figure B.302Figure A25Figure B10What is the value of x? Which statement best describes the significance of lines 13-15 on the meaning of the poem? A. The speaker is not worried they made the wrong choice because they can return to take the other road. B. The speaker is worried they took the more traveled road and will not be able to return to take the less traveled one. C. The speaker understands that taking one opportunity will likely prevent them from going back to take another. D. The speaker believes that they will be able to take all of the opportunities presented to them at some point in life. A bus accelerates away from the bus stop at 2.5 m/s2.The total mass of the bus and passengers is 14 000 kg.Calculate the resultant force needed to accelerate the bus and passengers.help pls my brain is not working Given the following information for Blue Bell Company for last year: Net sales (all on account) $5,200,000 Cost of goods sold 2,080,000 Interest expense 240,000 Income tax expense 280,000 Net income 420,000 Income tax rate 40% Total assets: January 1 $1,800,000 December 31 2,400,000 Shareholders' equity (all common): January 1 1,500,000 December 31 1,600,000 Current assets, December 31 700,000 Quick assets, December 31 400,000 Current liabilities, December 31 300,000 Net accounts receivable: January 1 200,000 December 31 180,000 Inventory: January 1 210,000 December 31 250,000 Refer to table: Blue Bell's current ratio at December 31 was:____.a. 2.33 times b. 3.67 times c. 0.43 times d. 1.33 times How are the nervous systems of a flatworm and a fish different? Hearing is to radio as sight is to eyes camera newstelevision Iodine-138 decays by beta decay. What element does it produce? Find the height of the building below by using your knowledge of trigonometry. how to calculate kinetic energy given mass and velocity 5/7 of __ is 1/7 plz help asap