1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
2 years ago
13

Which of the following statements are TRUE about formatting images in HTML.

Computers and Technology
1 answer:
DiKsa [7]2 years ago
6 0

The following statements are TRUE about formatting images in HTML is that In HTML, when formatting images, there is no pixel limit for the width and height attributes.

<h3>What are formatting images in HTML.?</h3>

One of the most effective approaches to resize a photograph withinside the HTML is the usage of the peak and width attributes at the img tag. These values specify the peak and width of the photographic element. The values are set in px i.e. CSS pixels. For example, the authentic photograph is 640×960.

When you figure with historical past images, you can need an photograph to stretch to healthy the web page no matter the huge variety of gadgets and display screen sizes. The fine manner to stretch a photograph to healthy the historical past of detail is to apply the CSS3 property, for historical past size and set it identical to the cover.

Read more about the  HTML:

brainly.com/question/4056554

#SPJ1

You might be interested in
How does an employer judge a candidate ​
vaieri [72.5K]
Test the candidate
Assess for practical experience
Determine strengths needed for the position.
6 0
4 years ago
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
3 years ago
A potential threat to administrators’ ability to manage the correctional system is
OlgaM077 [116]
(privatization) is your answer to this question you are asking 
4 0
3 years ago
How will you maintain electrical tools and equipment?
PSYCHO15rus [73]
Electronic tools should not rub against each other when stored. Keep all the tools in the dry area and protect them from moisture, dust, and direct sunlight. To prevent injuries, keep the sharpen tool in a tool holder.
4 0
3 years ago
Read 2 more answers
Write a program that reads in ten numbers and displays the number of distinct numbers and the distinct numbers separated by exac
ELEN [110]

Answer:

The program to this question can be given as:

Program:

//import package.

import java.util.*;

public class Main //defining the class

{

public static void main(String[] args) //defining main method  

{

 Scanner ob = new Scanner(System.in); //creating scanner class object.

 int[] a = new int[10];//define array.  

 int number,counts= 0,i;//define variable.

 System.out.print("Enter numbers: "); //message.

 for (i = 0; i < 10; i++) //loop  

 {

  number=ob.nextInt();

  if (isDistinct(a,number))

  {

      a[counts] = number;//assign value in array

      counts++; // Increment count

  }

 }

 System.out.println("The distinct numbers is :" + counts);

 System.out.print("The distinct number are :");

 for (i = 0; i <a.length; i++)//loop

 {

  if (a[i] > 0)

  {

   System.out.print(" " +a[i]);//print array.    

  }

   

 }

 System.out.println();

}

public static boolean isDistinct(int[] array, int num)//defining method  

{

 for (int i = 0; i < array.length; i++)//loop for check number  

 {

  if (num == array[i]) //check condition

  {

      return false; //return value false.

  }

 }

 return true; //return value true

}

}

Output:

First time run:  

Enter ten numbers: 1 2 3 4 5 6 7 8 9 10

The number of distinct numbers is 10

The distinct numbers are 1 2 3 4 5 6 7 8 9 10

Second time run:

Enter numbers: 2 3 5 8 7 4 3 2 1 2

The distinct numbers is :7

The distinct number are : 2 3 5 8 7 4 1

Explanation:

The description of the above java code can be given as:

  • In the above java code, a class is defined that is main inside a class-main function is defined in the main function firstly creating a scanner class object that is "ob" then define variables and array that are number, counts and a[].
  • To inserts array elements we use a loop. In the loop, we use integer variable number and define a condition in if block passes a function that check value count total value.
  • In the second loop, we check the condition that array elements value is greater than 0 and print all array elements.
  • The isDistinct function checks in the array two values are not the same. if the values are the same it will return false value because this function is the boolean type that returns an only boolean value.
6 0
3 years ago
Other questions:
  • When data are normalized, attributes in the table depend only on the secondary key?
    5·1 answer
  • In c++
    9·1 answer
  • What type of storage system is a hard drive on a computer?<br> Need HELP fast, please.
    9·2 answers
  • Technicans A says the engine camshaft converts reciprocating motion of the piston into rotary montion for power output. Technici
    10·1 answer
  • A problem associated with old drivers is:
    8·1 answer
  • To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
    7·1 answer
  • On an XBOX 360, what does it mean if you get 4 red rings on your console?
    5·1 answer
  • What is the use of folders in the computer system ?​
    14·1 answer
  • What are some of the functions in the Consolidate dialog box? Check all that apply.
    6·1 answer
  • Which of the following is the safest authentication method?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!