1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
2 years ago
6

1) Coding for Table in Html​

Computers and Technology
1 answer:
poizon [28]2 years ago
3 0

See below for the code in HTML

<h3>How to code the table in HTML?</h3>

The given table has the following features:

  • Tables
  • Cell merging
  • List (ordered and unordered)

The HTML code that implements the table is as follows:

<table border="1" cellpadding="1" cellspacing="1" style="width:500px">

<tbody>

 <tr>

  <td colspan="1" rowspan="2"><strong>IMAGE</strong></td>

  <td colspan="1" rowspan="2"><strong>name</strong></td>

  <td colspan="2" rowspan="1"><strong>first name</strong></td>

 </tr>

 <tr>

  <td colspan="2" rowspan="1"><strong>last name</strong></td>

 </tr>

 <tr>

  <td>DOB</td>

  <td>yyyy</td>

  <td>mm</td>

  <td>dd</td>

 </tr>

 <tr>

  <td>Qualifications</td>

  <td colspan="3" rowspan="1">references</td>

 </tr>

 <tr>

  <td>

  <ol>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

  <td colspan="3" rowspan="1">

  <ol type = "a">

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

 </tr>

</tbody>

</table>

<p>&nbsp;</p>

Read more about HTML at:

brainly.com/question/14311038

#SPJ1

You might be interested in
John wants to know the amount of ram memory installed on his computer. in which category of the windows 7 control panel can this
Verizon [17]

John can find the amount of Random Access Memory (RAM) memory installed on his computer with the Windows 7 under the category “<u>System and Security</u>” in the Control Panel.

To know the total amount of installed RAM through Control Panel in the computer with Windows 7, John should follow the steps as:

  • Click the Windows key
  • Type Control Panel
  • Click the category named “System and Security”
  • Now under “System”, click “View amount of RAM and processor speed”
  • “Device Specifications” section displays the amount of installed RAM in John’s computer

Thus, above are the steps by which John’s can find the amount of installed RAM in his Windows 7 computer’s Control Panel.

What is Random Access Memory (RAM)?

RAM is the temporary memory in computers that stores the data currently being used by the processor.

You can learn more about Control Panel at

brainly.com/question/1445737

#SPJ4

5 0
1 year ago
Ignore this it a temporary note for me: SPSstudents
Westkost [7]

Answer:

okk

Explanation:

3 0
2 years ago
What changes should be made in OSI model(Open System Interconnection).
saveliy_v [14]

Answer:

Explanation:

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top--it’s what most users see. In the OSI model, this is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data it to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications  that rely  on Layer 7.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

4 0
3 years ago
Read 2 more answers
Which formal security-related process should take place at the beginning of the code creation project? Group of answer choices R
Igoryamba

Answer:

Risk assessment, Input validation and Output validation.

Explanation:

Software development life cycle, SDLC, is a systematic process a software being created must pass through or follow, from the stage of conception to death of the application.

There are various processes that occurs at the beginning of SDLC, a few of the activities are risk management, input and output validation.

Risk management is used to determine the feasibility, usefulness and profitability to cost of the software before development. The input and output validation is for security control access to the data of the software.

3 0
3 years ago
Give reasons why local efforts are required to conserve biodiversity​
mario62 [17]
The most obvious reason for conservation is to protect wildlife and promote biodiversity. Protecting wildlife and preserving it for future generations also means that the animals we love don't become a distant memory. And we can maintain a healthy and functional ecosystem.
3 0
3 years ago
Other questions:
  • Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an in
    6·1 answer
  • Programming CRe-type the code and fix any errors. The code should convert non-positive numbers to 1.
    12·1 answer
  • A law office has been leasing dark fiber from a local telecommunications company to connect a remote office to company headquart
    14·1 answer
  • An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
    6·1 answer
  • You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o
    6·1 answer
  • Many languages do not use the characters of U.S. English. Suppose you wanted to be able to
    15·1 answer
  • Fill in the blank with the correct response.
    5·2 answers
  • Suppose we want to select between two prediction models M1 and M2. We have performed 10-fold cross validation on each. The error
    14·1 answer
  • Please please help I don’t understand this
    6·1 answer
  • ______ is used to extract knowledge from sources of data-NoSQL databases, Hadoop data stores, and data warehouses-to provide dec
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!