1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
2 years ago
6

1) Coding for Table in Html​

Computers and Technology
1 answer:
poizon [28]2 years ago
3 0

See below for the code in HTML

<h3>How to code the table in HTML?</h3>

The given table has the following features:

  • Tables
  • Cell merging
  • List (ordered and unordered)

The HTML code that implements the table is as follows:

<table border="1" cellpadding="1" cellspacing="1" style="width:500px">

<tbody>

 <tr>

  <td colspan="1" rowspan="2"><strong>IMAGE</strong></td>

  <td colspan="1" rowspan="2"><strong>name</strong></td>

  <td colspan="2" rowspan="1"><strong>first name</strong></td>

 </tr>

 <tr>

  <td colspan="2" rowspan="1"><strong>last name</strong></td>

 </tr>

 <tr>

  <td>DOB</td>

  <td>yyyy</td>

  <td>mm</td>

  <td>dd</td>

 </tr>

 <tr>

  <td>Qualifications</td>

  <td colspan="3" rowspan="1">references</td>

 </tr>

 <tr>

  <td>

  <ol>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

  <td colspan="3" rowspan="1">

  <ol type = "a">

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

 </tr>

</tbody>

</table>

<p>&nbsp;</p>

Read more about HTML at:

brainly.com/question/14311038

#SPJ1

You might be interested in
Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and d
klasskru [66]

Answer:

Chief Security Officer

Explanation:

According to the given statement in the question the Jeremy's role in the company is "Chief Security Officer (CSO)".

The chief Security officer has the role of developing and looking on to the strategies and policies that are required for maintaining the operational, strategic, financial and reputational security  of the  overall company.

6 0
3 years ago
When are numbered lists generally used?
laiz [17]
<span>C. when listing items that have an order of priority </span>
4 0
3 years ago
Read 2 more answers
The true or false questions.
tankabanditka [31]

Answer:

false

Explanation:

-exec option is not mandatory for the find command.

find will still list out the identified files even in the absence of -exec option.

For example:

find . -name test -print

will print out files with the name 'test' in the current directory. Note that there is no exec option in this example.

Same holds true for find with no additional options at all.

For example:

find .

will list out all files in the current directory.

3 0
3 years ago
Q.drtrdyudoijoemrkdf
sveta [45]

Answer:

Yes

Explanation:

8 0
2 years ago
Read 2 more answers
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
Other questions:
  • Today, air travel allows large numbers of people to move quickly over long distances. Which of the following is a likely effect
    8·1 answer
  • You've been hired as a consultant to help an online store owner. You need to complete the implementation of conversion tracking
    5·1 answer
  • Your boss wants to utilize some sort of cloud storage for his files so that all of his
    10·2 answers
  • Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.
    10·1 answer
  • A _________ is automatically launched by some trigger and appears in front of the active window
    12·1 answer
  • What best describes presentation software?
    14·1 answer
  • 1. select the correct answer from the given options.
    5·1 answer
  • Which category does this fall in identity theft​
    6·1 answer
  • A human subject’s photographs show two catchlights in each eye that are unwanted by the photographer. What is the most likely ca
    12·1 answer
  • Can you move it like this? I can shake it like that
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!