1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
15

What do you have to do to see the html code on a website?

Computers and Technology
2 answers:
kicyunya [14]3 years ago
7 0
Behind every website there is a source HTML code. The code starts with the phrase tag
<span><span><code>.
</span>There are several ways how to see the html code.
Some of them are:
1. There is a keyboard shortcut (Press Ctrl + U) and the HTML code will appear in a separate window.
2. You should <span>hold the mouse pointer over a blank part of the web page, right click and choose "Page Source".
</span></span>
<span />

Sunny_sXe [5.5K]3 years ago
6 0
I'd suggest you go to this site, "https://www.computerhope.com/issues/ch000746.htm". Since I don't know what your using like google chrome and such.
You might be interested in
Case-Based Critical Thinking Questions Case 1-2 Ted is asked to create a page containing his family photos for a family reunion
Vera_Pavlovna [14]

Answer:

Image tag or <img> tag

Explanation:

HTML refers to Hypertext Markup language. In this, we can be designed our documents by applying the font, color, image i.e to presented in the web browser. It is used for creating the webpages

Since in the question, Ted has approx 20 pictures for the post having caption and wants to display the picture so he needs to use the image tag or <img> for displaying the pictures. This tag is used for linking the images for the web pages you have created

7 0
3 years ago
How many references should you have ready to list if an employer asks for them? a. 1-3
Leno4ka [110]
Best to have as many as possible. However usually 3
8 0
3 years ago
open your browser and enter the address of this ftp site in the address box: ftp.cengage. if your browser supports ftp, a logon
Licemer1 [7]

FTP access is available from other companies, but access is constrained unless the user first authenticates by supplying a user name and potentially a password.

The files are frequently intended for specific uses rather than for public release. For instance, you must send a letter house your consumer address list. Both businesses would not want the public to have access to these materials in this situation. Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context. Software refers to the processes and programs that enable a computer or other electrical device to function.

Learn more about software here-

brainly.com/question/985406

#SPJ4

7 0
1 year ago
Which part of a computer s ip address configuration indicates the portion of the address that specifies the network address?
vivado [14]
The NETWORK mask is and'ed with the IP address to get the network number.

Example:

192.168.1.1 & 255.255.255.0 = 192.168.1.0/24

It's worth the effort to do this in binary, it makes much more sense.
4 0
3 years ago
Am i the only one that finds so much bots on peoples pages lol
marshall27 [118]
Nah, I see that too lol
6 0
3 years ago
Other questions:
  • What is the curriculum of digital literacy
    6·1 answer
  • In ipv4 addressing, an ip address whose first octet is in the range of 192–223 belongs to a class ____ network.
    15·1 answer
  • What is the definition of delimited text?
    14·2 answers
  • What type of html list will automatically place a number in front of the items?
    9·1 answer
  • 1. The precious metals needed to make computer chips, graphic cards, and transistors are found in only a small population of cou
    8·1 answer
  • The acronym GUI is short for
    9·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • What is the analysis and complexity of a shell sortalgorithms?
    6·1 answer
  • Write function that ask for input from a user. Use this input as input for the countdown function that we wrote using the while
    6·1 answer
  • 1. Write a statement that opens the file Customers.dat as a random access file for both reading and writing.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!