1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
12

I need someone who knows HTML to finish the code.

Computers and Technology
2 answers:
Maksim231197 [3]3 years ago
7 0
I recommend you go to Stacks Overflow . There are many experienced coders there that would gladly answer your question.
const2013 [10]3 years ago
4 0

Brainly won't let you insert hyperlinks so I'll do this as a picture.


You might be interested in
Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstat
EastWind [94]

Answer:

E). User education and training.

Explanation:

In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' <u>If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked</u> while working on the workstation and no networks could be compromised. Thus, <u>option E</u> is the correct answer.

3 0
3 years ago
Darian is preparing for a presentation about the poor condition of the locker rooms at school. Match each of the key components
Gemiola [76]

Answer:

Purpose - To paurswade the board to change the conditions of the locker room

Topic - Locker room condition

Method - Electronic Slideshow

Audience - School Board

7 0
2 years ago
Which is a key component to participating in a school-to-work program? A. Dual enrollment opportunities B. Community service opp
PtichkaEL [24]
The answer is D. Job shadows
5 0
3 years ago
Read 2 more answers
What is the default junk email protection in Outlook 2016?
Shtirlitz [24]
The answer to ur question is D
4 0
3 years ago
Read 2 more answers
Smartphones use ________ technology, allowing users to perform several functions with one device. group of answer choices embedd
12345 [234]

Smartphones use <u>convergence or integration</u> technology, allowing users to perform several functions with one device.

<h3>What are smartphones?</h3>

Smartphones can be defined as hybrid versions of mobile devices that are designed and developed to have more features, so as to enable them run different software applications, functions and perform tasks with the aid of software applications such as web browsers, multimedia player, etc.

<h3>Types of smartphones.</h3>

In Computer technology, there are three popular types of mobile devices and these include the following:

  • Handheld computers
  • Personal digital assistants (PDAs)
  • Smartphones.

In Computer technology, smartphones are designed and developed to use <u>convergence or integration</u> technology by combining previously unrelated technologies together, in order to allow end users perform several functions with one device.

Read more on smart phones here: brainly.com/question/15867542

#SPJ1

8 0
2 years ago
Other questions:
  • Type the correct answer in the box. Spell the word correctly. What aspect should you consider before adding pictures to a docume
    7·2 answers
  • How many points are in an inch? <br> A 24<br> B 50<br> C 72<br> D 100
    5·1 answer
  • Systems such as smartphones, appliances, game controllers, cable set-top boxes and automobiles that contain small computers are
    5·1 answer
  • Which of the following best describes the purpose of a design specification?
    14·2 answers
  • Declare an array named a of 10 elements of type int and initialize the elements (starting with the first) to the values 10, 20,
    13·1 answer
  • What does a wholesaler do?
    12·1 answer
  • What is the difference between ‘’ and “” string type in python?
    13·1 answer
  • How to fix a light blub
    11·2 answers
  • You're making great progress on your assignment. You've defined the purpose of your message, identified both the primary and sec
    9·1 answer
  • Write code that outputs variable numCats. End with a newline.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!