1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
3 years ago
10

Which is an example of correct HTML?

Computers and Technology
1 answer:
posledela3 years ago
5 0

Answer:

This is a title

This is a title

Explanation:

You might be interested in
Write a function transpose(matrix) that returns the transpose of the input matrix, which is represented as a list of lists. Reca
mariarad [96]

Answer:you eat

Explanation:yea

4 0
2 years ago
How can you use the Address Book to address an email message? Use the drop-down menus to complete the sentences. 1. Type an emai
Delvig [45]

Answer:

1. AutoCorrect

2. Address book

Explanation:

stan bts ?

5 0
3 years ago
Read 2 more answers
The net force on a vehicle that is accelerating at a rate of 1.2 m/s2 is 1500 newtons. What is the mass of the vehicle to the ne
Rudiy27

Answer:

The mass of the vehicle is 1250kg

Explanation:

Given

Net\ Force = 1500N

Acceleration = 1.2m/s^2

Required

Determine the vehicle's mass

This question will be answered using Newton's second law which implies that:

Net\ Force (F) =  Mass (m) * Acceleration (a)

In other words:

F = ma

Substitute values for F and a

1500 = m * 1.2

Make m the subject

m = \frac{1500}{1.2}

m = 1250kg

<em>Hence, the mass of the vehicle is 1250kg</em>

6 0
2 years ago
When both inputs of a J-K edge-triggered FF are high and the clock cycles, the output will ________.
shutvik [7]

Answer:

Explanation:

Toggle

5 0
3 years ago
Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which a
myrzilka [38]

Answer: C

Explanation:

I believe this is because you cannot represent the number sixteen with only four binary bits. The highest you can go is 15.

3 0
3 years ago
Other questions:
  • What type of attack intercepts communication between parties to steal or manipulate the data?
    13·1 answer
  • Which of the following locations is the option to show hidden files or folders location
    7·2 answers
  • . Given an initially empty stack s that accepts integers, the following operations are performed: s.push (10) s.push (20) s.push
    13·1 answer
  • What are the features of a strong résumé? Check all that apply. The résumé is printed on regular printer paper. The résumé is we
    5·2 answers
  • True or false.the color attribute cannot recognized the hexadecimal code.
    7·2 answers
  • A network that is located in a small area, such as a single building is called a
    6·1 answer
  • What is the binary system?
    13·2 answers
  • when files on storage are scattered throughout different disks or different parts of a disk, what is it called
    10·1 answer
  • ~ I already know this ~ who was the bits victim in five nights at freddys 4 <br> ___10 points___
    12·2 answers
  • The use of a concept or product from one technology to solve a problem in an unrelated one
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!