1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
3 years ago
9

Which html attributes are required in the image () element - check as many as apply

Computers and Technology
1 answer:
kotykmax [81]3 years ago
6 0

Answer:

The correct answer for the given question is option(3) i.  src.

Explanation:

In HTML if we insert a image on the screen we use<img> tag

the img have following attribute

1.src

2.height.

3 alt

4 width

The required attribute in img tag is src i.e source or path of image

The following are the syntax of image tag

<img src=" path of image" alt="not visible"  height="100px" width="100px"/>

The height and width attribute describe the height and width of image in pixel.

The alt attribute is not mendatory attribute in image tag.The alt attribute display the message when image is not visible in the web page .

All the other attribute like alt,height,width are used as per the requirement but src is an required attribute .

so the option(3) is correct.

You might be interested in
Will somebody please explain to me HTML?
larisa86 [58]

Answer:

Hypertext Markup Language (is also known as html) is the standard markup language for creating web pages and web applications.

3 0
3 years ago
Why does the IPv6 format use letters and numbers?
Iteru [2.4K]

Answer:

c is the response hope it helps

7 0
3 years ago
NEED HELP ASAP!
Marrrta [24]
Six inches is the answer
8 0
3 years ago
A calculator is not a computer because​
Lady_Fox [76]

\huge\fbox\red{❥answer}

By definition a computer is an electronic device used to store and compute data. So, by definition a calculator stores and interprets data/numbers, and that makes it a computer. However, a computer can also use programs, and manipulate stored data to complete those programs.

hope it helps!! :D

8 0
3 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Other questions:
  • How is informatics affecting banking and financial institutions?
    13·1 answer
  • The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
    5·1 answer
  • Can Any body Define what is search engine in a simple language quick please​
    14·1 answer
  • Fill in the blank.
    7·1 answer
  • In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
    8·1 answer
  • Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O.
    7·1 answer
  • Communication is defined as__________.
    10·1 answer
  • Describe the 3 different types of authentication
    6·2 answers
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    14·1 answer
  • What is the value of x after running this code?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!