1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
4 years ago
5

Add a checkbox associated with each label. The first checkbox should have name and id of "likeCats" and be initially checked. Th

e second checkbox should have name and id of "likeDogs" and be initially not checked. SHOW EXPECTED
Computers and Technology
1 answer:
Triss [41]4 years ago
6 0

Answer:

<input type="checkbox" name="likeCats" value="likeCats" checked>likeCats

<input type="checkbox" name="likeDogs" value="likeDogs">likeDogs

Explanation:

In HTML, you can add checkboxes by using the <input type="checkbox"> tag. To add it to a form where the user can submit the selection, you can encapsulate the input inside a form as in the example below:

<!DOCTYPE html>

<html>

 <body>

   <h1>Checkboxes:</h1>

   <form action="submit">

     <input type="checkbox" name="likeCats" value="likeCats" checked>likeCats

     <input type="checkbox" name="likeDogs" value="likeDogs">likeDogs

   </form>

 </body>

</html>

You might be interested in
If str 1 and str2 are both Strings, which of the following expressions will correctly
Novosadov [1.4K]
Str1==str2 is the answer
3 0
4 years ago
In 3-5 sentences describe whether or not files should be deleted from your computer explain your answer
Nata [24]

Answer:

I'm not exacly sure what you mean what type of files?

Explanation:

5 0
3 years ago
Point: A Point in a two dimensional plane has an integer x coordinate value and an integer y coordinate value.
UNO [17]

Answer:

They are connected

Explanation:

8 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
Difference between volatile and non volatile memory
slega [8]
<span>Volatile memory requires electricity or some kind of current to store information, and nonvolatile memory does not.</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which argument forces a writer to return to and change the input before resolving a “UnicodeError”?
    10·1 answer
  • Two words are a ""reverse pair"" if each is the reverse of the other. Write a program that finds all the reverse pairs in the wo
    12·1 answer
  • A popular Voice over Internet Protocol (VoIP) service is ________.
    12·1 answer
  • Why do we have to watch a video to get answers?
    7·2 answers
  • If you uncheck the option to "Replace text as you type," what will occur?
    5·2 answers
  • I have answered 22 questions and my messages are still not working what is it that i'm doing wrong?
    6·1 answer
  • An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
    14·1 answer
  • How to tell if your cell phone is being tracked tapped or monitored by spy software?
    12·1 answer
  • The ____ line for any e-mail messages you write should clearly state the intention of the e-mail..
    15·1 answer
  • What virtual, logically defined device operates at the data link layer to pass frames between nodes?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!