1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
12

Which tag pair contains the items in an ordered or unordered list?

Computers and Technology
1 answer:
Serga [27]3 years ago
7 0
```
<ul>
  <li>item1</li>
  <li>item2</li>
</ul>
```
It's the same for ol.
You might be interested in
Your company has decided to replace several hundred hard drives. It would like to donate the old hard drives to a local school s
Tanzania [10]

Answer:

Drive Wipe F is correct

Explanation:

Drives content is virtual so it wouldn't work to shred or incinerate it. overwriting it wouldn't work to get rid of files exactly. it might get rid of the files but it would replace the files with other files.

3 0
3 years ago
Helo me pleace! Cartoons Disney answer! How many Dalmatian puppies are in Pongo and Perdita’s litter?
Sindrei [870]
15 puppies :) I hope this helps!
5 0
3 years ago
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create
lara31 [8.8K]

Answer:

1: Word Processor

2: Graphics Software

3: Mail Merge

Explanation:

Given

1. Create a list of invitees

2. Design an invitation card

3. Personalize the card

Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.

<em>So task 1 requires a word processor</em>

An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.

<em>So task 1 requires a graphics software</em>

Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.

5 0
3 years ago
Consider the following scenario. The Current State of One Particular ArrayList The capacity of a particular ArrayList is five (5
pshichka [43]

Answer:

The ArrayList initial functionality is 5, there were 4 components.

Then, add 25 more elements by using add()calling 25 times So total number of elements after the completed operation would be 4 + 25= 29.

5th component will be introduced without calling ensureCapacity(); while adding 6th element-> ensureCapacity(2* 5+ 1) it will call, making the capacity 11.

So ArrayList's capacity will be 11.

Next 7th to 11th components will also be added automatically once the 12th element is added, it will name ensureCapacity(2* 11+ 1) and make the capacity 23.

While adding 24th dimension, ensureCapacity(2* 23+ 1) will be called again and this will make the capacity 47.

There will therefore be 3 (three) calls to ensure the feature Ability).  

Elements of Rest 25th to 29th will be added seamlessly as ability becomes 47.

3 0
3 years ago
Data is communicated through various input devices true or false​
kipiarov [429]
I would believe this is true if the following are also true.

Input devices are things like keyboards, mouses, buttons, e.c.t.

If that is true then I would believe it to be true due to multiple inputs are being used to communicate.
3 0
3 years ago
Other questions:
  • Telepresence provides the opportunity for people to work from home and attend virtually. True False
    5·2 answers
  • A group of students want to create an educational online game for computer laboratory in their school which type of network will
    6·1 answer
  • Amy would like to find all records that were delivered on August 8, 2008. Her database has a field that tracks when the items we
    5·2 answers
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    11·1 answer
  • How to solve a program that accepts a number as input and prints just the decimal portion
    15·2 answers
  • Which is used to identify the network portion and the host portion of an ip address?
    6·1 answer
  • What are the top and side margins for a letter typed in standard format?
    11·1 answer
  • All of the following are simple steps for optimizing web page content except:
    15·1 answer
  • Complete the second clause of the following Prolog program for member/2 where member(X, Y) checks whether X is an element (a mem
    7·1 answer
  • Answer to this problem
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!