1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
3 years ago
13

I can't get my images to come through on my HTML coding. What am I doing wrong?!

Computers and Technology
1 answer:
LiRa [457]3 years ago
8 0

Answer:

You might not be referencing or point to the actual path to the image file. Check the Image Source.

Explanation:  

Your Image might not display if you miss the actual image source.

You might be interested in
The major result of treating 1-butyne with 6M aqueous NaOH would be:_______.A. the production of an alkene.B. the production of
andriy [413]

Answer:

D. nothing, as the alkyne would not react to an appreciable extent.

Explanation:

Nothing, as the alkyne would not react to an appreciable extent.

6 0
3 years ago
A small workgroup inherits a second-hand printer without networking capabilities. Which of the following is the BEST method of s
butalik [34]
Answer: c

Explanation: connect the printer to a users work station and share the device
5 0
3 years ago
What are the possible values you can store in the C# "bool" data type?
Sergeeva-Olga [200]

Answer:

d are the values that can be stored in the c#"bool"data type

4 0
2 years ago
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
hoa [83]

Answer:

Option A i.e., AES is correct.

Explanation:

The user corporation is installing the wireless server and seems to be worried when anyone representing the rival corporation might stands outside that property as well as gather wireless information. He ensured that corporation which WPA2 is safe. However, AES creates WPA2 stronger than WPA.

  • Option B is incorrect according to the following scenario because it is the security mechanism used when component through the IEEE 802.11i WLAN standard.
  • Option C is incorrect according to the following scenario because it is the protocol initially developed for configure wireless clients to such a dial-in connection device.
  • Option D is also incorrect according to the following scenario because it is the terminal access control.
6 0
3 years ago
Why should a program close a file when finished using it?​
stellarik [79]

Answer:

To ensure that it's not using memory and taking up precious processing power.

Explanation:

Therefore, less programme running the more efficient and quicker the computer is as it can dedicate more ram and processing power to your current application.

3 0
3 years ago
Other questions:
  • What are 3 websites that talk about density of different gases, density in air, behavior of different gases of earth, convection
    13·1 answer
  • CJ is developing a new website blogging about cutting-edge technologies for people with special needs. He wants to make the site
    8·1 answer
  • Look at the data set below. {9, 12, 12, 15, 18, 20, 25} in this data set, what is the median
    5·2 answers
  • Create a structure representing a student. The member variables should include student name, student ID, and four test grades fo
    12·1 answer
  • Which operation would occur in the equation =C3+D5*C6-B2 in excel.
    11·1 answer
  • ---------------------- use of the Internet to access programs and data on computers that are not owned and managed by the user o
    9·1 answer
  • Explain the role of ICT in banks​
    8·1 answer
  • What are web protocols.
    14·2 answers
  • in python i wrote a function where if the user inputs a certain word the function repeats over again, since the function aaks fo
    10·1 answer
  • In computer science, what does it mean to interface?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!