1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SpyIntel [72]
3 years ago
9

Identify the correct XHTML syntax for inserting an image as a hyperlink from the options provided. A. book.gif B. C. D.

Computers and Technology
1 answer:
mariarad [96]3 years ago
4 0

Answer:

The Correct syntax for inserting an image as hyperlink is given in explanation section

Explanation:

To make an image act as a hyperlink, place the image element within the HTML anchor "<a></a>"  element.

The syntax of inserting image hyperlink in XHTML is given below.

<a href = "link_that_can_be_accessible"><img src="source of image" alt="display name if image not shown in the browser" border="0"/></a>

for example lets insert image as hyperlink

<a href="ajax.html"><img src="logo.gif" alt="AJAX" border="0" /></a>

The default appearance is a blue border around the image. Specifying border="0" removes the border around the image.

if you want to insert image from another folder then the image hyperlink looks like this:

<a href="ajax.html"><img src="/images/html5/logo.gif" alt="AJAX" border="0" /></a>

If you want to insert image from another server then image hyper link looks like this:

<a href="ajax.html"><img src="https://www.myExample.com/images/html5/logo.gif" alt="AJAX" border="0" /></a>

You might be interested in
Name the major types of computer systems from slowest to fastest. ​
Vadim26 [7]

Answer:

Cache is the fastest and most expensive, RAM is slower and less expensive, and virtual memory is the slowest and least expensive type.

Explanation:

3 0
2 years ago
Describe how you can use JavaScript to simulate the behavior of the placeholder attribute in older browsers
kirza4 [7]

JavaScript can be used to simulate the behavior of the placeholder attribute in older browsers by using the placeholder attribute which add a placeholder text as a default value and using a different color to differentiate from a color previously entered.

<h3>How are behavior simulated?</h3>

Normally, a user can simulate the behavior of placeholder text in older browsers by setting the value of the value property.

In conclusion, the JavaScript can be used to simulate the behavior of the placeholder attribute in older browsers by using the placeholder attribute which add a placeholder text as a default value and using a different color to differentiate from a color previously entered.

Raed more about JavaScript

<em>brainly.com/question/16698901</em>

6 0
2 years ago
LAB: Formatted output: Hello World! Write a program that outputs "Hello World!" For ALL labs, end with newline (unless otherwise
maxonik [38]

Answer:

public class LabProgram {

  public static void main(String[] args) {

     System.out.println("Hello World!");    }  }

Explanation:

In this statement: System.out.println

System is a class in JAVA language package

out is a member of class System

println() is a functionT to print or display message to a console or file

So the message to print here is Hello World!

Now this statement   System.out.println prints the message "Hello World!" passed in the argument.

Hence this statement as a whole displays the message Hello World! on the output screen.

6 0
3 years ago
0 Select the correct answer. Which is an advantage of programming with a procedural language? A. Procedural program code is easy
Novosadov [1.4K]

Answer:

D. Algorithms of simple problems are readily available for reference. ​

Explanation:

Hope this helps you! Ask me anything if you have any quistions!

7 0
2 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
2 years ago
Other questions:
  • .Although SQL is a language, you don’t use it to write applications? (true, false)
    8·1 answer
  • Why computer process faster than humans?​
    10·2 answers
  • Is a psychrometer more likely used at a beach or a desert in California
    12·1 answer
  • Cloud computing is an old phenomenon in computing infrastructure dating back to the early days of the Internet that involves mov
    10·1 answer
  • What is the effect of block size in cache design?
    12·1 answer
  • PAGE<br>DATE<br>0 What types of information should be there internet?​
    5·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • Helppppppppppppppp me please Can i have help for a ggogle class room
    5·1 answer
  • How do I write a good personal narrative pls help im struggling very hard rn.​
    15·1 answer
  • 1. image-editing software
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!