1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
3 years ago
11

Part 1: Create a Web Page Copy and paste this code into an editor and complete these steps: About Me Web Page Your Name One para

graph about yourself. Three of my favorite things are: Favorite Item 1 Favorite Item 2 Favorite Item 3 Use the HTML Cheat Sheet and the skills you have learned so far in this lesson to practice writing HTML code in the text editor. Replace Your Name with your actual name and format with . Replace One paragraph about yourself with a paragraph about yourself. Replace the favorite items with your three favorite things. Format your three favorite things into a numbered list. Once you have created your page, copy and paste your HTML code from the Code View tab here:
Computers and Technology
1 answer:
skelet666 [1.2K]3 years ago
3 0

Answer:

<h1>About Me Web Page</h1>

<center><h2>(name)</h2></center>

<h3>Three Of My Favorite Things Are:</h3>

<ol>

<li>(Favorite item)</li>

<li>(Favorite item)</li>

<li>(Favorite item</li>

</ol>

<p>(Paragraph about myself</p>

You might be interested in
1.1 what is the osi security architecture? 1.2 what is the difference between passive and active security threats? 1.3 list and
ioda

The well-designed standard architecture for security features in computer networking is defined by the OSI Security Architecture.

The OSI architecture is widely accepted because it establishes the process for ensuring safety in an organization. In a live attack, the victim is made aware of it. The victim of a passive attack is not made aware of the attack. System resources can be modified during an active attack. System resources are not changing while under passive attack. Monitoring a system is the focus of passive assaults, which do not require changing any data on the target system. On the system under attack, active threats will alter data.

Learn more about system here-

brainly.com/question/14253652

#SPJ4

6 0
1 year ago
What is a thicknet?
pashok25 [27]
A type of coaxial cable
7 0
3 years ago
True or false?
mylen [45]

Answer:

true

Explanation:

sometimes you've just gotta roll with it. the final parts of the statement is what gives away the answer.

3 0
3 years ago
Design and implement an application that reads a string from the user then determines and prints how many of eachlowercase vowel
frez [133]
Design and implement an application that reads a string from the user, then determines and prints how many of each lowercase vowel (a, e, i, o, and u) appear in the entire string . Have a separate counter for each vowel. Also count and print the number of nonvowel characters .

SPECIFICATION OF PROMPTS, LABELS AND OUTPUT : Your code should use the prompt "enter string : ". After the input is read, there are six lines of output , each starting with a different label: "a: ", "e: ", "i: ", "o: ", "u: ", "other: " in that order. After each label is the required count.

For example: if "aardvark heebie jeebies" were read in,
4 0
3 years ago
Which column and row references are updated when you copy the formula f$3/15
Tasya [4]

Answer: Column F

Explanation: In Microsoft excel, for the sake of robustness and to aid the effectiveness of updating formulas across cells. The reference of cells are treated as relative which means that when formulas are copied across columns or within rows, they get updated automatically. However, some numbers may be treated as constants such that we do not want them to change or be updated as we move acisss cells. Thus, such numbers are treated Given absolute references, which is made possible by adding a '$' prefix before the colum alphabet or row number or both. in the scenario given above, the row has the $ prefix, hence, it is absolute and will not change but the column alphabet does not and hence, treated as relative.

3 0
3 years ago
Other questions:
  • Can someone show me a image of this completed I will mark brainliest!!! It's typing.com
    11·1 answer
  • Look at the code in the example below, and then answer the question. In the example code, what does the title attribute create?
    12·2 answers
  • So im leavin brainly....goodbye. (❤´艸`❤)
    13·2 answers
  • I need help, please and thank you.
    7·2 answers
  • In modern web design, color, font, font size, and style should be declared using:
    5·1 answer
  • A student builds a model of an ATP molecule out of some scraps she finds at home. She uses a block of wood for the bulk of the m
    5·1 answer
  • An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks
    6·2 answers
  • Sarah is having a hard time finding a template for her advertising business that she may be able to use at a later
    12·1 answer
  • Match the title of the work of fiction to the description given.
    8·1 answer
  • Create a function named CountVowels() that takes one parameter name epsilon
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!