1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inga [223]
2 years ago
13

Plsss help anyone PLSSSSS ​

Computers and Technology
1 answer:
Katena32 [7]2 years ago
3 0

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to write HTML code for the given sub-questions. In each sub-question different scenario is given. So, the answer to these questions is given below in the order they asked.

1. In this question it is asked to write a code of 5 students' name in a paragraph with a different color that make them unique.

<html>

<body>

<p style="color:red;">Student A</p>

<p style="color:blue;">Student B</p>

<p style="color:black;">Student C</p>

<p style="color:orange;">Student D</p>

<p style="color:green;">Student E</p>

</body>

</html>

2. In it, the below is given code show an ordered list of subjects that you're offering.

<html>

<body>

<h2>An ordered HTML list</h2>

<ol>

 <li>Introduction to Computing</li>

 <li>Communication Skills</li>

 <li>Software Designing</li>

</ol>  

</body>

</html>

3. The below-given HTML code shows the unordered list of parts that make up the computer.  

<html>

<body>

<h2>An unordered HTML list</h2>

<ul>

 <li>CPU</li>

 <li>RAM</li>

 <li>Motherboard</li>

 <li>Mouse</li>

 <li>Keyboard</li>

 <li>Monitor</li>

</ul>  

</body>

</html>

You might be interested in
Suppose you observe that your home PC is responding very slowly to information requests from the net. And then you further obser
atroni [7]

ANSWER: BOT

EXPLANATION: When a PC is experiencing the listed effects, it thus depicts that the PC is under attack by a bot, which is a type of script or software application that establishes automated tasks via command.

However, a bad bots often initiate malicious tasks that gives room for attackers to take control over an affected PC remotely, most especially for fraudulent activities.

When several affected computers are connected, they form a botnet connection.

6 0
3 years ago
PLEASE HELP!!!!!!!!!!
Shtirlitz [24]
<em>If i was answering this question I would pick D. Because a job is an organization of people working there and the people that work there have a strategic roll on the organization they work for because that's how they make their living!
</em>
7 0
3 years ago
Read 2 more answers
The largest value (in hex) that can be loaded into Register A of HCS12 is (Points : 2) 0x8.
andrezito [222]

Answer:

0xFF.

Explanation:

The Register A of HSC12 is an 8-bit register.So the maximum value for 8 bit is 8 1's (11111111). So the decimal value for the maximum 8 bits is 255 but all the options given are in hexadecimal so among the given options only 0xFF has the value of 255 in decimal  F=(1111)₂.So two F's make 8 bits and their decimal value is 255.

7 0
3 years ago
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
What is a flowchart and write it's work​
Artist 52 [7]

Answer: A flowchart is a type of diagram that represents an algorithm, workflow or process. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows. ... Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.

Explanation: brainliest plz!

3 0
3 years ago
Other questions:
  • "under the control panel, what console contains print management, computer management, and event viewer?"
    11·1 answer
  • Easy STEAM question :)
    15·2 answers
  • Explain why, with fast moving mobiles, speed is more dominant in characterizing the use mobility pattern than direction?
    8·1 answer
  • Select the correct answer.
    5·1 answer
  • What movie would be greatly improved if it was made into a musical?
    6·1 answer
  • Write a question that the database will understand. Which records are not equal to 5? &lt; 5 &gt; 5 &gt; =5 &lt; &gt; 5
    15·1 answer
  • A power supply unit for a computer converts:
    6·1 answer
  • In one to two sentences, describe how you would add a new slide to your presentation.
    11·2 answers
  • Privacy, anonymity, and freedom of expression are all interrelated.
    12·1 answer
  • How do you mark the brainiest?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!