Answer:
The answer to this question is option 1,2 and 4.
Explanation:
Some html elements does not contain anything or having no content are called empty html elements.for ex:- <br>,<hr> etc.
HTML elements are of two types block and inline.block elements starts with new line for ex:-div,body etc.Inline elements does not starts with new line.for ex:-<style>,<meta>,<head>etc.
Html elements also contains attributes that modify the element for ex:-
<body style="background-color:blue;">
where style is an attribute.
Answer:
What was the term "cyberspace" originally used to describe? the account of artificial intelligence found in some science fiction. Although many people incorrectly use the terms interchangeably, the Internet and the World Wide Web are not the same.
Explanation:
Answer: Database software is bought on basis of the processing, cost, requirement etc for any particular . According to the financial perspective the database software should have the following characteristics:-
- Database software that has most accurate and main feature according to the business requirement is selected for buying and the others with extra features are not considered as more feature cost more amount which is not needed.
- Database software which is still in progress to be built is pre-booked and money is invested on it because the price of the required software might increase after getting completed.
- Scalable database software should be bought so that it can extend according to need at low cost.
Explanation:
The pointer is the variable that will store the address of the other variable of the same datatype.
Following are the disadvantages of using a pointer.
1. Pointer sometimes causes a segmentation fault in the program.
2. Sometimes pointer leads to a memory leak.
3. A pointer variable is slower than normal variable.
4. Sometimes the program is crash if we using pointer because sufficient memory is not allocated during runtime.
5. If we using pointer it is difficult to find the error in the program.
Answer:
Amber needs to run with the document and hide it in a safe place so no one else can access her document:)