Answer:
from the document and show the code it used to do it. Need it ASAP before this monday. Tables.sql file need to do this is in the document file. Extra points and brainliest for one who have most correct
1.
2.satin stitch
3.lazy daisy stitch (detached chain )
4.chain stitch
5. cross stitch
6. french knot
7.
8.split stitch
9.
10. back stitch
the others i can’t tell.
In order to display web pages, the browser interprets HTML formatting instructions. Web pages is a hypertext document and it is connected to the World Wide Web or called WWW. The web page or webpage is a document displayable by a browser and it is usually written in HTML or comparable markup language.
Answer:
Safe.
Explanation:
<em>Misusing your personal information does not only includes providing accurate information to websites online to avail goods and resources but also, handling your information properly. Handling information includes provision of security measures to safe guard your online data. Listed below are common practices that you can implement to ensure that you are practicing correct use of information to keep yourself safe online:
</em>
<em>1. Never post your private information online such as (Your home address, phone numbers, passwords and credit card numbers). You should be aware of the information you could only share online. Private information such as enumerated above must never posted. Online users who could read these information includes your friends and strangers.
</em>
<em>2. Never post too revealing images of yourself. Well, we don't want strangers to feast on your photos online. </em>
<em>3. If someone asked for your private information via social media, email and messages, do not give them. Some users may use names of people that you know. Remember, businesses and people close to you will ask for your information personally and on official transactions. If one would ask through websites, they are unauthorized persons or hackers who just want to steal your credentials and private information.
</em>
<em>There are lots of security practices which you can follow to ensure your safety online.</em>