1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Finger [1]
3 years ago
8

Write a simple Html structure and explain the meaning of each line

Computers and Technology
1 answer:
seropon [69]3 years ago
7 0

Answer:

HTML stands for HyperText Markup Language and is the basic structural element that is used to create webpages. HTML is a markup language, which means that it is used to “mark up” the content within a document, in this case a webpage, with structural and semantic information that tells a browser how to display a page. When an HTML document is loaded by a web browser, the browser uses the HTML tags that have marked up the document to render the page’s content.

There are three types of code that make up a basic website page. HTML governs the structural elements, CSS styles those elements, and JavaScript enables dynamic interaction between those elements.

You might be interested in
What is a critical consideration on using cloud-based file sharing and storage applications.
Dmitry [639]

Answer:

Determine if the software or service is authorized

Explanation:

:)

3 0
2 years ago
Describe a sub routine​
Maksim231197 [3]

Explanation:

A routine or subroutine, also referred to as a function procedure and sub program is code called and executed anywhere in a program. FOr example a routine may be used to save a file or display the time.

4 0
3 years ago
What is output by the following code?
Naily [24]

Answer:

Sum = 3

Sum = 9

Sum = 18

Sum = 30

Look at the image for more information.

4 0
2 years ago
Its made up of a small memory chips on a card that can hold data in an electronic format​
valina [46]

The chip can allow you to have more data and more pictures so your phone does not become slow and messages and apps and more.

4 0
3 years ago
pen the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which event will take place if
zysi [14]

Answer:

Packets with unknown source addresses will be dropped.

Explanation:

This question is incomplete, we must add the number "1" in Fa0/1.

Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

There are four options:

- A notification is sent.

- A syslog message is logged.

-The interface will go into error-disabled state.

- Packets with unknown source addresses will be dropped.

In this specific example, we have configured a security protection mode, if there is an unknown MAC address,  every package will be dropped.

We can configure in our switch with different Mac address, if there is not a MAC address in our configuration, the security mode will active, and we could receive any package.

5 0
4 years ago
Other questions:
  • In a social networking site your personal information is listed under your inbox. home. status. profile.
    11·1 answer
  • Which of the following is the term for software that automatically displays or downloads unwanted offers?
    15·1 answer
  • So when i try to click on an assignment to answer it the ask a question thing pops up and i can't exit out of it. I've tried rel
    10·2 answers
  • True or false: within a database, fields can be added, deleted and edited but never moved.
    11·1 answer
  • Gregory Yob is associated with which of these games?
    7·2 answers
  • A regular polygon is an n-sided polygon in which all sides are of the same length and all angles have the same degree (i.e.,the
    15·1 answer
  • . Select the advantages of RAID-5 relative to other RAID schemes. (MAY SELECT MULTIPLE)
    7·1 answer
  • Which 3D game has Bentley the Bear collect gems while avoiding enemy trees, bees, ghosts, skeletons, and Berthilda the witch?
    9·1 answer
  • Public class Square extends Shape{
    13·1 answer
  • Which type of data is most sensitive and should be protected from malware?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!