1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
3 years ago
10

Now that you’ve learned how to make a basic webpage using HTML and CSS, you’re going to get creative with your skills! For this

activity, you will be making a tutorial explaining a favorite hobby, game, or process.
For an example, check out this tutorial of how to play a tambourine!

https://www.wikihow.com/Play-a-Tambourine

Your tutorial must include the following elements:

An informative title
A brief overall description of the hobby, skill, or process
At least two different headings
An ordered list to show the steps required, with a nested unordered list for at least one step (Remember what nested means? Think “a list within a list.”)
A picture for each ordered list that demonstrates the corresponding part of the process
At least four CSS rules for the various elements on your webpage
You will code your webpage in REPL.it and will need to create a new REPL. (Remember to choose HTML, CSS, JS as your language). When you’re finished, share the link to your webpage with your teacher by clicking on the share button and copying the link.
Computers and Technology
1 answer:
bearhunter [10]3 years ago
4 0

Answer:

im trying to figure this out i will tell you when i am finished

Explanation:

I will edit it when im done

You might be interested in
hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
aalyn [17]

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

3 0
3 years ago
In which of the following is “y” not equal to 5 after execution? X is equal to 4.
Step2247 [10]

Answer:

d) y=x++

Explanation:

In all 3 statements:

y= ++x;

y=x=5;

y=5;

The value of y is equal to 5.

However in the statement y=x++, the value of 5 is equal to value of x prior to the increment operation. The original value of x was 4. So the value of y will be 4. Note that after the statement execution, the value of x will be updated to 5. In effect y=x++ can be visualized as a sequence of following steps:

x=4;

y=x;

x=x+1;

5 0
3 years ago
30 mins and I will give Brianlest what is the difference between a method and a function in which ways are they similar why do y
omeli [17]

Answer:

For 1), you should also add that methods in C++ are called member functions. Thus, the difference between functions and methods in this context is analogous to the difference between functions and member functions in C++. Furthermore, languages like Java only have methods. In this case, functions would be analogous to static methods and methods would have the same meaning. For 2), you should add that a method is able to operate on the private instance (member) data declared as part of the class. Any code can access public instance data.   A function is a mathematical construct. I would say all methods are functions but not all functions are methods

Explanation:

8 0
3 years ago
Gino has purchased a secondhand laptop. It came preinstalled with various application software and system tools. Which tools can
Jet001 [13]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question is about matching the column. So, Gino used the various preinstalled application software and system tools for the following purposes.

Disk cleaner: Gino needs to locate unnecessary files that are taking up a considerable amount of space.

Data recovery:  Gino notices many corrupted files and wants to extract good data from them.

Utility diagnostic program: Gino needs to check the operational status of the computer's hardware and software.

Antivirus: Gino's system is acting odd after browsing the internet, and he needs to scan the system.

7 0
3 years ago
Thomas is preparing to implement a new software package that his project team has selected and purchased. Thomas should _____. G
anyanavicka [17]

There are different kinds of software. Thomas should Unlike create an RFI to collect information from the software vendor about their product's implementation.

  • A software package often belongs to several organization and the team or one going to install it in your machine.

A request for information (RFI) is known to be a standard business procedure. It is often used to collate basic information about the experience and skills of software development companies you'd like to work with.

Learn more from

brainly.com/question/15016176

4 0
2 years ago
Other questions:
  • Which of the following actions should you take when turning left at an intersection?
    11·1 answer
  • 20. Which of the following describes an acceptable print resolution?
    10·2 answers
  • Which resource helps a user access a cloud service?
    8·1 answer
  • What are four different commands in Internet Explorer and identify their keyboard shortcuts
    10·1 answer
  • Why is a personal laptop computer NOT a server?
    13·2 answers
  • 7.2 need help plzs 15 points
    13·1 answer
  • What is the significance of the Abstract section of a research paper? A. It contains important information such as the author, c
    5·1 answer
  • Cottonisagoodreflectorofsound​
    6·2 answers
  • Your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?
    15·1 answer
  • You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!