1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Minchanka [31]
3 years ago
9

Write a HTML program as shown in the output.​

Computers and Technology
1 answer:
Vitek1552 [10]3 years ago
3 0

Explanation:

<html>

<title>first term 9/<title>

<head>SUNGHAVA SHIKSHA NIKETANA</head>

<body>

<h1>maths formula</h1>

<h6>a2-b2=(a+b)(A-B)</h6>

<h1>list of exams<\h1>

<h6>1.computer,2.english,3science</h6>

</body>

</html>

You might be interested in
Which technology is predominately used for contactless payment systems?
kompoz [17]
The correct answer for this question is this one: "a. wireless local area network (WLAN)."

<span>The technology that is predominately used for contactless payment systems is called the </span><u>wireless local area network (WLAN)</u><u />. It is even used now a days.
Hope this helps answer your question and have a nice day ahead.
7 0
3 years ago
If your address is 10 B Street, what are the first three bytes in ASCII
STALIN [3.7K]

They are 49, 48, 32

The 32 is important because it is a space.

3 0
3 years ago
Allie needs to add a long row of numbers. She should enter a
ikadub [295]
I believer the answere is a formula hope this helped
8 0
3 years ago
Read 2 more answers
On laptops with a smart card reader installed, where is the smart card reader usually located?
dem82 [27]
Plenty of space in the palm rest
4 0
3 years ago
How can security professionals use software to recover stolen laptops ?
inna [77]

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

3 0
3 years ago
Other questions:
  • The North American Free Trade Agreement (NAFTA) among Canada, Mexico, and the United States is intended to _____.
    5·2 answers
  • When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
    11·2 answers
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    15·1 answer
  • Advantages of purchasing a software package over developing software in-house include all of the following except ____. Group of
    13·1 answer
  • Presses the Schedulr app icon Selects the list item for CSCI 448 Presses the "View Classroom on Map" button While only performin
    11·1 answer
  • In terms of object-oriented programming, after a class is defined,
    11·1 answer
  • You are an IT technician at your company. The company has two small offices in different cities. The company's head office conta
    5·1 answer
  • Which device is responsible for converting the main electric supply into usable voltage levels inside a computer?
    12·2 answers
  • I need 3 sentences on adware.<br> What they do and how they are a risk.
    5·1 answer
  • What is the value of the variable named result after the following code executes?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!