1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
3 years ago
15

Anchor hyperlink to position the cursor to the section called sisters? i need a code pls

Computers and Technology
1 answer:
enot [183]3 years ago
7 0

use an anchor tag(<a>This is an anchor tag</a>) and use the href attribute and set it's destination to the section element who's id or class is "sisters".



Example:

<a href="#Sisters">Click Here!</a>

then you can add this somewhere on the document.

<section id="Sisters">Hello World!</section>

You might be interested in
Nilsu is attempting to train a new administrative assistant on using a word processing program. Since the program is fairly comp
tatiyna

Answer:

teach the assistant bits and pieces of the program.

Explanation:

Given that the program is fairly complex and has many independent components, the most ideal way Nilsu should train a new administrative assistant on using a word processing program is by "teaching the assistant bits and pieces of the program."

This will make the administrative assistant understand and operate the program at a gradual pace without anhthing looking confusing.

5 0
3 years ago
Using the _______ list, you can select the number of photos that will appear on each slide.
Pavlova-9 [17]
I think the answer is c
5 0
4 years ago
Ask the user for five-coordinate pairs. Store each pair as a tuple, and store all the pairs in a list. Print the slope between a
Margaret [11]

Answer:

y=(1/2) x+3

Explanation:

8 0
3 years ago
Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victor
tangare [24]

Answer:

The question is incomplete and should read as follows:

Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore. What does Victoria need to do to run the antivirus software on System Restore?

This issue can be fixed by taking the following steps:

A. Disable System Protection.

B. Back up the restore point.

C. Enable System Protection.

D. Run the antivirus software on a restore point.

The system is then restored to the now clean restore point to rid the computer completely of the virus.

Explanation:

3 0
3 years ago
Read 2 more answers
IN YOUR OWN WORDS, create a new thread and compare and contrast paraphrasing, summarizing, and quoting and how to do each succes
choli [55]

Answer:

Such three ways to include the work of other writers in your own writing differ depending on whether you are close to the source.

Explanation:

Quotations must be the same as the original, using a narrow source segment. We must be word for word on the source document and the original author must be credited.

Paraphrasing means putting your own words into a line from the source material. The original source should also be assigned a paraphrase. Paraphrased material usually is shorter than the original one, which takes and slightly condenses a somewhat broader part of the source.

In summary, you have to put the main idea(s), including only the main point(s), in your own words. Again, summarized ideas must be attributed to the source. Summaries are much shorter than the original and give a broad overview of the source documents.

8 0
4 years ago
Other questions:
  • Melinda completed the Computer Programming Aptitude Test when she applied for a position with Beta Electronics. Six months later
    12·1 answer
  • A ________ is a set of rules that governs data communication.
    14·1 answer
  • From the ages of 18 to 24, individuals born from 1980 to 1984 held an average of 6.2 jobs—which is slightly higher than the numb
    10·1 answer
  • The rules that determine what is allowed in a program are known as the
    14·1 answer
  • Informatyka klasa 7 daje naj
    10·1 answer
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • Which of the following in not part of the CIA triad that is one of the cornerstones of information security? a. Confidentiality
    14·1 answer
  • The current standard for RFID is based off of Group of answer choices MIT standards IEEE standards ISO standards there is no agr
    12·1 answer
  • Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users im
    8·1 answer
  • Answer first get branlest
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!