1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetlana [45]
3 years ago
14

Helpppp You can see the output if your html result using any web browser ? True or False

Computers and Technology
1 answer:
julia-pushkina [17]3 years ago
4 0
True, html code can be seen using any web browser. All web browsers support the most renown and definitely mostly used website designer code language. From chrome to Firefox to safari, you will have no problems checking out your code.
You might be interested in
Samantha is looking for a lens that is lightweight and small, making it easy to transport. She doesn’t care about the lens being
irina1246 [14]

Answer:

The correct option is;

d. Prime

Explanation:

A prime lens is a unifocal, or fixed-focal-length lens and it is referred to as the opposite of a zoom lens

The maximum aperture of ranges from f2.8 to f1.2, which are fast and have a creamy rendering of light that are out of focus, and also provide crispy image details, by making the most use of the light available and provide distinct combination of foreground and background images in pictures that give a crisp and visually pleasing appearance.

7 0
3 years ago
Read 2 more answers
Why do companies implement new technology?Select all that apply.
Wittaler [7]
All of them are correct except the last one
6 0
3 years ago
Int side1;
o-na [289]

Answer:

int width_A, width_B, len_A, len_B;

float rw, rl;

rw = (float)(width_A/width_B);

rl = (float)(len_A/len_B);

if(rw == rl)

printf("They are similar");

else

printf("They are not similar");

Explanation:

The width of the first triangle i call width_A.

The width of the second triangle i call width_B.

The length of the first triangle i call len_A.

The length of the second triangle i call len_B.

The ratio of the width i call rw.

The ratio of the length i call rl.

If rw=rl, the retangles are similar. Otherwise, they are not.

The code is:

int width_A, width_B, len_A, len_B;

float rw, rl;

rw = (float)(width_A/width_B);

rl = (float)(len_A/len_B);

if(rw == rl)

printf("They are similar");

else

printf("They are not similar");

8 0
3 years ago
In the scene where we see Don and Lina acting in a silent film (beginning at time code 11:05), describe the silent film. How is
asambeis [7]
Well, it was black and white…and it was silent. That's a lot different from today because we have surround sound, color TV, 3D/4D etc.

(I wish there was more to go on, but from time code 11:05 it only lasted for a few seconds. Hope this helps!)

4 0
4 years ago
Samuel received an email that looked like it came from his bank. The email told him to click a link that opened an official look
GalinKa [24]

Answer:

The answer is "Option b".

Explanation:

Phishing is used by hackers to get sensitive data. It is a software tool, that offers online mail to use we can track the users. It also known as a state, in  which clients will have to re-enter id and pass codes to validate themselves due to some changes to the system, and incorrect option can be defined as follows:

  • In option a, It is used to attack on user system.
  • In option c, It is used to provides unauthorized access.
  • In option d, It is also known as malware, which is installed in user smartphones.

8 0
3 years ago
Other questions:
  • The proof that the Clique problem is NP-complete depends on a construction given in Theorem 34.11 (p. 1087), which reduces 3SAT
    11·1 answer
  • How do you implement instruction level parallelism
    11·1 answer
  • Which of the following is a true statement about the countries highlighted on the map?
    10·2 answers
  • Which of the following application architecture do you suggest as the best option for email for an organization? Consider small,
    5·1 answer
  • Describe the difference between a myth and a fable.
    12·1 answer
  • Tables should be used when (a) the reader need not refer to specific numerical values. (b) the reader need not make precise comp
    14·1 answer
  • What are examples of object types that can be viewed in the Navigation pane? Check all that :
    13·1 answer
  • Select the correct answer.
    6·1 answer
  • Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's man
    10·1 answer
  • The words, the computer is the future, has how many bits?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!