1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
2 years ago
8

Which of the following uses the proper syntax for creating an HTML comment?

Computers and Technology
1 answer:
Harman [31]2 years ago
4 0

Answer:

c

Explanation:

You might be interested in
What changes has Sue made so far? Check all that apply.
Alexus [3.1K]

Answer:

Its C, E, and F

Explanation:

On edg

8 0
3 years ago
Read 2 more answers
When an instance of a class, or object, is specified as a parameter to a method, a reference to the said object is passed to the
OLEGan [10]
Or pointer

VERY similar.
5 0
3 years ago
A huge variety of networking hardware and software appeared. One challenge was to enable these different networks to communicate
madam [21]

Answer:

Internet Protocol (IP)

Explanation:

The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

6 0
3 years ago
Which term describes data that appear to show some type of patterned relationship with a nursing diagnosis?
marusya05 [52]

Answer:

Related factors

Explanation:

Related factors are those factors "that appear to show some type of patterned relationship with a nursing diagnosis". For example, there are some factors that may increase the vulnerability of an unhealthy event in a person or group. These factors may be psychological, physiological, or chemical factors. Hence these factors are considered related factors if they have any relationship with a particular disease or nursing diagnosis.

7 0
3 years ago
"NOTE: write an algorithm, not a code" You are given a file called "std" and composed of "Number, Name, Address" fields. (You ca
Inessa05 [86]

Answer:

1. get the absolute path to the file

2. load the file as a table (dataframe in python)

3. to insert a row;

  • create a dataframe of the same field type
  • concatenate the new dataframe horizontally with the same dataframe

4. to delete a row, select and drop the row where the 'Number' field matches a value.

5. to update the values in row, use the number field as a key to replace the existing values.

6. print of save to a variable the rows where the number field matches a given value.

Explanation:

Follow the report template to create a report for the algorithm.

The algorithm gets the absolute path to the file and loads the file as a tabular file from there the data can be queried without accessing the main file. The insert algorithm creates a new dataframe and appends it to the main dataframe.

The delete, update and retrieve all use the same subalgorithm, getting the rows with the number field as the key value.

5 0
3 years ago
Other questions:
  • The ______ identifies the path for the currently open folder
    8·2 answers
  • What is a “spoof” of an ad ?
    8·2 answers
  • To type the letter address, _________ space from the dateline
    9·2 answers
  • The point at coordinates (2, -18) is in what direction from the origin?
    7·1 answer
  • An individual is first with the network before they are authorized to access resources on the network A. countermeasure B. vulne
    11·1 answer
  • What is data security
    14·1 answer
  • When working in the middle of a presentation, how do you preview the slide show from the current slide?
    12·1 answer
  • When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the twisted-pair cable usestransmiss
    14·1 answer
  • The current standard for RFID is based off of Group of answer choices MIT standards IEEE standards ISO standards there is no agr
    12·1 answer
  • The three main objectives of information security are
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!