1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mario62 [17]
2 years ago
9

The main reason for using a comment in your HTML code is to

Computers and Technology
1 answer:
zvonat [6]2 years ago
8 0

Answer:

D, document and explain parts of code

Explanation:

Mark me brainliest :)

You might be interested in
To color the h2 heading, what tag would you use?
GREYUIT [131]

If you want to use inline css, you'd use the 'style' attribute (not a tag).

<h2 style="color:red;">My heading</h2>


The fact that your question suggests that there is a tag to accomplish this, is confusing.

3 0
3 years ago
How do you interpret field in contest of a DBMS?
son4ous [18]
A Field is interpreted as table in DBMS.  Field is the smallest data element in a table, such as first name, last name, address, or phone number.  A database table can be thought of as consisting of rows and columns or fields.  <span>Each table has a set of fields, which define the nature of the data stored in the table.</span>
8 0
3 years ago
QUESTIONS Which of the following use cases are suitable for compute-optimized cloud offering? ОА. None of the listed O B. Highly
Ede4ka [16]

Answer:

E. All of the listed ​

Explanation:

For compute-optimized cloud offerings like AWS, suitable use cases are - gaming, distributed analytics, and scientific modeling. Since all these are suitable, the correct answer is E.

4 0
3 years ago
3.6 Code Practice on Edhesive
Alchen [17]

I've included my code in the picture below. Best of luck.

6 0
2 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
2 years ago
Other questions:
  • Barr the Bear has started a business to sell fish to Poe and his fellow penguins. The penguin customers submit many fish orders,
    12·1 answer
  • What is the accounting equation?
    12·1 answer
  • Which tab provide text formatting features
    11·1 answer
  • This program will get you used to retrieving a value from a function. The function should be named getRandomNumber. The function
    15·1 answer
  • Which of the following is *not* true about logging user and program actions on a computer?
    10·1 answer
  • Write a program that asks the user for two file names. The first file will be opened for input and the second file will be opene
    8·1 answer
  • What is a Software that interprets commands drom the keyboard and mouse
    13·1 answer
  • 8.2 Code Practice Edhesive
    6·1 answer
  • The RAND() function in Excel returns a pseudo-random number between 0 and 1. If you enter this function into 1000 cells (i.e. en
    5·1 answer
  • Which are examples of basic text structures? Check all that apply.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!