answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
2 years ago
12

Clara writes online articles based on world religions. Her articles have references to dates. Which HTML element will help her d

isplay dates (A.D.or B.C.) correctly on a web page?
A
B.
C.
D.
Computers and Technology
1 answer:
brilliants [131]2 years ago
3 0

Answer:

Available Options are :

A <b>

B <l>

C <body>

D <small>

Ans : A <b>

Explanation:

Normally AD and BC are written in bold letters.

for example : The terms anno Domini (AD) and before Christ (BC).

Within available option the best option to choose is <b>

The <body> element used to define the document body.

The <small> tag used to defines smaller text

But, the best option to choose is in case if they are using the HTML5  then html <time> element will be used to display BC date and AD dates.

for ex : <time datetime="-314-07-01"

calendar="Ancient Roman">1 July 314 BC</time>

You might be interested in
What output is produced by the following program segment? Why? (Recall that name.charAt(i) is the i-th character in the string,
vekshin1

Answer:

The output is:

R

M

N

Explanation:

The code snippet print the beginning letter of each word in the given name.

In the for loop snippet:

first the program check if startWord is true and it is true, then it print the value of the character at index 0. Then it check if value of character is empty. If it is empty, startWord is initialized to true else it is initialized to false.

The loop only print a character when the value of i are 0, 8 and 11 which are also the beginning character of a word.

8 0
2 years ago
The computer component that makes sure that instructions are decoded and executed properly is the ___________.
Shalnov [3]

Answer:

The Central Processing Unit

Explanation:

The Central Processing Unit is the brains of the computer where most calculations take place. A central processing unit (CPU), also called a central processor or main processor is the electronic circuitry within a computer that executes instructions that make up a computer program. The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions.

8 0
2 years ago
Read 2 more answers
A _______ bulb contains a high-pressure gas. Oils from the hands can affect the expansion of the glass, which can shorten the li
shusha [124]

Answer:

I'd go with the 2nd one

If it heats up more & more, then it's lifespan will be shortened more & more.  The more it heats up, the less durability it has.

6 0
2 years ago
Which of the following would be a considered a want rather than a need for most people?
UNO [17]

c. would be the best answer.


3 0
2 years ago
Consider a DHT with a mesh overlay topology (that is, every peer tracks all peers in the system). What are the advantages and di
Vladimir79 [104]

Answer:

Advantages of DHT with mesh overlay topology

  • A single hop is used to route a message to the peer, the nearest key is used route message between points
  • There are  bi-directional links between each pair of peers other than the broadcasting peer therefore creating a multiple delivery paths from source to other peers

Disadvantages of DHT with mesh overlay topology

  • complexity of the design of a Mesh overlay Topology
  • Consuming process ( tracking of all peers by each peer )

Advantages of circular DHT ( with no shortcuts )

  • less consuming process ( each peer tracks only two peers )

Disadvantages of Circular DHT ( with no short cuts )

  • The number of messages sent per query is minimized
  • 0(N) hopes are required to route message to a peer responsible for the key  

Explanation:

Advantages of DHT with mesh overlay topology

  • A single hop is used to route a message to the peer, the nearest key is used route message between points
  • There are  bi-directional links between each pair of peers other than the broadcasting peer therefore creating a multiple delivery paths from source to other peers

Disadvantages of DHT with mesh overlay topology

  • complexity of the design of a Mesh overlay Topology
  • Consuming process ( tracking of all peers by each peer )

Advantages of circular DHT ( with no shortcuts )

  • less consuming process ( each peer tracks only two peers )

Disadvantages of Circular DHT ( with no short cuts )

  • The number of messages sent per query is minimized
  • 0(N) hopes are required to route message to a peer responsible for the key  

Distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. in the DHT key-value are stored in it

6 0
2 years ago
Other questions:
  • Jim has excellent oral and written communication skills. He enjoys public speaking and wants a job in which he will interact wit
    14·2 answers
  • The _______________ domain refers to any endpoint device used by end users, which includes but is not limited to mean any smart
    14·1 answer
  • c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
    5·1 answer
  • QUESTION 2 of 10: New shoes are on SALE. You find a pair you like for $85 dollars. But you only have $45 with you. So, you pay $
    13·1 answer
  • The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. I
    5·1 answer
  • Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key sh
    10·1 answer
  • A spreadsheet keeps track of student scores on all the exams in a course. Each row of the spreadsheet corresponds to one student
    14·1 answer
  • We have an internal webserver, used only for testing purposes, at IP address 5.6.7.8 on our internal corporate network. The pack
    15·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • Draw a flowchart and write the algorithm to find even number between 1 to 50​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!