answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leno4ka [110]
2 years ago
8

Which question should the user ask when determining whether a closing tag is needed

Computers and Technology
1 answer:
oksian1 [2.3K]2 years ago
6 0

Answer:

What is element definition in the HTML specification?

Explanation:

The question a user should ask when determining whether a closing tag is needed is "What is element definition in the HTML specification?"

This is because the specification of an element determines how the elements can be used in HTML in accordance with the rules such as distinguishing which elements can have a closing tag.

Hence, in this case, the correct answer is "What is element definition in the HTML specification?"

You might be interested in
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was runn
Umnica [9.8K]

Answer:

Patch finders.

Explanation:

Once Russ accessed a webpage on his computer, he had seen an issue that the page was not associated with the browser variant on which he was executing it, although it was important to use patch finders tool to fix the following problems because patch finder is only the software that can resolve the following issues.

3 0
2 years ago
In a Diffie-Hellman Key Exchange, Alice and Bob have chosen prime value q = 19 and primitive root a = 10. If Alice's secret key
34kurt

Answer:

a) 6

b) 11

c) 11

Explanation:

Given

Prime value q =n= 19

primitive root (a) =10

Alice secret key = 4

Bob secret key = 6

a) The value Alice Sends to Bob

a​​​​​Private key of Alice mod n

= 10^4 mod 19

= 10000 mod 19

=6

b)The value Bob sends to Alice

a​​​​​Private key of Bob mod n

= a​​​​​​3​​​​​ mod n

= 10^6 mod 19

=1000000 mod 19

= 11

c)

Both the parties calculate the value of secret key at their respective side.

secret key obtained by Alice

= 11

secret key obtained by Bob

= 11

Finally, both the parties obtain the same value of secret key.

The value of common secret key = 17

6 0
2 years ago
Write the printitem() method for the base class. sample output for below program: last name: smith first and last name: bill jon
ella [17]
The question involves basic polymorphism. The following is the partial flow of the program.

baseItemPtr = new BaseItem();
baseItemPtr.setLastName("Smith");

derivedItemPtr = new DerivedItem();
derivedItemPtr.setLastName("Jones");
derivedItemPtr.setFirstName("Bill");

itemList.add(baseItemPtr);
itemList.add(derivedItemPtr);

for (i = 0; i < itemList.size(); ++i) {
itemList.get(i).printItem();
}

return;
7 0
2 years ago
Read 2 more answers
Which two factors most influenced the growth of the Internet during the 1970s?
eduard

Answer:

The answer is "increase in the power of public universities and increased appreciation for a liberal arts education". DARPA and Russia had nothing to do with this. Yes, the computer hardware improvement led to a growth, but National Science Foundation funding in 1981, and hence this is also not an option. And electrical power supply had nothing to do with this. Hence, the above answer. as the concept of the internet is based on liberal arts of education, to impart practical and intellectual skillsets, and hence to grow the social responsibility among the citizens of the whole world. Also, the power of public universities had a big role to play definitely, and this was confirmed from Pentagon as well then when the question was raised, is this due to the risk of a nuclear attack.

Many people think that the main reason was the nuclear attack threat, but that was not an issue definitely. Actually this was the time of liberalization, and the power of the public universities was increased. Hence, they got the chance to share the information of various sorts with the people, and in the process internet started expanding.

Explanation:

The answer is self explanatory.

8 0
2 years ago
Read 2 more answers
Edhesive 6.5 code practice question 4
Jlenok [28]

This question is incomplete. The complete question is given below:

Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values.

Sample Run

Enter Temperature: 27.6

Enter Temperature: 29.5

Enter Temperature: 35

Enter Temperature: 45.5

Enter Temperature: 54

Enter Temperature: 64.4

Enter Temperature: 69

Enter Temperature: 68

Enter Temperature: 61.3

Enter Temperature: 50

Sum = 504.3

Answer:

# Program in Python

sum = 0.0

for i in range(0, 10):

t = float( input("Enter the Temperature: "))

sum = sum + t

print("Sum: {0:0.1f}".format(sum))

Explanation:

  • Initialize the sum variable to hold the sum of input temperatures .
  • Iterate from 0 to 9, Get the input and compute the sum .
  • Print the result  by formatting the sum so that value is printed with precision to single decimal place .
4 0
2 years ago
Read 2 more answers
Other questions:
  • Suppose that you have declared a numeric array named numbers, and two of its elements are numbers[1] and numbers[5]. you know th
    5·1 answer
  • Zander is beginning to take college courses to prepare for a career in computer science, which is the study of using logic to cr
    5·1 answer
  • The ________ method is based on simple arithmetic. The process involves dividing the bits of a frame into equal segments, adding
    11·1 answer
  • Which are methods used to improve reading fluency? Check all that apply. Practicing with a weak reader listening to a fluent rea
    5·2 answers
  • Give the logical function for the following: If cell B7 equals 12, check contents of cell B10. If cell B10 is 10, then the value
    12·1 answer
  • Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is bein
    9·1 answer
  • Which of the following methods could be considered a "best practice" in terms of informing respondents how their answers to an o
    7·1 answer
  • If byte stuffing is used to transmit Data, what is the byte sequence of the frame (including framing characters)? Format answer
    6·1 answer
  • Do Exercise 6.4 from your textbook using recursion and the is_divisible function from Section 6.4. Your program may assume that
    6·1 answer
  • On the planet Sigma, robots excavate chunks of a very precious cristaline. These chunks can be divided into smaller part only on
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!