To create a multi-column and multi-row box for users to type into in an html form, use the ____________ tag pair

Answers

Answer 1

To create a multi-column and multi-row box for users to type into in an html form, use the <textarea></textarea> tag pair.

The html tags are the codes or the hidden keywords in the web browser to tell about its format and displayed content. The html tags mostly comes in pairs, pair consist of the start tag and end tag.

Related Questions

What is the major function of the network access layer?

Answers

Th network layer is the first layer of the OSI model. It determines the media used (CAT5/6/7/Fibre/Coax). The major function is to communicate with servers and workstations.

Class sizes of various sections of college algebra at your university are an example of which type of data? quiizlet

Answers

Final answer:

Class sizes of various sections of college algebra at your university are an example of quantitative data, specifically discrete quantitative data.

Explanation:

The class sizes of various sections of college algebra at your university are an example of quantitative data. Quantitative data represents numerical values that can be measured or counted.

Specifically, the class sizes can be represented as discrete quantitative data, as the number of students in each section is a whole number value. For example, one section may have 30 students, another section may have 25 students, and so on.

Under the common criteria, which term describes the user-generated specifications for security requirements?

Answers

The correct answer to this question is the:

“Protection Profile (PP)”

According to the ISO/IEC 15408 and the Common Criteria (CC), the Protection Profile (PP) is a document used as a part of the certification process. And since it is a generic form of a Security Target (ST), this makes it a typical creation by a user or a community of users.

What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?

Answers

On the computer there are always issues. For a developer to sit all day in front of a google that always invents things and the flashy images that disrupt everything. Googling on facebook is also an issue. Youtube, everything that contain flashy image is quite disruptive. If you think about content, maybe googling is less inventive. In a way it's nicer to buy applications but if you finally think of building it, there are always nicer ways of spending time. I prefer to go to seaside when I can.
Final answer:

The development of open source operating systems like Linux disrupted traditional economic models in the high-tech industry by fostering collaboration, reducing software costs, and lowering the barrier to entry for tech startups.

Explanation:

The advent of open source operating systems like Linux had a significant impact on the economics of high-tech industry. Unlike the proprietary software models of the past where companies like IBM and Microsoft dominated the market with their operating systems, open source presented a dramatically different economic model. The open source ethos encouraged collaboration, sharing, and modification, leading to heightened innovation and sharply reducing costs for both users and developers.

Previously, operating systems like UNIX began as more open but became heavily commercialized, leading to costly proprietary versions tied to specific hardware, such as IBM's AIX or Sun Microsystems' Solaris. This changed with Linux, initiated by Linus Torvalds, predicated on the idea that software should be freely available to anyone to use, modify, and distribute.

The rise of Linux and other open source software disrupted the traditional economic models, making it less necessary for companies to allocate substantial budgets to purchase software licenses. Developers could now build upon existing open-source platforms without worrying about licensing fees, reducing the barrier to entry for tech startups and encouraging a more inclusive and decentralized tech landscape.

________ data becomes part of your destination file and remains static even if the source data changes.
A. Embedded
B. Field
C. Integrated
D. Linked

Answers

The correct option is A that  is Embedded data.
Embedded data becomes part of your destination file and remains static even if the source data changes.
When you embedded an object, it becomes the part of destination document. when you embedded an excel worksheet in to word document, if you make changes to the excel worksheet it did not make any changes to the destination document. so when you edit the excel worksheet from the word document, you will use the editing features of excel.
It means if you embedded an excel worksheet into word document, excel worksheet remains excel worksheet.

The domain is an email message tell you the

Answers

The domain is an email message tell you the destination's location.

The domain is the part of the email following the "@" symbol. For example, if the email is "example@xxx.com", then the domain is "xxx.com"
This part is usually telling you to where you are sending your email.

What is significant about the contents of the destination address field?

Answers

The destination address field has a format similar to : ff:ff:ff:ff:ff:ff
What signifies the destination address and gives it a privilege over the source address is that it can either be a broadcast containing all ones or a unicast while the source address can only be a unicast.

Emily wants to purchase a tablet device. she is unsure about what hardware and apps she will need. as a result, she has begun asking for advice from her friends and relatives. in addition, she has talked to several salespeople at apple and best buy and has looked at some websites, such as hp and dell. emily is engaging in

Answers

Please make your question clear

On your computer desktop, you can see all sorts of different files, each immediately accessible. because you are actively working on them, and because you can open them whenever you want, these files are in fact very similar to the kind of information held in:

Answers

On your computer desktop, you can see all sorts of different files, each immediately accessible. because you are actively working on them, and because you can open them whenever you want, these files are in fact very similar to the kind of information held in working memory.

Answer:

Working memory

Explanation:

On a computer, Random Access Memory (RAM) is used as the working memory. It has the ability to store data for a short period of time and it is referred to as volatile because all data will be lost when your computer is shutdown or goes off abruptly. it has the capacity to store input data, programs, intermediate results and other forms of information.

A ________ is a device connected to a network such as a printer or a game console.

Answers

A printer or a game console is not a network. They themselves are connected to the network.

What should you do if your temperature gauge moves up to just below the red zone?

Answers

If the temperature gauge moves up to just below the red zone,you should turn off your air conditioner and turn on your vehicle's heater. Then immediately find a mechanic or pull over safely and contact a road service.




Pull over when safe.
Turn off the car.
Let the car sit and cool off a fair amount.
Open the hood.
Use a rag or gloves to protect your hands from the heat.
Slowly very slowly with the gloves on after you have let the vehicle cool down a bit.
Open the radiator check if you have coolant in it.
If you don't you will need to refill it with the same coolant you use last time.
If you can't get coolant you can use water to get your car to a shop or home.
Using water can freeze when the temperature gets to low in winter
When water freezes it expands and will crack parts and can cause a lot of damage.
When you get your car to the shop or home flush out the radiator and fill it up with new coolant or antifreeze
Coolant or antifreeze sometimes come as a concentrate so you may mix it with water some you don't mix read the directions before you start.

Desktop publishing design tools are represented by A. icons. B. windows. C. trackballs. D. modems.

Answers

The best answer is A
Windows are the screens you can maximize and minimize.
Trackballs make the mouse move.
Modems are associated with internet connection.
Those three answers are unrelated leaving icons to be the most reasonable.

How many wires does a PCIe connection use for sending and receiving data?
=T

Answers

A PCIe connection uses one wire for sending and receiving. Each of the pairs of wires between a PCIe controller and a device is called lane PCI Express, in fact Peripheral Component Interconnect Express yet regularly observed abridged asPCIe or PCI-E, is a standard sort of association for inside gadgets in a PC.

Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?

Answers

Answer: An evil twin attack poses as a legitimate AP.

Unordered lists are often identified by graphic images known as

Answers

Bullets, little black circles.

Prior to the development of e-commerce, web sites primarily delivered static html pages. true

Answers

Prior to the development of e-commerce, web sites primarily delivered static HTML pages. true

What name is given to random characters that you can combine with an actual input key to create the encryption key?

Answers

Salt value is the name given to random characters that you can combine with an actual input key to create the encryption key. Salt is a random string of data used to modify a password hash. When you add salt to a password hash the attacker is prevented form testing known dictionary words across the entire system. The longer tha salt value the better the protection.

A(n) ________ is a light-sensitive material used to make a chip.

Answers

The photoresist is a light-sensitive material used to make a chip. Photoresists can likewise be uncovered by electron shafts, creating an indistinguishable outcomes from introduction by light. The primary distinction is that while photons are consumed, storing all their vitality without a moment's delay, electrons store their vitality bit by bit, and scramble inside the photoresist amid this procedure.

Digital still cameras most often use ____ cards for storage.

Answers

Digital still cameras most often use flash memory cards for storage.

By default, server manager does not connect with down-level servers (for example, windows server 2008). what must be done to properly connect?

Answers

Add WinRM 3.0 support by installing the necessary updates and hotfix.

_______ is the command for opening a spreadsheet object in a separate spreadsheet window. A. Edit > Edit Data B. Worksheet > Edit C. Table > Excel Spreadsheet D. Worksheet Object > Open

Answers

I believe the correct answer would be option D. Worksheet Object > Open is the command for opening a spreadsheet object in a separate spreadsheet window. In Microsoft excel, you can simultaneously open two worksheets so you can observe them both. 

Answer:

The correct option to the following question is D.) Worksheet Object > Open.

Explanation:

On a Ribbon Home tab, you click the File and Select Click the Selection Pane Selection pane will open, there is the list of all objects on a worksheet. Click on the object names, and then it will selected on a worksheet.

Here’s one about technology. IBM developed the first chess playing computer which won both a chess game and a chess match against reigning world champion at the time Garry Kasparov. Do you know what they called this smart robot?

Answers

The first chess playing computer which won both a chess game and a chess match against reigning world champion  at the Garry Kasparov was the smart robot, called Deep Blue.
Deep Blue was computer developed by IBM and it was evolved in 1989. It was the fastest computer on the championship. It was capable of evaluating 200 million positions per second.

The basic technological foundations of the internet?

Answers

The internet is different from the world wide web, currently you are using the world wide web  (WWW) the internet is what connects you to the WWW and allows you to use it. The internet was created thanks to the concept of e-mail and other forms of e communication. The idea that information could be transferred wirelessly began the idea of a centralized communication network (basically the internets dad). Originally the internet wasn't designed to host websites or domains, it was designed for communication and data transfer. Over time this morphed into GUI's (graphic user interface) in order to simplify the process (and to make it look nicer).  

The internet's growth relied on key technological developments like TCP/IP, the World Wide Web, and the Mosaic browser. These innovations made the Internet accessible and user-friendly, leading to its widespread use.


DARPA's packet-switching and advancements in digital infrastructure were also crucial.

The Internet, a network of networks, has its roots in several key technological developments that significantly contributed to its spread, known as the "democratization" of the Internet. This began with the creation of the protocol TCP/IP by Vinton Cerf and Bob Kahn in 1974, which allowed diverse computer networks to communicate.

In 1983, the Internet, initially a network for research centres and universities, began to expand. The first major boost came in 1990 with Tim Berners-Lee's invention of the World Wide Web, which made it easier to access and share information.

The second significant boost was in 1993 with the release of the first browser, Mosaic, which made navigating the web user-friendly and visually engaging, contributing to the rapid spread of internet usage from 1994 onwards.

Other critical developments included DARPA’s research on packet-switching technology in 1973, which enabled reliable data transmission over distributed networks, and the creation of digital infrastructures like microprocessors and fibre-optic cables around 1990. These breakthroughs made the efficient transfer of digital information across vast distances possible.

Many of today’s microprocessors perform ____, in which multiple instructions are executed at the same time

Answers

Answer: multiprocessing

What lenses cannot be changed to focus on items closer or farther away?

Answers

fixed zoom lenses cant

Answer:

Fixed focus lenses

Explanation:

What lenses cannot be changed to focus on items closer or farther away?

Zoom lenses

Autofocus lenses

Fixed focus lenses

Stationary lenses

Fixed focus lenses are lenses for taking pictures that are used in cameras, that have a fixed focus, meaning that the focus on the image will be always located in the same spot and al of the other areas will look blurry to the sight, they can not change the focus to objects closer or further away, if you wich to focus something that is closer to the camera you need to back up witht eh camera and find the spot where the lens focuses on the object, so that would be the answer.

You downloaded a file using internet explorer. unfortunately, you closed ie and you don’t remember where you downloaded the file to. how can you find the file?

Answers

Hit Ctrl+J and the file should be there on the top of the list

The transport layer protocol used by the tcp / ip suite that does not provide guarantees on ordering or confirmation of receipt of packets is called

Answers

UDP = connectionless vs. TCP is connection oriented.

Describe a modification of dijkstra's algorithm that runs as fast as the original algorithm, and assigns a label usp[u] to every vertex u in g

Answers

the words brave and courageous are example of

"list at least 3 key performance indicators that should be considered prior to initiating a cloud deployment."

Answers

You should fully understand the cloud and its various offerings in order to properly integrate it within the business. Some of the Key Performers Indicators that should be considered are:
1. Measure your customer growth
If the customer growth is declining, then something needs to be done. 
2.Take a hard look at your renewal rate
3.Calculate your average revenue per user (ARPU)

Look at the simple circuit illustrated in the figure above. What will happen when only switch S1 is closed?

A. No current will flow in the circuit.
B. Nothing will happen; the light bulb won't light up.
C. The light bulb will light up.
D. The resistance of the circuit will increase.

Answers

If only S1 is closed, due to the diode across S3 is pointing to the right, the current cannot be flowing to the left.

So nothing will happen, the bulb is not on.

Answer: A. No current will flow in the circuit.

Explanation:

The Figure 1 illustrates the equivalent circuit at only switch S1 closed. That is a series circuit with two diodes, a bulb, and a battery.

Suppose that there is a current flowing in the circuit. A current flowing in the circuit implies that D1 is on. If D1 is on, there should be 0.7 V between anode and cathode (see Figure 2 left). However, there is not possible a low voltage on the top and a high voltage at the bottom of D1 (see Figure 2 right). Then, it is not viable 0.7 V between anode and cathode of diode D1. Therefore, D1 is off.

Now, we already know that this is a series circuit with the diode D1 off, so we can conclude that no current will flow in the circuit.

Correct answer is A. No current will flow in the circuit.

There isn't current flowing in the circuit next the light bulb won't light up. But other things happen, for example, the high voltage goes to the light bulb at only switch S1 closed. we can say that option B. is partially wrong and options C. is wrong

Finally, there are no resistances in the circuit. So, option D. is not right

Other Questions
An angle whose vertex is at the center of a circle is a middle angle of that circle. A. True B. False The ages of Edna,Ellie,and Elsa are consecutive integers. The sum of their ages is 120. What are their ages? A ship traveled for4hours heading east and for3hours heading north. If the total distance traveled was149miles, and the ship traveled3miles per hour faster heading north, at what speed was the ship traveling east? Factor x2a2 + 3xa2 + 2a2 On a hot summer day a young girl swings on a rope above the local swimming hole. when she lets go of the rope her initial velocity is 2.25 m/s at an angle of 35.0 above the horizontal. if she is in flight for 1.10 s, how high above the water was she when she let go of the rope? . From left to right across a period in the periodic table, elements become less ___________ and more ______________ in their properties. 26. Francium has 36 isotopes, but only francium-223 occurs in nature. Francium-223 spontaneously emits particles and energy, so francium-223 is a(an) _____________ of francium. 27. At sea level, water ______________ at 100C. 28. Cooking requires continuous addition of energy to the chemical reactions that are taking place. The chemical reactions involved in cooking can be described as __________________. Based on its location on the periodic table, which element would be most likely to form a negative ion? A.Aluminum (Al) B.Copper (Cu) C.Sodium (Na) D.Fluorine (F) When a school bus is stopped on the roadway, you must always stop when you see the bus ahead on the roadway the bus and your vehicle are at a traffic light the bus is on the other side of the road that is separated by a five-foot-wide median the bus is on your side of the road with lights flashing and stop sign showing By default, server manager does not connect with down-level servers (for example, windows server 2008). what must be done to properly connect? Who are the men of goodwill that gladden describes What vegetable is carved and judged at a festival in oaxaca? Name three STIs that can be life threatening or lead to life-threatening illnesses Find the cost of twelve $1,000 bonds at a quotation of 84.50. Malik solved this system of equations.2x+4y=245x+y=15As the first step, he decided to solve forxin the first equation because it has a small, even number for the coefficient. Jill told him there was a more efficient way. What reason can Jill give for her statement?A.The variableyin the second equation has a coefficient of one so there will be fewer steps to the solution.B. The variablexin the second equation has a coefficient of 5 so it will be easy to divide 15 by 5.C. The variableyin the first equation is divisible by 2 so it will be the most efficient way to start.D. The variableyin the first equation has a larger even number. When dividing by 4, the solution will be a smaller number. what are the 3 factors that lead to the rise of feudalism in Japan? Buckette co. owned 60% of shuvelle corp. and 40% of tayle corp., and shuvelle owned 35% of tayle. what is this pattern of ownership called? Indicate what develops when abnormal cells divide and create other abnormal cells: Helppppp! Which answer choice correctly describes the relationship between two of the lines in the figure? A scientist carries out an experiment how could she help other scientists judge the validity of her results The length of a rectangle is twice its width. if the perimeter of the rectangle is 36 cm , find its area. Steam Workshop Downloader