Write a HTML code for displaying the following​

i need an answer urgently

Write A HTML Code For Displaying The Followingi Need An Answer Urgently

Answers

Answer 1

Answer:

Following are the code to the given question:

Explanation:

<html>

<body>

<p align="center" >VOCATIONAL SUBJECT</p>

<table align="center" border="2">

 <tr>

   <td rowspan="2">YEAR</td>

   <td colspan="5">Vocational course</td>

 </tr>

<tr>

   <td rowspan="1">IT</td>

   <td rowspan="1">CS</td>

   <td rowspan="1">EL</td>

</tr>

    <tr>

   <td colspan="1">2016</td>

   <td colspan="1">66</td>

   <td colspan="1">68</td>

   <td colspan="1">60</td>

 </tr>

 <tr>

   <td colspan="1">2017</td>

   <td colspan="1">77</td>

   <td colspan="1">78</td>

   <td colspan="1">80</td>

 </tr>  

 <tr>

   <td colspan="1">2018</td>

   <td colspan="1">60</td>

   <td colspan="1">67</td>

   <td colspan="1">70</td>

   </tr>

</table>

</body>

</html>

Write A HTML Code For Displaying The Followingi Need An Answer Urgently

Related Questions

que significa DESFRAGMENTAR EL DISCO DURO?????

Answers

Answer:

DESFRAGMENTAR

Explanation:

es el proceso de reorganizar los datos almacenados en el disco duro para que los datos relacionados se vuelvan a juntar, todos alineados de manera continua.

All of the following items may be sent via email EXCEPT *
1 point
soft copy attachments
hard copy attachments
web links
web pages

Answers

Answer:

hard copy attachments

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.

However, hard copy attachments cannot be sent via email because they're physical documents and as such requires that they be delivered physically to the recipient.

In conclusion, you can only send soft copy documents that you cannot feel or touch with your hands over the internet and via email. Thus, an email is only designed to accept soft copy documents or files (attachments) but certainly not hard copy documents (attachments) in our technological era.

It's usually easier to change the design of a photo album slide show A.after you've created the presentation. B.before you've created the presentation. C.before you've planned out the presentation. D.after you've planned out the presentation but before creating it.

Answers

Answer:

A. after you've created the presentation.

Explanation:

A power point presentation is defined as a presentation program where one can create any presentation or design any layout like the photo album slide show to present it to others.

Once the album is created in the PowerPoint, it can be changed by going to the slide show and editing the content of the photo album of the slide show. Thus it is easier to make any changes in the design of the photo album slide show after the presentation have been created.

What is a header row?

O the title of a document when it is centered

O the top row of a table that shows titles for the cells below

O the bottom row in a table that shows sums of numbers in cells

O the hidden space at the top of each page

Please help ASAP taking unit test

Answers

Answer:

b. the top row of a table that shows titles for the cells below

Explanation:

A header row is the first row of a given table that shows titles of the cells below it. In many cases, the header row has different styles from the other rows in the table. A header row can be found in, among others, both Microsoft's Excel and Word applications.

In the attached figure, the first row with a darker shade of background color is the header row for the table.

How do you reset a g.mail password?

Answers

Answer:

put: forgot password to reset it

Answer:

Change your pass word

Open your Go ogle Account. You might need to sign in.

Under "Security," select Signing in to G oo gle.

Choose Password. You might need to sign in again.

Enter your new password, then select Change Password.

Describe how serial data access finds data

Answers

Answer:

Serial data access will go through all the data by order until the target data is reached

Explanation:

This is opposite of direct data access which immediately finds the desired

data

Answer:

Serial access works by accessing the data at the beginning and then working through it bit-by-bit until the end.

...

Examples of storage medium that use serial access are:

Video cassettes.

Music cassettes.

Backup tape cartridges(hold lots of tape for backing up large amounts of data)

Select the correct answer.

Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?

A. A to F

B. A to H

C. A to M

D. A to J

Answers

Answer is  Hexadecimal  :     A.   A to F

>What is the output of the following code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )

Answers

Answer:

Given code output is "786".

Explanation:

Code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter

print (list1[1] )#use a print method that prints list index value

In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.

Your company resides in an area with rapid growth in both the corporate and residential areas surrounding your office. As such, your company has been experiencing several brownouts due to power grid problems (too much demand and not enough electricity). Fearing that your computers (especially the servers) could be damaged by these brownouts, your manager has asked you to find a solution to this problem.
Which of the following would be the BEST device to recommend to your manager for computer protection?
A. Surge suppressor
B. Power strips
C. UPS
D. Wall Outlet

Answers

Answer:

The correct answer is option C (UPS).

Explanation:

Since brownouts are reduced voltages that might not be good enough for the required electricity capacity for your company, fearing that your computers (especially the servers) could be damaged, it is best to use UPS for your computer protection.

A UPS also called (Uninterruptable Power Supply) can function as a Surge suppressor when the voltages entering your company might be higher than normal, it can also function too in protecting your computers (especially the servers) in the case of a brownout when voltage required by your computers dropped below the required level. In the case of a brownout, the  UPS supplies energy stored in its batteries to make the computers keep working without going off from lack of electricity.

i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?​

Answers

Answer:

In theory yes it is gonna be pretty hard but it is very possible

In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.

Answers

Solution :

The value of the K2 cell is filled by IF and OR functions with structured references as :

[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]

Now if the syntax of the formula is not provided, then we can use :

[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]

The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :

---   staff member should served for more than 3 years

--- staff members should be college graduate

Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to

Answers

Answer:

The program in Python is as follows:

#1

for i in range(10):

   print("MrRoyal",end=" ")

print()    

#2

for i in range(1,50,2):

   print(i,end=" ")

print()

#3

for i in range(0,101,5):

   print(i,end=" ")

print()

#4

i = 1

while i <=10:

   print(i,end =" ")

   i+=1

#5

myfile = open("People.txt", "r")

eachLine = myfile.readline()

while eachLine:

   print(eachLine)

   eachLine = myfile.readline()

myfile.close()

Explanation:

The program in Python is as follows:

Program #1

This iterates from 1 to 10

for i in range(10):

This prints the name for each iteration [modify to your name]

   print("MrRoyal",end=" ")

This prints a new line

print()    

Program #2

This iterates from 1 to 49 with an increment of 2

for i in range(1,50,2):

This prints the odd numbers in the above range

   print(i,end=" ")

This prints a new line

print()

Program #3

This iterates from 0 to 100 with a step of 5

for i in range(0,101,5):

This prints every 5th number

   print(i,end=" ")

Print a new line

print()

Program #4

This initializes the number to 1

i = 1

This opens the file in an append mode

f = open("myfile.txt", "a")

This loop is repeated from 1 to 10

while i <=10:

This writes each number to the file

   f.write(str(i))

Increment the number by 1

   i+=1

Close the file

f.close()

Program #5

This opens the file in a read mode

myfile = open("People.txt", "r")

This reads each line

eachLine = myfile.readline()

This loop is repeated for every line

while eachLine:

Print the content on the line

   print(eachLine)

Read another line

   eachLine = myfile.readline()

Close the file

myfile.close()

rem wap a programe using function procedure to calculate simple interest

Answers

Answer:

The program in Python is as follows:

def interest(P,R,T):

    [tex]I = P * R * T/100[/tex]

   return I

   

P = float(input("Principal: "))

R = float(input("Rate (%): "))

T = float(input("Time (years): "))

print(interest(P,R,T))

Explanation:

Required

Simple interest program using function

This defines the function

def interest(P,R,T):

This calculates the simple interest

   [tex]I = P * R * T/100[/tex]

This returns the calculated interest

   return I

The main begins here

These get inputs for principal, rate and time

P = float(input("Principal: "))

R = float(input("Rate (%): "))

T = float(input("Time (years): "))

This calls the interest function

print(interest(P,R,T))

complete the sentence: hexadecimal numbers use base ____

Answers

Hexadecimal numbers use base-16

Being a Base-16 system, the hexadecimal numbering system therefore uses 16 (sixteen) different digits with a combination of numbers from 0 through to 15. In other words, there are 16 possible digit symbols.

Write a pseudocode to calculate the factorial of a number

Answers

Answer:

Answer CODE from C# Sharp  Language

Explanation:

using System;

namespace test

{

   class Program

   {

       public void silnia()

       {

           decimal liczba;

           decimal silnia = 1;

           Console.WriteLine("Obliczanie Silni ");

           Console.WriteLine("Podaj liczbę: ");

           liczba = Convert.ToInt32(System.Console.ReadLine());

           //liczba = int.Parse(Console.ReadLine());

           for (int i = 1; i <= liczba; i++)

               silnia *= i;

           Console.WriteLine("Wynik Silni Wynosi :  " +silnia +" \n ");

       }

       static Program ćwiczeniaA;

       static void Main(string[] args)

       {

           ćwiczeniaA = new Program();

           ćwiczeniaA.silnia();

       

           Console.WriteLine("Koniec Programu");

           System.Console.ReadLine();

       }                                

   }

}

(101101+10110) /110
101101-11001/101 please I need help

Answers

Answer:

000000000000000000000000000001111111111111111111

Can someone please type a code that makes a house in python and turtle graphics i need help

Answers

Answer:

import turtle  

turtle.speed(2)

#shape

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

turtle.left(45)

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

turtle.left(45)

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

#door

turtle.left(90)

turtle.forward(50)

turtle.left(90)

turtle.forward(25)

turtle.left(90)

turtle.forward(50)

#windows

turtle.penup()

turtle.right(90)

turtle.forward(20)

turtle.right(90)

turtle.forward(20)

turtle.pendown()

turtle.forward(25)

turtle.left(90)

turtle.forward(40)

turtle.left(90)

turtle.forward(25)

turtle.left(90)

turtle.forward(40)

Explanation:

here :)

Two uses of mortise chisel

Answers

Answer:

Two uses of the mortise chisel are;

1) Mortise chisel are used for cutting across the grain of the wood directly   and also

2) To lever waste materials out of the cut area and smoothen the cut area

Explanation:

A mortice is a recessed hole created in a part that is meant to accommodate a complementary projection part, which will enable the fastening of the two parts together

A mortise chisel are chisels used for the chopping out mortise joints, and are designed such that the heavy impact of a mallet

there are 2048bytes in4megabytes true or false​

Answers

Answer:

FALSE IS THE ANSWER.

I HOPE IT IS HELPFUL

A car manufacturer uses'simulation software during the design process for a new car. Which of the
following are reasons to use simulation software in this context?
1. Using simulation software can save the company money by helping to compare designs early in
the process, before prototype cars are built.
II. Using simulation software can help to identify safety issues by providing data about how different
mechanical components will interact in a wide variety of situations.
III. The manufacturer can present simulation software to customers to demonstrate different design
possibilities
А
I and II only
B
I and III only
С
II and III only
D
I, II, and III

Answers

D I,II and III is the answer i think

The reasons to use simulation software in this context are I, II, and III. The correct option is D.

What is simulation software?

The process of simulating a genuine phenomenon with a set of mathematical formulas is the foundation of simulation software. It is essentially a program that allows the user to simulate an operation and view it without really conducting it.

Simulation is a decision-making and decision-support tool. You can use simulation software to assess, compare, and optimize different designs, programs, and policies. As such, it can be used to explain and defend decisions to multiple stakeholders.

By allowing the corporation to evaluate concepts early in the process before prototype automobiles are constructed, simulation software can save the company money.

Therefore, the correct option is D, I, II, and III.

To learn more about simulation software, refer to the link:

https://brainly.com/question/16192324

#SPJ2

is solar energy reliable and powerful enough to be used in home or business​

Answers

Answer:

It all depends on what you are prepared to spend and what sort of system you install. I have both grid tie and stand alone systems installed at my home, and both work really well, although we initially had some inverter problems with the grid tie system until we decided to only use top shelf gear.

We have 6.6 kW grid tie system on the roof of the house which supplies around 3 times our requirements, and a 1.5 kW stand alone system that supplies the backyard workshop and pool pump. The grid tie system cost around $6500 to install, and the small stand alone system cost $4500 although this was designed and built by myself, so a purchased system may well be more (batteries are still expensive, but this price is coming down).

In the current configuration (top tier panels, Fronius grid tie inverter and Victron stand alone inverter and charge regulator), we have had no failures in several years, and power bills are something that happen to other people.

My advice is look at what your requirements are, then double that when you spec out your system and don’t go for the cheapest price. Buy your components based on the quality and reputation of the manufacturer, it will be expensive, but you will save money in the long run. A good manufacturer will guarantee their products for at least 12 years and you should expect to get at least 20 years of life out of them.

Explanation:

Solar energy is more than enough for any business or home, but if you want to know if it is cost effective, you need to run the numbers. It does have to be grid-tied though to provide electricity at night or when cloudy for multiple days. In most cases, batteries are not cost-effective at this time.

♡●♡ jess bregoli ♡●♡

#keep learning!!


1.can you identify the materials needed in making simple doorbell ???

2.what is the use of each material or tool needed in making simple doorbell?????

pakianswer po ng maayos​

Answers

Answer:

1. rotary tool, spray paint, light, drill,

Explanation:

For what purpose do the hackers create the zombies army?

A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks

Answers

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

Create the following dataframe Student from dictionary of series and display
the details of each student. (row wise).
Name Subject Marks
1 Anjan English 78
2 Shreya Science 87
3 Meena Science 81
4 Karan Maths 91

Answers

Answer:

import pandas as pd

pd.Dataframe(information)

Explanation:

Given :

Name Subject Marks

1 Anjan English 78

2 Shreya Science 87

3 Meena Science 81

4 Karan Maths 91

information = { 'Name' : ['Anjan', 'Shreya', 'Meena', 'Karan'], 'Subject' : ['English', 'Science', 'Science', 'Maths'], 'Marks' : [ 78, 87, 81, 91]}

The information in the table can be embedded in dictionary list as given above.

Using the pandas library in python :

The Dataframe method in pandas will create the table as shown by putting the variable as an argument in the DataFrame method.

Name the function for output in python.

Answers

Answer:

We use the print() function to output data to the standard output device (screen). We can also output data to a file, but this will be discussed later. An example of its use is given below.

Answer:print()

Explanation:As said above. Print is what we use in python (:

Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.

Answers

Answer:

They are inappropriate

fallouts: Access denial and data theft

Explanation:

Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.

Access denial and data theft are the fallouts associated with DOS  and DDos attacks

what is the difference between coding with html and coding with python

Answers

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.​

Answers

Answer:

Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible  they include all information from previous revisions and updates.

Explanation:

What is the Full form of DC?

Answers

Answer:

Deputy Commissioner.

Answer:

the full form of DC is deputy commissioner

A company has recently adopted a hybrid cloud architecture and is planning to migrate a database hosted on-premises to AWS. The database currently has over 50 TB of consumer data, handles highly transactional (OLTP) workloads, and is expected to grow. The Solutions Architect should ensure that the database is ACID-compliant and can handle complex queries of the application.
Which type of database service should the Architect use?
A. Amazon Redshift
B. Amazon DynamoDB
C. Amazon Aurora
D. Amazon RDS

Answers

Answer: Amazon Aurora

Explanation:

Amazon Aurora is a fully managed service which is vital in saving time through the automation of time consuming tasks like recovery, backup, provisioning, patching, repair, and failure detection.

Amazon Aurora also allows the encryption of databases through the use of keys that are managed through the AWS Key Management Service. Therefore, based on the information given the question, type of database service that the Architect should use is Amazon Aurora.

Other Questions
Which conjunction about whole numbers is true?The sum of two non-zero even numbers is even and less than the addends.The sum of two non-zero even numbers is even and greater than the addends.The difference of two non-zero even numbers is odd and less than the larger number.The difference of two non-zero even numbers is odd and greater than the larger number. Express it in slope-intercept form. The auroras occur in theC.a. troposphereb. stratospheremesophered. ionosphere A pharmaceutical company collects data on the side effects participants report for a drug it is testing. The company finds that the probability of experiencing a headache is 5 percent and the probability of experiencing both a headache and heartburn is 2 percent. If the probability of experiencing a headache or heartburn is 8 percent, what is the probability of experiencing heartburn? 1 percent5 percent11 percent15 percent how did the early cold war affect life in the US a solid wooden cube has 4.35cm long.calculate the volume of the cube Bermuda Cruises issues only common stock and coupon bonds. The firm has a debtequity ratio of .73. The cost of equity is 11.5 percent and the pretax cost of debt is 6.6 percent. What is the capital structure weight of the firm's equity if the firm's tax rate is 39 percent? PLEASE HELP IF YOU CAN ANSWER THESE THREE QUESTIONS!How did Rome's size contribute to its economy and society?What was the impact of Rome winning the Punic War?Based on Rome's growth, how did this change Europe? evaluate the extent to which nationalism contributed to the collapse of the ottoman empire in the early twentieth century. (I need answers with documents) Find the value of x if x/3-2=6 Which expression is equivalent to xy^2/9? 1. Which statement best describes the effects on an organism whentheir environment changes?O Some changes to an organism have helpful effects and some have harmfuleffects.Changes to an organism's environment often have no effect on the organism.All changes to an organism's environment are harmful.All changes to an organism's environment are helpful. The United Nations Human Development Report gives the following data for real GDP per person in 2014: China, $12,547; Russia, $22,352; Canada, $42,155; United States, $52,947.Other information suggests that household production is similar in Canada and the United States and smaller than in China and Russia. The underground economy is larger in Russia and China and a similar proportion of each of these economies. Canadians and Americans enjoy more leisure hours than do the Chinese and Russians. Canada and the United States spend significantly more on the environment than do China and Russia. In which pair (or pairs) of countries is it easiest to compare the standard of living?And in which pair (or pairs) is it most difficult? Explain why? How does a low credit score affect a person who applies for a loan? is rocky mountains a transportation barrier or corridor? 50 POINTS TO WHOEVER ANSWERS THIS NOW!!!! IM TIMED HELP.One tool used to study refraction is a glass or acrylic prism. Two of the prisms more commonly used to study light refraction are a triangular prism with an equilateral triangle for its base and a triangular prism with a right triangle for its base. In this task, you will check whether the measurements found prove the two given prisms are right prisms and whether their bases are equilateral or right triangles.The prism said to have an equilateral triangle base has the measurements shown.Part AAre the bases of the prism equilateral triangles? Why or why not? Note: The bases of a triangular prism are triangles.Part BFor this prism to be a right prism, all the lateral faces must be rectangles. Is enough information given to prove the lateral faces are rectangles? Why or why not?Part CWithout using a protractor, you can determine whether the angles are right angles by measuring the length of the diagonal and applying the converse of the Pythagorean Theorem.The length of both diagonals for each lateral side is 13 centimeters. From this, can you prove that the lateral sides are rectangles? Why or why not?Part DSome of the measurements of the triangular prism with a right triangle base are shown.What is the length of the hypotenuse of the base?Part EWhich lateral face has the largest area, the bottom one, left one, or diagonal one? What is its area? President Roosevelt declared American neutrality in the European conflict. True False which one of the following is an example of maintenance and management. (a)doing chores like sweeping thefloor (b) teaching a child to rude a bike (c) caring for a sick child An airplane is traveling at 940 km/h. How long does it take to travel 2.00 km? Pencils cost x cents and erasers cost y cents each. Mary buys 7 pencils and 3 erasers. Write down the total cost in cents, in terms of x and y.