given a struct variable named student and a member variable gpa of type double, how would you read a value into gpa?

Answers

Answer 1

Answer: cin>> student.gpa

Explanation:

If you found this question helpful please mark as brainlst as it would realy help me out.


Related Questions

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what type of compression?

Answers

Answer:

losless compression

Explanation:

aiko wants to start a congregate feeding program at the senior center her grandmother attends. if aiko intends to use federal government money for her program, each meal she serves at the center must provide

Answers

If Aiko intends to use funds (money) from the federal government for her congregate feeding program, each meal she serves at the social center must provide: one-third (\(\frac{1}{3}\)) of the dietary reference intakes (DRIs).

A congregate feeding program can be defined as a meal program that is developed in line with federal government rules and regulations, so as to avail adults aged sixty (60) and above, the opportunity to enjoy nutritionally-balanced, affordable meals in a group settings, for a small suggested donation.

The congregate feeding program is a statewide program and it is only made available to persons that are aged sixty (60) and above, spouses, as well as disabled persons under the age of sixty (60) who are residing in facilities where congregate meals are being served daily.

As a general rule, each meal served at a congregate feeding program must meet the nutritional standards specified in the Dietary Guidelines for Americans while also providing a minimum of one-third (\(\frac{1}{3}\)) of the dietary reference intakes (DRIs).

Read more: https://brainly.com/question/15175853

When a computer system is operating very slowly, running a(n) _____ utility may allow programs to run faster and improve response time.

Answers

When a computer system is operating very slowly, running a disk defragmenter utility may allow software programs to run faster and improve response time.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouseHard-disk drive

What is Disk Management?

Disk Management can be defined as a type of utility that is designed and developed to avail end users an ability to convert two or more basic disks on a computer system to dynamic disks.

This ultimately implies that, Disk Management is a utility that is typically used to convert two or more basic disks to dynamic disks, for the sake of disk redundancy and mirroring.

In Computer technology, running a disk defragmenter utility may allow software programs to run faster and improve response time when a computer system is operating very slowly.

Read more on Disk Management here: brainly.com/question/6990307

#SPJ1

With 4-Across, stop scrolling the internet and go outside NYT Crossword Clue

Answers

4-Across is the answer "STEP," so the full answer to the clue would be "Step outside."

What is STEP?

STEP (Science, Technology, Engineering and Mathematics Program) is an initiative from the U.S. Department of Education which focuses on improving student achievement in STEM (Science, Technology, Engineering and Mathematics) fields by providing access to high-quality instruction, materials, and resources. This program seeks to create pathways for students to pursue STEM-related careers, helping to bridge the gaps between the workforce and educational opportunities in order to prepare students for the future. STEP also provides support and resources to teachers and schools to implement effective STEM-focused instruction and activities.

To learn more about STEP

https://brainly.com/question/28498043

#SPJ4

Consider the concept of security analysis. about the fact that in theory, a bottom-up security analysis should yield the same results as top-down analysis. Yet, in practice, analysts conducting top-down analysis of a company A are systemically producing different results than those conducting bottom-up analysis of the same company. Name at least one reason as to why this anomaly or difference between theoretical prediction and empirical outcomes can arise? Explain your answer.

Answers

The divergence between theoretical predictions and real-world results in security analysis stems from subjective influences like cognitive biases and information asymmetry, impacting analysts' decision-making.

While theoretically, a bottom-up security analysis should yield the same results as top-down analysis, the presence of subjective factors can lead to different outcomes in practice. One possible reason for this discrepancy is cognitive biases. Analysts may unknowingly be influenced by cognitive biases, such as anchoring bias or confirmation bias, which can distort their judgment and decision-making process. These biases can lead analysts to focus on certain information or interpret it in a way that aligns with their preconceived notions or initial beliefs.

Another factor contributing to the difference between theoretical predictions and empirical outcomes is information asymmetry. Analysts conducting top-down analysis may have access to different or limited information compared to those conducting bottom-up analysis. This difference in information can lead to varying conclusions and assessments of a company's value or prospects. Additionally, analysts may interpret the available information differently based on their individual perspectives, expertise, or access to resources.

Furthermore, the context in which the analysis takes place can also play a role. Market conditions, investor sentiment, and macroeconomic factors can influence the interpretation and weighting of information during the analysis process. These external factors can create discrepancies between theoretical expectations and practical outcomes.

In conclusion, the difference between theoretical predictions and empirical outcomes in security analysis can be attributed to subjective factors such as cognitive biases, information asymmetry, and external contextual influences. Recognizing and mitigating these factors is crucial for analysts to improve the consistency and reliability of their analysis.

Learn more about security here:

https://brainly.com/question/32350573

#SPJ11

Choose the word that makes each sentence true.
Use a while/for loop when you know you want to make 10 passes through a loop
Use a while/for loop when you want to continue passing through a loop until a condition is met

Answers

Answer:

Use a for loop when you know you want to make 10 passes through a loop

Use a while loop when you want to continue passing through a loop until a condition is met

Explanation:

Let us first clear that when do we use for loop and when do we use while loop.

For loop is used when the programmer already knows the number of repetitions.

While loop is used when the number of iterations are not known but the condition has to be used to determine the number of iterations.

Hence,

Use a for loop when you know you want to make 10 passes through a loop

Use a while loop when you want to continue passing through a loop until a condition is met

Why would you expect CRC to detect more errors than simply using a parity bit?

Answers

CRC (Cyclic Redundancy Check) is expected to detect more errors than simply using a parity bit due to its mathematical properties and the size of the check sequence it generates.

CRC is a more robust error-detection technique compared to a simple parity bit because of the following reasons:

Check Sequence Size: CRC generates a longer check sequence than a parity bit. A parity bit only adds one additional bit to the data, while CRC appends a check sequence that is typically several bits long. The larger check sequence increases the likelihood of error detection since it provides more possible error patterns to detect.

Polynomial Division: CRC uses polynomial division to generate the check sequence. This process introduces a more complex mathematical calculation that spreads the error-detection capability throughout the data. It can detect burst errors, which are consecutive errors that are more likely to occur in real-world transmission scenarios.

Error Detection Efficiency: CRC has a higher probability of detecting errors than a simple parity bit due to its mathematical properties. It can detect a broader range of errors, including both single-bit errors and some multiple-bit errors. The specific CRC polynomial used and its properties influence the error-detection efficiency.

Overall, CRC is designed to provide better error detection capabilities by generating a larger check sequence and employing more sophisticated mathematical techniques. It is widely used in communication protocols, storage systems, and digital networks to ensure data integrity.

Learn more about CRC and error detection techniques here: brainly.com/question/33326994

#SPJ11

Which type of project would most likely need a project manager?
O A. One that involves a digital product
O B. One involving many team members
C. One involving few team members
O D. One covering a short period of time

Answers

the answer is D. One covering a short period of time

The type of project would most likely need a project manager is one covering a short period of time. Thus, option D is correct.

What is the main role of project manager?

The main role of the project manager is that it has been basically assisting the project managers by coordinating, as well as analyzing and the planning the specific project.

The main responsibility of the assistant project managers has to supporting the given function of the project and to execute the given project.

According to the given question, a typical project office is basically responsible for managing the large projects which include both the project manager and the assistant project managers.

Therefore, one covering a short period of time is the work that need a project manager. Thus, option D is correct.

Learn more about project manager on:

https://brainly.com/question/15404120

#SPJ7

write a function in python that implements the following logic: the squirrels in palo alto spend most of the day playing. in particular, they play if the temperature is between 60 and 90 (inclusive), unless it is summer, in which case the upper limit is 100 instead of 90. given an integer temperature and a boolean issummer, return true if the squirrels play and false otherwise.

Answers

The any() and all() methods in Python evaluate each item in a list to determine if it is true. When any or all of the list items are true, the any() method returns true, and when all the list items are true, the all() function returns true.

It declares that the logical AND of each supplemented variable is equal to the complement of the logical OR of at least two Boolean variables. As a result, the logical OR of any supplemented variable equals the complement of the logical AND of two boolean variables. F(x) = sin x, F(x) = x2 + 3, F(x) = 1/x, F(x) = 2x + 3, etc. are a few further instances of functions. Mathematical functions come in many different varieties. Among the crucial kinds are: injection technique or One-to-one function: When a range for each domain is mapped between two sets.

To learn more about Python click the link below:

brainly.com/question/30427047

#SPJ4

eam effectiveness PowerPoint presentation information that I can use to help with my presentation up to 10 slides
title is team effectiveness need help asap
Develop your PowerPoint slide plan for your presentation.
The submission should include an
1) Introduction slide- completed and
2) conclusion slide completed.
3) slide style you will use for your presentation.

Answers

Begin your presentation by explaining the meaning and importance of Team Effectiveness. Mention your presentation objective and agenda. You can also include a quote related to Team Effectiveness.

Define Team Effectiveness, explain why it is important, and its benefits to the organization. Slide 3: Characteristics of a High-Performing Team – explain how teams can work together in an efficient and effective manner. Mention the traits of a successful team.

The role of communication in Team Effectiveness - discuss the importance of communication and how it can be improved. Slide 5: Team Building and its importance - Explain how team building activities can help in creating a more effective and efficient team. Slide 6: Teamwork strategies and tools - discuss how collaborative tools and strategies can improve team effectiveness.

To know more about presentation  visit:-

https://brainly.com/question/13931020

#SPJ11

Why would someone get a patent for their invention? a. to sell their idea to make their idea public domain b. to be able to name the invention after themselves c. to keep others from reproducing their idea

Answers

Answer:

c

Explanation:

b/c this is a patent for their invention

Use a method from the JOptionPane class to request values from values from the user to initialise variables of election objects and assign this objects to the array the array must be fiiled

Answers

Here is an example of how to utilize JOptionPane to obtain values from a user in order to initialize variables of election objects and assign these objects to an array that is then filled:
```

import javax.swing.JOptionPane;

public class Election {
 String candidateName;
 String politicalParty;
 int numberOfVotes;

 public Election() {

   candidateName = JOptionPane.showInputDialog("Enter the candidate name: ");
   politicalParty = JOptionPane.showInputDialog("Enter the political party: ");
   numberOfVotes = Integer.parseInt(JOptionPane.showInputDialog("Enter the number of votes: "));
 }
  public static void main(String[] args) {

   Election[] electionArray = new Election[3];
      for (int i = 0; i < electionArray.length; i++) {
     electionArray[i] = new Election();
    }
}
```

The JOptionPane class is a part of the Java Swing class which is used to generate popup boxes that are able to display information messages, accept user input, and obtain user confirmation. The showMessageDialog(), showInputDialog(), and showConfirmDialog() methods are some of the most frequently used methods of the JOptionPane class when it comes to acquiring values from a user. Here is an example of how to utilize JOptionPane to obtain values from a user in order to initialize variables of election objects and assign these objects to an array that is then filled:
```

import javax.swing.JOptionPane;

public class Election {
 String candidateName;
 String politicalParty;
 int numberOfVotes;

 public Election() {

   candidateName = JOptionPane.showInputDialog("Enter the candidate name: ");
   politicalParty = JOptionPane.showInputDialog("Enter the political party: ");
   numberOfVotes = Integer.parseInt(JOptionPane.showInputDialog("Enter the number of votes: "));
 }
  public static void main(String[] args) {

   Election[] electionArray = new Election[3];
      for (int i = 0; i < electionArray.length; i++) {
     electionArray[i] = new Election();
    }
}
```

This code initializes an Election object with values obtained from the user via the JOptionPane showInputDialog() method and then assigns that object to an array. The for loop fills the array with three Election objects.

For more such questions on JOptionPane, click on:

https://brainly.com/question/32280280

#SPJ8

the factorial of an integer is the product of that integer multiplied by all the positive non-zero integers less than that integer. so, 5! (! is the mathematical symbol for factorial) is 5 * 4 * 3*2*1. 4! is 4*3*2*1, so 5! could be written as 5*4!. so a recursive definition of factorial is n! is n*(n-1)!, as long as n >1. 1! is 1. what is the recursive call for this function (fact)?

Answers

The recursive function for the factorial of an integer will be shown by (n==1).

What does recursive function mean?

Recursive functions produce a string of phrases by iterating over or utilizing as input their own previous term. The arithmetic-geometric sequence, which has words with a common difference between them, is typically the basis on which we learn about this function.

Why is the use of recursive functions?

Recursion is a method for solving computer problems that involve writing a function that calls itself again until the program yields the desired outcome.

To know more about recursive functions visit:

https://brainly.com/question/23896867

#SPJ4

which tab on the ribbon contains the command to record a macroa. Home. b. Insert. c. View. d. Design

Answers

Answer:

D. I'm pretty sure, sorry if I'm wrong

Explanation:

Name one common framework that is used by web developers to build responsive websites​

Answers

Answer:

Twitter Bootstrap

Explanation:

Bootstrap is a popular, modern front-end/UI development framework.

using the traceroute command, trace the hops a packet takes from one of the utcs machines to a website in europe. inspect the trace. what do you notice? do you see any machines you recognize? isps? cities? please be sure to tell us what website you used.

Answers

The traceroute command can be a useful tool for Diagnosing network issues and understanding the path that packets take across the internet.

Traceroute is a command-line tool that allows you to trace the path that packets take from your local machine to a remote server on the internet.

When you execute the traceroute command, it sends a series of packets to the destination server with increasing Time-to-Live (TTL) values, and each router that the packet passes through decrements the TTL value. When the TTL reaches zero, the router sends an ICMP error message back to the source, which allows traceroute to identify the router's IP address.

To trace the hops that a packet takes from a UTCs machine to a website in Europe, you would need to open a command prompt on the machine and execute the traceroute command followed by the website's domain name or IP address. For example, if you wanted to trace the hops to the website www.example.com, you would enter the following command in the terminal:

After executing the command, you would see a list of hops that the packet took from your local machine to the destination server. Each hop represents a router or network device that the packet passed through, and the IP address of that device is displayed next to the hop number. Additionally, you can see the time it took for the packet to reach each hop and the overall round-trip time.

However, based on the typical results of a traceroute, you may see some routers with recognizable names, such as the ISP providing the internet connection, or cities that the packet is passing through. You may also see some unexpected hops due to the complex nature of internet routing and the various networks and providers involved.

Overall, the traceroute command can be a useful tool for diagnosing network issues and understanding the path that packets take across the internet.

To Learn More About traceroute command

https://brainly.com/question/14728283

#SPJ11

How big of a role does social media play in the mental health of people? Does it do more harm or good? Explain why. in 400 words

Answers

The role that social media play in the mental health of people is big. The use of social media is one that is known to have c positive effects for example connecting people, giving a platform for self-expression, and others.

What is the  role that social media?

The  key bad  impacts of social media on mental health is one that is known to have the potential for addiction. Social media platforms are said to be set up to be a form of engaging, which can result to individuals spending excessive amounts of time going through their feeds and this may lead to depression.

Hence the negative impact of social media on mental health is the one that can also lead to cyberbullying that is Online harassment.

Learn more about  role that social media from

https://brainly.com/question/1163631

#SPJ1

When iterating over a list, a for loop is usually simpler to code than a while loop.

A.
True

B.
False

Answers

Answer:

A

Explanation:

Yea imma have to say A

How do you turn Track changes on?
A.) Select the review tab the track changes.
B.) Select the review tab then new comment.
C.) select the file tab then track changes.
D.) Select the reference tab then track changes.
help me

Answers

To turn on Track Changes in Microsoft Word, you need to follow these steps: A.) Select the "Review" tab, then click on "Track Changes."

How do you turn Track changes on?

A person have the option to activate or deactivate the "Track Changes" function in the designated section.

When the Track Changes function is enabled, all alterations made to the document will be documented and presented with formatted indicators.

Therefore, the correct answer is option A.) Select the review tab then click on "Track Changes."

Learn more about Track changes  from

https://brainly.com/question/27640101

#SPJ1

The US government appropriates less than one million dollars in funding each year to STEM education programs. True False

Answers

Answer:

False.

Explanation:

A STEM course typically comprises of science, technology, engineering and mathematics.

The US government appropriates more than one million dollars in funding each year to STEM education programs. The government of the United States of America create scholarship opportunities for its citizens in order to assist students develop a career in STEM-related field.

Educate to Innovate campaign is an example of STEM education programs developed and established by the US government to fund STEM education programs.

Answer: False

Explanation:

I have this assignment

block diagram of a computer


Answers

Answer:

this the answer for you.

mark me as a brainlist plz.

 block diagram of a computer

which data mining process/methodology is thought to be the most comprehensive, according to kdnuggets rankings?

Answers

CRISP-DM methodology is thought to be the most comprehensive, according to kdnuggets rankings.

What is data mining?Analyzing a vast amount of data to find patterns and trends is known as data mining.Businesses can utilize data mining for a variety of purposes, such as figuring out what products or services their customers are interested in purchasing, as well as for fraud and spam filtering.Based on the information users supply or request, data mining systems analyze patterns and connections in data.In order to make money, social media corporations utilize data mining techniques to commodify their users.Since consumers frequently are not aware that data mining is taking place with their personal information, especially when it is used to influence preferences, this use of data mining has come under fire recently.

To learn more about data mining, refer to

https://brainly.com/question/2596411

#SPJ4

Made from zinc and copper, brass has been manufactured for thousands of years. It is used in weapons, pipes, musical instruments, and many other important ways. Which of these words best describes brass?.

Answers

Brass has been manufactured for thousands of years and has a wide range of uses, including in weapons, pipes, musical instruments, and many other important applications.

It is known for its strength, durability, and corrosion resistance, as well as its ability to be molded, shaped, and worked into a variety of different forms.

What is Brass?

Brass is a metallic alloy. An alloy is a mixture of two or more elements, at least one of which is a metal. Alloys are typically made by combining different metals in specific proportions to create materials with specific properties and characteristics. Brass is an example of an alloy that is made from the metals zinc and copper.

To learn more about corrosion resistance, visit: https://brainly.com/question/13926854

#SPJ4

Dr. Thomas likes to follow up with her patients to make sure they were happy with their care. She sends all patients an email encouraging them to call her office with any questions or to schedule future appointments. Dr. Thomas chooses email as the for this communication.

Answers

Answer:

lean media

Explanation:

Dr. Thomas uses email as a medium of lean media to convey messages.

Lean media may be defined as the source of conveying messages that are short or of lean capacity. It is meant for instant messages and message and information that is not considered to be of out most importance. Whereas a rich media is a video chat or face to face communication.

Dr. Thomas send emails to her patients to follow up with them and also encourages her patients to call her for appointments or any questions. She uses email as a source of lean media for this communication.

Answer:

lean media

Explanation:

3.6.5 Add Comments! codehs

Answers

Comments are readable explanations added to a program source code, to make the program easier to read, understand and also debug.

Python comments

In Python programming language, there are two types of comments

The single line commentThe multiline comment

The single line comment begins with #, while texts within open and close """ are regarded as multiline comments

Complete program

The complete program, when comments are added is as follows:

"""The next three lines get the name of the user"""

first_name = input("Enter your first name: ")

middle_name = input("Enter your middle name: ")

last_name = input("Enter your last name: ")

#This line calculates the user's full name

full_name = first_name + " " + middle_name + " " + last_name

#This line prints the full name

print(full_name)

Read more about comments at:

https://brainly.com/question/20475581

array expander. write a function that accepts an int array and the array's size as arguments. the function should create a new awway that is twice the size of the argument array

Answers

An array expander is a function that accepts an int array and the array's size as arguments. The function should create a new array that is twice the size of the argument array. To create a new array that is twice the size of the argument array, follow these steps: Step 1: Define the function and declare the input parameters. Then, inside the function, declare a new array with twice the size of the argument array. The new array should have a size of two times the input array size. Step 2: Loop through the input array, copying each element to the new array. You can use a for loop to loop through the input array and assign each element to the new array. Step 3: Return the new array as output of the function. The new array, which is twice the size of the input array, should be returned as the output of the function.Here's the code in C++ language:```#include using namespace std; int* arrayExpander(int arr[], int size){ int* newArr = new int[size * 2]; for(int i = 0; i < size; i++){ newArr[i] = arr [i]; } return newArr; } int main(){ int size = 5; int arr[size] = {1, 2, 3, 4, 5}; int* result = array Expander(arr, size); cout << "Original array: "; for(int i = 0; i < size; i++){ cout << arr[i] << " "; } cout << endl; cout << "Expanded array: "; for(int i = 0; i < size * 2; i++){ cout << result[i] << " "; } cout << endl; delete[] result; return 0; }```In the main function, an array of size 5 is defined with the values 1, 2, 3, 4, and 5. Then, the arrayExpander function is called with the array and its size as arguments. The result is stored in a pointer variable, which is then used to print the original array and the expanded array. Finally, the memory allocated to the new array is released using the delete[] operator.

An array expander is a function that accepts an int array and the array's size as arguments. The function should create a new array that is twice the size of the argument array.

To create a new array that is twice the size of the argument array, follow these steps:

Step 1: Define the function and declare the input parameters. Then, inside the function, declare a new array with twice the size of the argument array. The new array should have a size of two times the input array size.

Step 2: Loop through the input array, copying each element to the new array. You can use a for loop to loop through the input array and assign each element to the new array.

Step 3: Return the new array as output of the function. The new array, which is twice the size of the input array, should be returned as the output of the function.Here's the code in C++ language:```#include using namespace std; int* arrayExpander(int arr[], int size){ int* newArr = new int[size * 2]; for(int i = 0; i < size; i++){ newArr[i] = arr [i]; } return newArr; } int main(){ int size = 5; int arr[size] = {1, 2, 3, 4, 5}; int* result = array Expander(arr, size); cout << "Original array: "; for(int i = 0; i < size; i++){ cout << arr[i] << " "; } cout << endl; cout << "Expanded array: "; for(int i = 0; i < size * 2; i++){ cout << result[i] << " "; } cout << endl; delete[] result; return 0; }```In the main function, an array of size 5 is defined with the values 1, 2, 3, 4, and 5.

Then, the array Expander function is called with the array and its size as arguments. The result is stored in a pointer variable, which is then used to print the original array and the expanded array. Finally, the memory allocated to the new array is released using the delete[] operator.

Learn more about array on:

https://brainly.com/question/13261246

#SPJ4

Software is the brain of computer. Explain this starement

Answers

here you go

i hope this helps you

Software is the brain of computer. Explain this starement

Software serves as the operational core of a computer, controlling its functions and enabling it to perform tasks.

How does software function as the brain of a computer?

Software acts as the brain of a computer, providing the necessary instructions and algorithms for the hardware components to execute specific operations. It encompasses a wide range of programs, applications, and operating systems that enable users to interact with the computer and utilize its capabilities.

Without software, a computer would be an inert machine with no ability to process information, make decisions, or carry out tasks

Read more about Software

brainly.com/question/28224061

#SPJ2

Conduct online research on the document object model. Study about the objects that constitute the DOM. In addition, read about some of the properties and methods of these objects and the purposes they serve. Based on your online research on DOM and its objects, describe DOM in detail.

Answers

The Document Object Model (DOM) is a programming interface for HTML and XML documents. It represents the structure of a document as a hierarchical tree of objects, where each object represents an element, attribute, or piece of text within the document.

The objects that constitute the DOM include:

Document: Represents the entire HTML or XML document. It serves as an entry point to access other elements and nodes within the document.

Element: Represents an HTML or XML element, such as <div>, <p>, or <span>. Elements can have attributes, child elements, and text content.

Attribute: Represents a specific attribute of an HTML or XML element. Attributes provide additional information about elements, such as the id, class, or src attributes.

Text: Represents the text content within an element. Text nodes contain the actual textual content that is displayed within the document.

NodeList: Represents a collection of nodes, usually returned by methods such as getElementByTagName(). It allows access to multiple nodes at once.

Event: Represents an event triggered by user interaction or other actions. Events can include mouse clicks, keyboard input, or element-specific events like onload or onchange.

The DOM objects provide various properties and methods to interact with the document. Some commonly used properties include:

innerHTML: Gets or sets the HTML content within an element.

className: Gets or sets the class attribute value of an element.

parentNode: Retrieves the parent node of an element.

childNodes: Retrieves a collection of child nodes of an element.

By utilizing the DOM and its objects, developers can dynamically modify the content, style, and behavior of web pages. It provides a powerful and standardized way to interact with and manipulate web documents programmatically.

For more questions on Document

https://brainly.com/question/30563602

#SPJ11

Henry wants to create a website for his projects. He needs it to have a lot of textual content, proper formatting, and animations. Which languages will he need for this?

Henry can us ____to create the web content. He can use ____ to style the content he has created and _____ to create animation

the blank choices can be filled with
1.CSS HTML XML
2.CSS XML DHTML
3. Javascript Shockwave ActionScript ​

Answers

Answer:

1. HTML

2. CSS

3. JavaScript

Explanation:

Shockwave and Actionscript are no longer used on the web.

The Answer Above is incorrect. This is the correct answer:

Henry wants to create a website for his projects. He needs it to have a lot of textual content, proper
Other Questions
TRUE / FALSE. which of the following molecules has the lowest ozone depletion potential Hamburgers come packed 12 in a package. Hamburger buns come packed 10 in a package. If we want one hamburger for each bun for a barbecue, with none left over, what is the least amount of packages of each we need to buy? what technique involves the packaging of an object's attributes and methods into a cohesive unit that can be used as an undivided entity? A movie theater has a seating capacity of 329. The theater charges $5.00 for children, $7.00 for students, and $12.00 of adults. There are half as many adults as there are children. If the total ticket sales was $ 2388, How many children, students, and adults attended? ___ children attended. ___students attended. ____adults attended. please help meee!!!!!! The tax law requires that capital gains and losses be separated from other types of gains and losses. Among the reasons for this treatment are:Long-term capital gains may be taxed at a lower rate than ordinary gains.Capital losses that are short-term are not deductible.Net capital loss is deductible only up to $3,000 per year for individual taxpayers.a. and c. Totsakan school is selling tickets to a choral performance on the first day of ticket sales the school sold 10 senior tickets and 1 child ticket for a total of $85 the school took in $75 on the second day by selling 5 senior citizens tickets and 7 child tickets find the price of a senior ticket and the price of a child ticket Caleb went rolar skating at the local rink. The circular rink measured 70 feet from side to side. What distance, in feet, did Caleb skate one lap by skating along the edge of the ring? What are some regional characteristics of North Africa? How might you set the scene for the opening of your love story; a beach on paradise island?A. Major keyB. Minor keyC. Slow, descending note patternD. Dissonant chords please do it in python and explain each step to understandbetter.Write a class to represent vectors in spherical coordinates. The class should have 3 attributes - the r, 0, and components. The class should have: 1) Accessor methods that allow the users to get and s PLEASE! An item costs 410 before tax, and the sales tax is 32.80.Find the sales tax rate. Write your answer as a percentage. Which of the following is a guideline to follow when using pesticides Allow pets to stay in area Put up warning signs Use one and a half times the recommended dose Spray on a windy day the intent behind the statute of frauds is to: select one: a. protect licensees from sellers who try and cheat licensees out of duly earned commissions b. put real estate transactions in writing c. protect the public from fraudulent actions by licensees d. prevent sellers from lying about property defects to prospective buyers How to multiply decimal numbers. Are you also aware, Mrs. Bueller, that Ferris does not have what we consider to be an exemplary attendance record?"- Ferris Bueller's Day Offthis is not an example of litotesthis is an example of litotes Which numbers are solutions to the inequality 2x 1 > x 2? check all of the boxes that apply. to strengthen her counter argument, which negative emotions does McGonigal associate with the groups? Keyser Corporation, which has only one product, has provided the following data concerning its most recent month of operations Selling price: $1,500Units in beginning inventory: 1,500Units produced: 9,400Units sold: 9,500Units in ending inventory: 1,400Variable costs per unit:Direct materials: $40Direct labor: $57Variable manufacturing overhead: $21Variable selling and administrative expense: $31Fixed costs:Fixed manufacturing overhead: $75,200Fixed selling and administrative expense: $167,500The company produces the same number of units every month, although the sales in units vary from month to month. The company's variable costs per unit and total fixed costs have been constant from month to monthWhat is the net operating income for the month under absorption costing?a. $5,200b. $35,100c. $5,200d. $22,500 ----Gracias por invitarme, Pedro, pero no puedo ir contigo al estreno.----______Claro que s!Qu lstima!Te lo aseguro!Estoy convencido!