You have created a Web page in HTML. When it fails W3C validation, you try changing the HTML standard to make your code more compliant. But the page fails W3C validation tests each time, regardless of standard. Which element that you used to structure the page is failing to validate

Answers

Answer 1

Answer:

<table>

Explanation:

W3C validation is a test applied to web pages codes, containing HTML, CSS and other important web frameworks, to make sure that they follow the right syntax and semantics prescribed by the W3C - World Wide Web Consortium.

When a web page, or simple an HTML document, passes this test then it shows that the set rules for creating web pages, that can be easily rendered across many browsers, have been well followed.

There are many reasons why the test may fail. Some of them are highlighted as follows;

i. Not specifying the Doctype at all. For an HTML document to pass the W3C validation test, it is important to specify the Doctype which tells the browser how to treat the document. If HTML is specified as Doctype, then the browser treats the document as HTML. If none is specified, the browser does not know and may have to guess how to treat the document.

ii. Missing closing tags. HTML is a markup language and the use of tags are very important. Many tags have opening and closing parts such as;

<p> </p>.

Some are self closing such as;

<br />

Now, opening a tag and not closing it will make the test fail.

iii. Not completing important child tags. Some tags have child tags that are very important. Child tags are put inside another tag called the parent tag. An example is the <table> tag which has a few child tags such as <tr>, <tbody> e.t.c

Now, when creating a table, according to the W3C specifications, one or more of the <tr> or <tbody> child tag should be inserted.


Related Questions

Roger is getting a $5,000 loan. Which option will allow Roger to pay off the loan and keep his payments under $100?

Answers

No roger will not be able to do that

What is one reason why a business may want to move entirely online?
A. To limit the number of items in its inventory
OB. To double the number of employees
C. To focus on a global market
D. To avoid paying state and local taxes​

Answers

Answer:

The correct answer is C. One reason why a business may want to move entirely online is to focus on a global market.

Explanation:

The fact that a business wishes to move entirely towards the online sales modality implies that there is a desire to expand the possibilities of selling its products beyond the physical place where it has its store.

It is a reality that starting an online business implies that the offered product can be purchased anywhere in the world, thanks to advances in technology and transportation that allow the product to be purchased and delivered in a matter of days, thanks to the advances produced by globalization.

Therefore, the fact that the store goes from physically to online selling makes its potential customers go from being the ones who know the store and live close to it to everyone in the world with access to internet.

Which statement is true?
a. When a method call is made, the called method must know how to return to its caller, so the return address is pushed onto the program execution stack.
b. Stacks support recursive method calls in the same manner as conventional, nonrecursive method calls.
c. The program execution stack contains the space created for a method's global variables on each invocation of that method during a program's execution.
d. When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.

Answers

Answer: D) When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.

Explanation:

When approved for a loan, an individual essentially applied for aid in the area of...
A. Increasing (and financing) immediate increase in cash flow
B. limited liability
C. future educational services
D. protections and insurance

Answers

Answer:

The correct answer is A. When approved for a loan, an individual essentially applied for aid in the area of increasing (and financing), as it implies an immediate increase in cash flow.

Explanation:

Every loan involves the delivery of money by a bank or a financial agency to a person or company, with the consideration that the latter will later return said amount, plus an additional amount for interest, within a specified period and may pay in a single payment and in full or through an installment plan. But, in any case, the immediate result of said loan is an increase in the cash flow of the person who obtains said loan, which can be used for the acquisition of goods or services, or to face different eventual expenses.

Create Python program code that will use a for loop to ask the user to enterfourintegers. Itwillcount how many of the integers are divisible by 2. The programwill print each of the 4integers and a message saying whether the integeris even or odd. The code will print the total number of even integers

Answers

Answer:

is_even = 0

int_numbers = []

for n in range(4):

n = int(input('press any four integer numbers')

int_numbers.append(n)

for n in int_numbers:

if n%2==0:

print(n, 'integer is even')

is_even+= 1

else:

print(n, 'integer is odd')

print('Total even numbers =', is_even)

Explanation:

is_even = 0 (initiates a counter to record the number of even integers).

int_numbers creates a list to store the inputs entered by the user.

int(input()) : allows users to enter an integer number

int_numbers.append(n) : adds user input to list list variable created.

n%==2 : checks if entered digit leaves a remainder of 0 when divided by 2; hence an even number

is_even+= 1: counter updates by 1 for every even number confirmed.

IANA has primarily been responsible with assigning address blocks to five regional internet registries (RIR). A tech needs to research address blocks assigned in the United States. Which RIR should the tech contact?

Answers

Answer:

The American Registry for Internet Numbers ARIN

Explanation:

The American Registry for Internet Numbers (ARIN) is a not for profit organization that serves as the administrator and distributor of Internet numeric resources such as IP addresses (IPv4 and IPv6) ASN for the United States, Canada, as well as North Atlantic and Caribbean islands

There are four other Regional Internet Registry including APNIC, RIPE NCC, LACNIC and AFRINIC.

What is the best application to create a slide show presentation?

Answers

Answer:

Microsoft Windows File Manager

PowerPoint but for your question chrome seems to be the right answer cause other ones don’t make sense but like also isn’t PowerPoint part of windows so it might be that

Could someone give an example or tell me what all of these mean? (For internet source citing) Evaluation: • Domain Name: • Authoritativeness: • Accuracy: • Timeliness: • Objectivity: •Writing Style and Mechanics: • Graphics: • Links:

Answers

Evaluation-the making of a judgment about the amount, number, or value of something; assessment

Domain Name-Is a websites name (ex-Google)

Authoritativeness-The quality of possessing authority. The quality of trustworthiness and reliability.

Accuracy-the quality or state of being correct or precise

Timeliness-the fact or quality of being done or occurring at a favorable or useful time.

Objectivity-the quality of being objective.

Writing Style and Mechanics-Style has to do with how a piece of writing sounds. Everyone has a style which develops along with their writing.

Paragraph structure: Each paragraph should begin with a topic sentence that provides an overall understanding of the paragraph. ...

Sentence length: Sentences should be kept as short as possible so that their structure is simple and readable.

Graphics-are visual images or designs

Links- is an open source text and graphic web browser with a pull-down menu system.

Jasmine is using the software development life cycle to create a song-writing app. She wants to work with others to create music. What should Jasmine do to begin the process?
Analyze and document the requirements for building the app
Break up the work into chunks and begin writing the app code
Make improvements and enhancements to the app based on feedback Write pseudocode and create a mock-up of how the app will work and look

Answers

Answer:Python's built-in library of functions allows programmers to import pre-written applications.

Explanation:

Answer: Analyze and document the requirements for building the app

Explanation: I took a quiz with that question and guessed and got it right. Other than that, I got nothing

a force of 50n acts on a body of mass 5kg. calculate acceleration produced .​

Answers

Answer:

Force = 50n

mass = 5kg

Force = m * acc

50 = 5 * A

A = 50/5

A = 10 m/s^2

HOPE IT HELPS!!!

Explanation:

how to use command prompt​

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The Command Prompt is a program, which available in windows operating systems, which imitates an input field with windows GUI(Graphic User Interface). It provides a text-based user interface, that can be used to run instructions inserted and carry out advanced organizational activities, following are the step to open a command prompt:

There are two-step to open the command prompt in windows:  

First, go to the start button the window. after open start type cmd on the search bar, It will provide the cmd to open it click with mouse or press enter button.    With the help of keyboard press (window+R) key together, after pressing it will provide the run prompt in which we write cmd and press enter. It will open a command prompt panel.    

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

Answers

Answer:

DNS or Domain Name System

Explanation:

You can query a DNS server with a domain name to get an IP address.

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. Group of answer choices

Answers

Complete Question:

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Group of answer choices:

A. True.

B. False.

Answer:

A. True.

Explanation:

A proxy server is an example of non-security devices with security features because it acts as a hub or gateway between a user and the internet. Therefore, when a user request for resources through a website, the proxy server acts as an intermediary between them and the web server providing such resources.

ACL is an acronym for access control list and it comprises of rules that grant or deny access to resources on a network.

A firewall is a network security system which prevents unauthorized access on a private network by monitoring, controlling and filtering inbound and outbound network traffic (packets) based on a set of security rules.

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

Hence, Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Which of the following statements about an inner class is true? An inner class is used for a utility class that should be visible elsewhere in the program. An inner class that is defined inside a method is publicly accessible. An inner class that is defined inside a method is not publicly accessible. An inner class that is defined inside an enclosing class but outside of its methods is not available to all methods of the enclosing class.

Answers

Answer:

(c) An inner class that is defined inside a method is not publicly accessible.

Explanation:

In programming languages such as Java, inner class (also called nested class) basically means a class inside another class or interface. The following are a few things to note about an inner class

i. Inner classes are used to group classes logically so that they are easy to use and maintained.

ii. An inner class defined inside a method of an enclosing class is not publicly accessible. They are called method local inner class

iii. An inner class that is defined inside an enclosing class but outside of its methods are available to all methods of the enclosing class

iv. An inner class has access to members, including private members, of its enclosing class.

While working on an investigation, a colleague hands you a list of file creation and access times taken from a compromised workstation. To match the times with file access and creation times from other systems, what do you need to account for

Answers

Answer:

Record time offsets.

Explanation:

In this scenario, to match the times with file access and creation times from other systems, you will need to account for time offsets.

The time offset refers to the time stamp associated with different processes or tasks on a computer in nanoseconds through the operating system.

Since you've been handed a list of file creation and access times taken from a compromised workstation by your colleague, you'll need to match respectively the time the file was created to the time it was accessed by an unauthorized user.

Additionally, the time stamp varies depending on the operating system being used;

- For windows operating system, it uses a 64 bit time stamp.

- For Linux or Unix, it uses a 32 bit time stamp.

Carlos, an algebra teacher, is creating a series of PowerPoint presentations to use during class lectures. After writing, formatting, and stylizing the first presentation, he would like to begin writing the next presentation. He plans to insert all-new content, but he wants to have the same formatting and style as in the first one. What would be the most efficient way for Carlos to begin creating the new presentation?

Answers

Answer:

see explanation

Explanation:

Carlos can make a copy of the old presentation that preserves all the formatting, and replace old content with new information.

Answer:

going under the Design tab and opening the template that was created for the first presentation

Explanation:

What is Relational Computerized Database

Answers

Answer:

Relational computerized database uses tables and columns to store data. each table is composed of records and each record is tied to an attribute containing a unique value. This helps the user use the data base by search query and gives the opportunity to build large and complex data bases

In the decision-making process, after you have chosen the right solution, what is the next step?

Answers

Answer:

Implementing the right solution.

Explanation:

There is little point in taking decisions if it stays in the paper. If the best of the possible alternatives have been identified, it must be properly implemented to accomplish the aim it was chosen for. When a decision has been made, it should be implemented, i.e. enacted, into practice. Because of poor execution, a successful decision may become ineffective. A participatory approach can be an efficient way of enforcing such decisions successfully.

Whoever answers FRIST and it has to be correct so if you don’t know don’t waste your time pls. Anyway whoever answer frist I will give you brainliest and some of my points Which type of photography would you use if you wanted to photograph a fly?

Answers

Answer:

I think Ariel photography

Explanation:

I’m not sure, but I think so

Name all of the gates used in programming.

Answers

Answer:

BUFFER GATE, NOT GATE, OR GATE, AND GATE, NOR GATE, NAND GATE, XOR GATE and , XNOR

Python: Write a program that generates 8 random scores (between 0 and 100), store them in an array,
finds the best score, and then assigns grades based on the following scheme (use loops
wherever possible):
Grade is A if score >= best – 10
Grade is B if score >= best – 20
Grade is C if score >= best – 30
Grade is D if score >= best – 40
Grade is F otherwise.

Answers

Answer:

The program written in python is as follows;

Note that the program makes use of function named checkbest

Lines written bold are comments and are used to replace the explanation section

#Program starts here

#This line imports the random module into the program

import random

#This line defines the function checkbest, with 2 parameters

def checkbest(score,best):

     #The following if condition implements the condition as stated in the

     #program requirement

     if score >= best- 10:

           grade = "A"

     elif score >= best - 20:

           grade = "B"

     elif score>= best - 30:

           grade = "C"

     elif score >= best - 40:

           grade = "D"

     else:

           grade = "F"

     #This line returns the letter grade depending on the above

     #conditions

     return "Grade: "+grade

#The main method starts here

#This line declares an empty list

array = []

#This line iterates from 1 to 8

for i in range(1,9):

     #This line generates a random integer between 0 and 100 (inclusive)

     score = random.randint(0,100)

     #This line inserts the generated score in the list

     array.append(score)

#This line sorts the list in ascending order

array.sort()

#This line gets the best score

best = array[7]

#This line iterates through the elements of the list

for i in range(0,8):

     #This line prints the current score

     print("Score: "+str(array[i]))

     #This line calls the function to print the corresponding letter grade

     print(checkbest(array[i], best))

     #This line prints an empty line

     print(" ")

#The program ends here

A data set includes data from 500 random tornadoes. The display from technology available below results from using the tornado lengths​ (miles) to test the claim that the mean tornado length is greater than 2.2 miles. Use a 0.05 significance level. Identify the null and alternative​ hypothesis, test​ statistic, P-value, and state the final conclusion that addresses the original claim. LOADING... Click the icon to view the display from technology. What are the null and alternative​ hypotheses

Answers

Answer:

The answer is:

[tex]H_0:\mu=2.2\\H_1:\mu> 2.2[/tex]

Explanation:

[tex]H_0:\mu=2.2\\H_1:\mu> 2.2[/tex]

The test value of statistic t= [tex]\frac{\bar x-\mu}{\frac{s}{\sqrt{n}}}[/tex]

                                               [tex]=\frac{2.31688-2.2}{0.206915}\\\\=0.56[/tex]

The value of P = P(T>0.56)

                          =1-P(T<0.56)

                          =1-0.712

                          =0.288

Since the P value exceeds its mean value (0.288>0.05), the null assumption must not be rejected.  Don't ignore H0. This assertion, it mean length of the tornado is greater than 2.2 miles also isn't backed by enough evidence.

convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
pls in step by step
pls help me bro

Answers

Answer:

0b11110000000 is binary

0o3600 is in octal

0x780 in hexa dec.

Explanation:its a bit complitcated to explain sorry bro!

You work for a public relations (PR) firm and communicate regularly with the internal team and the clients on a PR campaign. You need to quickly send and receive professional messages that may contain text files and short media. These messages need to be accessible at any time of the day and in different time zones, and they should be able to reach all members (internal and external) relatively inexpensively. Which communication channel would best suit this purpose?

Answers

Answer:

You Need To Quickly Send And Receive Professional Messages That May Contain Text Files And Short Media. These Messages Need To Be Accessible At Any Time Of The Day And In Different ... You work for a public relations (PR) firm and communicate regularly with the internal team and the clients on a PR campaign.

Explanation:

Email would likely be the best communication channel to meet these requirements. Once an email is sent, it broadcasts across servers and arrives at the recipient’s/recipients’ mailbox(es) for access at the receiving party’s/(ies’) convenience. Email is also able to have attachments, and as such, will allow for text files and smaller media files (audio, video, or otherwise) to be attached and accessed easily.

What form of note taking would be MOST beneficial for a visual learner who needs to see the connections between ideas?


Think link


Formal outline


Time lines


Guided notes

Answers

Answer:

Think link

Explanation:

Which object is a storage container that contains data in rows and columns and is the primary element of Access databases? procedures queries forms tables

Answers

Answer:

tables

Explanation:

For accessing the database there are four objects namely tables, queries, forms, and reports.

As the name suggests, the table is treated as an object in which the data is stored in a row and column format plus is the main element for accessing the database

Therefore in the given case, the last option is correct

Answer:

D. tables

Explanation:

took the test, theyre right too

HELP I WILL MARK BRAINLIEST!!! I NEED ASAP!!!
Python: With a program to store the list of all your friends, then sort the list and print them in alphabetical order. The program should create a loop to accept the names of all your friends. Exit the loop when the user has no more items to input. Then sort the list alphabetically and print out the new list. (Side Note: Make Sure Your Code Works Before Submitting) Note: You cannot predefine the list of friends. The list should be initialized to an empty list

Answers

#This is a way without a loop

friends = list(map(str,input("Enter Names: ").split()))

print(sorted(friends))

#This is a way with a loop (for&&while)

friends = list(map(str,input("Enter Names: ").split()))

cool = True

while cool:

   cool = False

   for i in range(len(friends)-1):

       if friends[i] > friends[i+1]:

           coo = friends[i]

           friends[i] = friends[i+1]

           friends[i+1] = coo

           cool = True

print(friends)

convert thefollowing decimal number to its equivalent binary, octal, hexadecimal 255

Answers

Answer:

Binary: 11111111

Octal: 377

Hexadecimal: FF

Explanation:

Given

Decimal Number: 255

Required

Convert to

- Binary

- Octal

- Hexadecimal

Converting to binary...

To convert to binary, we take note of the remainder when the quotient is divided by 2 until the quotient becomes 0;

255/2 = 127 R 1

127/2 = 63 R 1

63/2 = 31 R 1

31/2 = 15 R 1

15/2 = 7 R 1

7/2 = 3 R 1

3/2 = 1 R 1

1/2 = 0 R 1

By writing the remainder from bottom to top, the binary equivalent is 11111111

Converting to octal...

To convert to octal, we take note of the remainder when the quotient is divided by 8 until the quotient becomes 0;

255/8 = 31 R 7

31/8 = 3 R 7

3/8 = 0 R 3

By writing the remainder from bottom to top, the octal equivalent is 377

Converting to hexadecimal...

To convert to hexadecimal, we take note of the remainder when the quotient is divided by 16 until the quotient becomes 0;

255/16 = 15 R 15

15/16 = 0 R 15

In hexadecimal, 15 is represented by F; So, the above division can be rewritten as

255/16 = 15 R F

15/16 = 0 R F

By writing the remainder from bottom to top, the hexadecimal equivalent is FF

The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.

Answers

Answer:

volume testing hope this helps :)

what are reserved words in C programming?

Answers

Answer:

A word that cannot be used as an identifier, such as the name of a variable, function, or label. A reserved word may have no meaning. A reserved word is also known as a reserved identifier.

Explanation:

quick google search

Other Questions
In creating a narrative a writer should? A consider including secondary narratives B rearrange events in the stores timeline C only stick to a list of events as the occurred in life D order the events in the story to create interest A convertible is traveling at 45miles per hour and its wheels have a diameter of 48 inches . How many complete revolutions do the wheels make in one minute Please help me and say thanks , will give brainiest answer Why is the word "translation" used for protein production? Protein production is the process of:________. The accourtant for Mega Stores, Inc, should have recorded the following correct entry Jan 15 Notes Receivable 243 Equipment 243he misunderstood the transaction and recorded an incorrect entry, Which of the following w rong entries pertaining to this transaction could have been detected as erroneous when using a trial balance? A) Jan 15 Equipment 243 Notes Receivable 243B) Jan 15 Notes Payable 243 Cash 243C) Jan 15 Notes Receivable 243 Equipment 234 D) Jan 15 Notes Receivable 234 Equipment 234 Why is it important to press the edges of the two pie crusts together? It creates a pretty pattern on the edge of the pie. It helps the pie cool when it is done cooking. It lets the pie get air while it is cooking. It seals the pie so the filling can't get out. When you use multiple worksheets in Excel and you retrieve information from one to go to into anotherA. Start by using the = in the cell where you wish to put the information.B.Use the = in the cell where you wish to retrieve the information.C. After locating the desired cell (with the information you wish to put in a different worksheet) and clicking on it, press Enter.D. That information is often useful in summary sheets What is social structure? What are some of the factors that influence social structure, pleaseexplain them?recome In an oscillating LC circuit, the total stored energy is U and the maximum current in the inductor is I. When the current in the inductor is I/2, the energy stored in the capacitor is Which system of equations below has no solution? A. y = 4x + 5 and y = 4x 5 B. y = 4x + 5 and 2y = 8x + 10 C. y = 4x + 5 and y = One-fourthx + 5 D. y = 4x + 5 and y = 8x + 10 Apply the distributive property to create an equivalent expression. 6 (a +2b+3c) can someone help me with part b of question please. Jimmy is using a recipe that calls for 3/4 cup of flour. He only has a 1/8 of a cup measure spoon. How many spoons of the 1/8 will he need to be equivalent to 3/4? A car travels an average speed of 45km per hour. What distance does it cover in 12 hours? Which sentence describes how the migration of farmers from rural to urban areas affected Europe? A. Many villages were abandoned, leading to lower food production. B. The number and population of cities increased rapidly. C. Most farmers in rural areas prospered because more land was available. D. Governments began to regulate industries to ensure the welfare of workers. Bonnie volunteers to bring bags of candy to her child's class for the Halloween party this year. She buys one bag of candy Acontaining 120 pieces of candy, one bag of candy B containing 440 pieces of candy, and one bag of candy C containing520 pieces of candy. She needs to use all the candy to create identical treat bags. How many treat bags can Bonnie make sothat each one has the same number and variety of candy? How many of each type of candy will be in each bag? Click on the following figure to show the reflection about m. A, B, C, D? 1st pic A, 2nd pic B, and so on can someone help me plzz! Tom bought a soft drink for 3 dollars and 7 candy bars. He spent a total of 24 dollars. How much did each candy bar cost ? i just need an equation to resembel this probelm Read the sentence which type of phrase or clause is underlined in the sentence? Adjective clause