1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
2 years ago
6

where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to tha

t element.
Computers and Technology
1 answer:
frez [133]2 years ago
3 0
Not too sure what the answer the question would expect, or rather what terminology,

But I’d say key-value pairs

For example in CSS

key: value;

color: green;
You might be interested in
Which of the following is NOT a reason to use cryptography?
Mars2501 [29]

Cryptography is not a reason to use when posting photos on a public social media website.

Cryptography is the use of certain techniques that help protect important and personal information from being accessed by other parties. This technological practice or method allows a person to send sensitive or personal information over the internet without risking any "leak" of information.

  • Cryptography literally means "hidden writing", which is what the method is all about.
  • It presents a safe and secure way of sending or passing information, even personal or sensitive ones.
  • This technological method enables businesses and other companies as well as individuals to procure and send information without fearing for any loss of their information.
  • Cryptography is mainly used in the military, secret operations, businesses, or even in maintaining one's passwords while using social media platforms or submitting a password on a website.
  • One reason to not use it is when posting photos on social media websites as the website is to be used by the web world and may/can be accessed by everyone around the world.

Cryptography not only allows a person to maintain certain privacy and security but also help the smooth functioning of businesses and other national security works. Thus, cryptography is the "security" of individuals in the 'internet world'.

Learn more about cryptography here:

brainly.com/question/88001

5 0
2 years ago
Read 2 more answers
Describe data center technology and its relevance to modern-day cloud computing. Support your opinion with cited information.( S
Masteriza [31]

Answer: Data center technologies are the innovations that support the IT(Information technology) department and its functioning like storing data, management, operating etc. Data centers provide the help in functioning of the cloud services.

The modern cloud computing services require data centers for operations protecting data when the the power of the network goes off or any other failure occurs while data is getting updated or accessed.

6 0
3 years ago
What are the features of page layout
bagirrra123 [75]

Typical page layout decisions include:

Size of page margins.

Size and position of images and figures.

Deciding on the number and size of columns and gutters (gaps between columns)

Placement of intentional whitespace.

4 0
2 years ago
Read 2 more answers
What is the difference between a queue and a stack?
Zinaida [17]

Answer:

Difference between Queue and Stack are as following:-

  1. Queue is a FIFO(First In First Out) type data structure while Stack is a LIFO(Last In First Out) type data structure.
  2. The insertion and deletion of elements from the queue happens from two ends insertion at the tail and deletion from the front.While the insertion and deletion from stack happens from one end only that is top.
  3. The insertion and deletion operation in queue are referred as enqueue and dequeue. While in stack they are referred as push and pop respectively.
7 0
3 years ago
What might be a drawback of gps technology?
goldenfox [79]
A drawback of GPS technology is the fact that you can be tracked at any given time.
3 0
2 years ago
Other questions:
  • What is the central unit of the computer that contains the logic circuitry and carries out the instructions of the computer's pr
    13·1 answer
  • What is the most powerful gpu or known as the graphics card in the world?
    8·2 answers
  • vertical exchanges are typically used only to buy and sell materials required for an organization's support activities ( True or
    14·2 answers
  • The first version of the SMTP protocol was defined in RFC 821. The current standard for SMTP is defined in RFC 5321 considering
    11·1 answer
  • Characters used to control the position of the output on the screen or paper, to cause some action to occur, such as ringing a b
    10·1 answer
  • Most presentation programs allow you to save presentations so they can be viewed online by saving them as ____
    5·2 answers
  • the front desk of the Nocete's Hotel will comlute the total room sales (TRS) of Room 101.The room was occupied three times and t
    6·1 answer
  • Information that's been collected to help solve a problem is called
    10·1 answer
  • mary has access to certain resources because she is in the Research division of her company. She has access to other resources b
    15·1 answer
  • Only the root user can modify a file that has the immutable attribute set.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!