1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
4

Which font style would compete with a cell border

Computers and Technology
2 answers:
zhannawk [14.2K]3 years ago
6 0

Answer: Underline

Explanation:

Bold and italic words are useful for drawing the reader’s eye to the information. Some styles, such as underline, are usually not a good choice because the style competes with the cell border and is also associated with hyperlinks. Color can also be used for cell data, but should be used with thought to how it will print. PF

ZanzabumX [31]3 years ago
4 0

Answer:

The correct option is option (C) which is <u>underline</u>.

Further Explanation:

The best matching option is underline which is also used in hyperlink. All font styles are not used in outside borders. Bold and italic are used for drawing the attention to the reader for important information. Colour also played an important in selection of data. Also, cell border is a type of font style which can be seen in overlapping with the cell borders.

The CSS sample command for writing underline in CSS is shown below:

h1 {

 text-decoration: underline solid green;

}

The above command is written in the style tag ( <style> ) and it will underline the h1 tag with green colour in solid lines.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

Grade: College Engineering

Subject: Web Technology

Chapter: HTML and CSS

Keywords:

Font style, compete, cell border, italic, bold, underline, bold italic, CSS, HTML, blue, red, dotted lines, solid lines, style, tag, border, head, h1 tag, h2 tag, overlapping, cell border, hyperlink, outside borders, cell property, command, reader

You might be interested in
How can you tell that a website is valid and reliable?
larisa86 [58]
If there is an about page where it tells whom made the website, as well as a copyright 2016 on the bottom of the page. This basically means the website is useful and updated by the creators. Another factor which the site doesnt always need but if it has an https at the beginning of the url then it should be good and valid because that means the site is secured. Also factor in the sections where articles are present, if they have a date and an author towards the bottom or top of the article, then it can be trusted as well. Theres a lot more you can look for in a site and validating if it is an okay site but these are a few examples. Hope this helped!:)
3 0
3 years ago
Alcohol and drugs
vitfil [10]
I would have to say B
3 0
3 years ago
What kind of heat we feel from the sun
ivolga24 [154]

Is it solar heat? ultraviolet heat? UV?
6 0
4 years ago
Read 2 more answers
Half of the integers stored in the array data are positive, and half are negative. Determine the
jonny [76]

Answer:

Check the explanation

Explanation:

Below is the approx assembly code for above `for loop` :-

1). mov ecx, 0

2). loop_start :

3).    cmp ecx, ARRAY_LENGTH

4).    jge loop_end

5).    mv temp_a, array[ecx]

6).    cmp temp_a, 0

7).    branch on nge

8).        mv array[ecx], temp_a*2

9).   add ecx, 1

10).   jmp loop_start

11). loop_end :

Assumptions :-

*ARRAY_LENGTH is register with value 1000000

*temp_a is a register

Frequency of statements :-

1) will be executed one time

3) will be executed 1000000 times

4) will be executed 1000000 times

5) will be executed 1000000 times

6) will be executed 1000000 times

7) `nge` will be executed 1000000 times, branch will be executed 500000 times

8) will be executed 500000 times

9) will be executed 1000000 times

10) will be executed 1000000 times

Cost of statements :-

1) 10 ns

3) 10ns + 10ns + 10ns [for two register accesses and one cmp]

4) 10ns [for jge ]

5) 10ns + 100ns + 10ns [10ns for register access `ecx`, 100ns for memory access `array[ecx]`, 10ns for mv]

6) 10ns + 10ns [10ns for register_access `temp_a`, 10ns for mv]

7) 10ns for nge, 10ns for branch

8) 30ns + 110ns + 10ns

10ns + 10ns + 10ns for temp_a*2 [10ns for moving 2 into a register, 10ns for multiplication],

110ns for array[ecx],

10ns for mv

9) 10ns for add, 10ns for `ecx` register access

10) 10ns for jmp

Total time taken = sum of (frequency x cost) of all the statements

1) 10*1

3) 30 * 1000000

4) 10 * 1000000

5) 120 * 1000000

6) 20 * 1000000

7) (10 * 500000) + (10 * 1000000)

8) 150 * 500000

9) 20 * 1000000

10) 10 * 1000000

Sum up all the above costs, you will get the answer.

It will equate to 0.175 seconds

7 0
3 years ago
___________ poses the greatest risk to workers because it is more common and more easily transmitted than other bloodborne disea
Evgesh-ka [11]

Answer: Hepatitis

Explanation: According to the center for disease control and prevention (CDC) HIV, hepatitis B and Hepatitis C are the most common bloodborne pathogens which workers are more susceptible to contract. According to CDC's the estimated risk of an HIV infection is 0.3 percent, 1 from 300 people. Hepatitis B has from 6 to 30 percent causing serious liver damage. And Hepatitis C has a risk between 2 and 4 percent

3 0
2 years ago
Other questions:
  • Which of the following is a disadvantage of using a personality assessment to determine who is well suited for a work position?
    7·2 answers
  • White arrows in the middle of the lane indicate whether the lane must __________.
    8·2 answers
  • Generally, websites ending in .edu, .gov, and .org are less likely to be biased, or to show preference toward a certain financia
    12·1 answer
  • In cell B20, enter a function to calculate the average attendance for 2018
    11·1 answer
  • 1. How do you know that A Drop of Water is an expository<br> text? GENRE
    7·1 answer
  • How many bit make a byte .​
    12·2 answers
  • There are two circular grounds Ground-A and Ground-B. Ground-A is having diameter of 15 meters and Ground-B is having diameter o
    7·1 answer
  • OO<br>(A) 3 and 5<br>(B) 4 and 8<br>(C) 2 and 0<br>(D) 6 and 9<br>2. There are twelve books on a shelf and four children in a ro
    12·1 answer
  • Mention three types of pipeline hazards​
    6·2 answers
  • Which of the following activities is not permissible for IT professionals while on the job? Check all of the boxes that apply.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!