1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
4 years ago
5

On a web page coded in HTML, there is a sentence that reads, "Welcome to Assessments Section." Sam wants to insert the word "the

" before "Assessments." He also wants to delete the word Assessments and replace it with another word. How will the inserted and deleted text appear?
The inserted text will appear as ___________ text. The deleted text will appear as ___________ text.


1st blank answer choices :
- italicized
- struck through
- bold
- underlined


2nd blank answer choices :
- italicized
- struck through
- bold
- underlined
Computers and Technology
1 answer:
Natalka [10]4 years ago
7 0

Answer:

The inserted text will appear as underlined text. The deleted text will appear as strike through text.

Explanation:

In HTML the text which has been inserted will appear as underlined text. It means if we insert something in HTML then it will underline it. This will highlight the text that has been inserted. While on the other hand if we delete some text and replace it with some other text, then it will appear as strikethrough text.

Strikethrough text is the text which is represented with a horizontal line in its center. It represents those words which are added by mistake and are not meant for inclusion.

You might be interested in
By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducti
castortr0y [4]

Answer:

The correct option to the following question is option (B). e-business.

Explanation:

E-business is stands for the Electronic business.

E-business is the business which is conduct by the uses of the internet, Web, extranet or intranet, etc.

E-business is also known as the online business where online transactions take place.

E-business facilitates our customers that the selling and the buying of the goods between the consumers and the merchants.

7 0
4 years ago
Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique web
11111nata11111 [884]

Answer:

A. Source code

Explanation:

In the field of Programming; Source code is the code written in high level language given to the computer to translate to machine -  executable code before executing. It is usually written and understood by human. It is closer to human like language, as it allows easier expression. It is mostly consist of english-like statement.

So, Erik would primarily be writing source code when performing his daily tasks since his daily task require high level of computer programming and internet knowledge.

5 0
3 years ago
Write a function PrintShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, pr
anastassius [24]

Well, you didn't say what language, so here's in Java:


public static void PrintShampooInstructions(int numCycles)

   {

       if(numCycles < 1)

           System.out.println("Too few.");

       else if (numCycles > 4)

           System.out.println("Too many.");

       else

       {

           for(int i = 1; i <= numCycles; i++)

           {

               System.out.println(i+": Lather and rinse.");

           }

           System.out.println("Done.");

       }

   }


And also in an image, in case you can't really see it

6 0
3 years ago
Read 2 more answers
What are the five steps of ethical hacking?
Paraphin [41]

Answer

Explanation:

Hacking is simply gaining access into a computer through weaknesses that were found in the network system.

We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.

These stages includes

1. Reconnaissance

2. Scanning

3. Gaining access

4. Maintaining access

5. Covering tracks.

8 0
4 years ago
_____ refers to a group of characters, letters and numbers that share the same design. a Typeface b Color c Shape d Line
mixas84 [53]

Answer:

typeface

Explanation:

6 0
3 years ago
Other questions:
  • a. Is there any functional difference between the class being instantiated in the following two ways? Balanced bal = new Balance
    15·1 answer
  • What does it mean when #DIV/0! is displayed and a green triangle is added to the upper-left corner of a cell? A. The formula can
    10·2 answers
  • Can anyone help me with edhesive 4.2 Question 1 ???
    11·2 answers
  • While editing a film, a director feels that the actors have not enacted a particular scene well. What type of shot must the dire
    12·1 answer
  • Which best describes obliteration in a forged document?
    11·1 answer
  • For this problem, use a formula from this chapter, but first state the formula. Frames arrive randomly at a 100-Mbps channel for
    8·1 answer
  • Which of the following is NOT a goal of a Material Requirements Plans (MRP)?
    12·1 answer
  • When should you save your document?
    15·2 answers
  • HTML tag that makes a text field used by javascript statement
    6·1 answer
  • Legends are titles given to three-axis X, Y, and Z-axis. True or false?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!