1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
3 years ago
7

A web page typically contains ________, which contains the formatting instructions for displaying the web page.

Computers and Technology
1 answer:
USPshnik [31]3 years ago
3 0
HTML: Hypertext Markup Language. It's used in conjunction with CSS (Cascading Style Sheets), which implements presentation (adding color, positioning elements, etc.) and JavaScript (you'll often see this referred to as JS), which implements functionality (like clicking on buttons) for webpages.
You might be interested in
Which of the following database object hold data?
Oksi-84 [34.3K]

Answer:

tables

Explanation:

In Access, all data is stored in tables, which puts tables at the heart of any database. You might already know that tables are organized into vertical columns and horizontal rows. In Access, rows and columns are referred to as records and fields

4 0
3 years ago
Read 2 more answers
Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform onl
sdas [7]
Least privilege is the data access principle that ensures to unnecessary access to data exists by regulation members so that can perform only minimum data manipulation necessary. The principle of least privilege or as called as POLP is the run-through of controlling access to the minimal level that will permit normal functioning. The norm of least privilege interprets to giving people the lowermost level of user right that they can have and still do their jobs. The principle is also functional to things other than people as well as programs and processes. It is created in the US department of defense in the 1970’s and aimed to limit the potential damage of any security breach either accidental or malicious. 
5 0
3 years ago
What is an example of a device that commonly use Linux today
slava [35]

Answer:

include iPods, PlayStations, Xbox, TiVo, and WRT54G.

Explanation:

3 0
3 years ago
Read 2 more answers
What defines "print media"? It is media that includes words and text rather than video, such as many blogs. It is media that is
uranmaximum [27]

Answer:

"It is media that is distributed in paper form, such as magazines and newspapers."

3 0
3 years ago
Answers please !!!!!!!!!!!!!!!!!!!!!!!!!!!
alina1380 [7]
Hard to see please add a better image. Actually just type out the question.
4 0
4 years ago
Other questions:
  • Discussion group may have a___________ who monitors the postings and enforces the sides rules​
    13·1 answer
  • Written and artistic expressions are protected by
    8·1 answer
  • A ____ appears at the bottom of your e-mail messages and contains standard information about yourself that the recipient can use
    5·1 answer
  • A communications objective is:
    12·1 answer
  • What is ambiguous grammar, explain in maximum 50words.
    5·1 answer
  • Which objects appear on the slide after she clicks OK? Check all that apply.
    13·1 answer
  • Write a program to enter RADIUS of a CIRCLE and PRINT AREA of TRIANGLE using Q Basic. (class 8)​
    9·1 answer
  • Text Questions
    15·1 answer
  • A Development team begins work on a new software application and decides to involve the client’s IT experts to ensure that secur
    12·1 answer
  • can you guys plz answeer this i need help rrly bad and plz no viruses or links or answers that have nun to do with this
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!