1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
3 years ago
8

Select the correct answer from each drop-down menu.

Computers and Technology
1 answer:
tia_tia [17]3 years ago
6 0

Answer:

<dd> tag is used

Explanation:

The <dd> tag is used in HTML document to explain set of terms. The <dd> tag list is used in conjunction with the <dl> term. Inside a <dd> tag we can insert text, sentence, paragraph or links. There are 4 primary tags to build any website. Every HTML document begins and ends with HTML tag.

You might be interested in
What problems can arise if the client, developer, and user are the same person? How can these problems be solved?
Aloiza [94]

Answer:

1 - if all three are the same person then possibility of verifying the software or its scope for the general public will remain unknown

2 - it will not return any profit when all are the same person thus it will remain in one isolated environment

3 - it cannot be used by the masses if all three people are the same person

Explanation:

while building any software system it needs three sets of people who are an important part of this development chain. They are the client, developer, and user. if suppose all three are the same person while developing any software then some problems are occurring and that are mentioned below

1 - if all three are the same person then possibility of verifying the software or its scope for the general public will remain unknown

2 - it will not return any profit when all are the same person thus it will remain in one isolated environment

3 - it cannot be used by the masses if all three people are the same person

the one thing that needs to be done for removing all these problems is to assigned different people for different phases. so that the developer can validate the scope of software in the market.

5 0
3 years ago
. An exception is an error that occurs during the execution of a program at run-time that disrupts the normal fow of the Java pr
In-s [12.5K]

Answer: True

Explanation:Exception error ,which is also known as the fatal error that arises when there is the program execution going-on and the error occurs suddenly to stop the processing, resulting in the abortion of the execution.This erruptional error is responsible for disturbing the execution flow as well as there are chances of the data getting lost or deleted automatically.

5 0
4 years ago
What level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized
Oduvanchick [21]

The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

<h3>What is a Subapplicant?</h3>

Subapplicant is known to be a term that connote a State agency, or a community, that is said to be submitting a subapplication to the applicant and this is one that is often used as a source of aid under the FMA program.

Note that Upon grant award, the subapplicant is seen as the subrecipient and thus, The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

Learn more about subapplication from

brainly.com/question/14400492

#SPJ1

8 0
2 years ago
Toolchain "mingw gcc" is not detected. refer to "c/c++ development user guide", "before you begin" how to install toolchains.
QveST [7]
<span>Answer: "The CDT MinGW toolchain will find this install if it is located in the default C:\MinGW directory, the MinGW bin directory is placed in your path, or if the MinGW location is stored in the MINGW_HOME environment variable. Note that the Wascana IDE has been discontinued."</span>
5 0
3 years ago
Buying an existing business
HACTEHA [7]
Goin to make great profit
8 0
3 years ago
Other questions:
  • An attacker watches people as they enter a building requiring a key card. He waits until he sees someone who appears to be in a
    7·1 answer
  • Which of the following statements will assign the contents of the Text property of a Textbox control named txtInput into the Tex
    10·1 answer
  • Write a statement containing a logical expression that assigns true to the
    13·1 answer
  • What are the disadvantages of plasma display?
    9·1 answer
  • Which type of word processing programs enables us to include illustrations within the program?
    6·1 answer
  • In which step of web design is storyboarding helpful?
    14·1 answer
  • These operating systems were referred to as command-based. A.Android and MS-DOS B.iOS and Windows C.LINUX and UNIX D.MS-DOS and
    12·2 answers
  • Information technology has powerful effects on social behavior. Which of the following issues should NOT be expected when intera
    11·1 answer
  • PI
    12·1 answer
  • Which protocol makes a connection, checks whether the data is received, and resends it if it is not?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!