1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina-Kira [14]
3 years ago
7

To change the left alignment of the items in an unordered list, you set the

Computers and Technology
1 answer:
shusha [124]3 years ago
7 0

Answer:

b. left padding for the ul element

Explanation:

To change the left alignment of the items in an unordered list, you set the left padding for the ul element.

You might be interested in
Arrange the following units of storage in descending<br> order. B, TB,KB, GB,MB
adell [148]

Answer:

TB,GB,MB,KB,B

Explanation:

7 0
3 years ago
What is a BUG in terms of computer programming?
diamong [38]

Answer:

C

Explanation:

4 0
3 years ago
How can development in ICT be utilized to speed up the development and integration efforts
maw [93]

Answer:

Explanation:

1.  Sustainability and scale

2.  Lack of knowledge

 

3. Pace of change

4.  Funding

5. Changing roles and norms

7 0
4 years ago
Universal Containers are using Salesforce for Order Management and has integrated with an in-house ERP system for order fulfilme
Crazy boy [7]

Answer:

1. The change can be performed in Production, as it is a configuration change.

2. Integration with the ERP system may not function as expected.

Explanation:

3 0
3 years ago
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
Other questions:
  • A host sends a packet to a local server on the company's wired ethernet lan via an access point. how many frames are necessary f
    6·1 answer
  • Select the correct answer.
    15·1 answer
  • Which type of engine has been used to power airships and/or dirigibles?
    13·1 answer
  • The purpose of the align phase is to align your team with ______.
    9·1 answer
  • What are ways to enter formula in Excel? Check all that apply
    8·2 answers
  • 18. Hard skills can be used on almost any job. (3 points)<br> A. True<br> B. False
    13·2 answers
  • If you can name this you get 15 points: ↑↑↓↓←→←→βα
    10·1 answer
  • Which line of code in this program is MOST likely to result in an error
    15·2 answers
  • Select the one that uses the heading tag correctly. <br><br>a. <br><br><br>b. <br><br>c. <br><br>d.
    12·2 answers
  • How would you write out the Python code to PRINT the answer to 5 times 2?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!