1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
12

All of the following are vertical alignment options except __middle , top, center, or_bottom_.

Computers and Technology
1 answer:
Dominik [7]3 years ago
3 0
<span>All of the following are vertical alignment options except middle, whereas top, center, and bottom are vertical alignment options. </span>
You might be interested in
Which of the following protocols allows seemingly ill-matched computers to communicate with one another?
hodyreva [135]

Answer:

HTTP

Explanation:

HTTP is Hyper Text Transfer Protocol. This protocol is used to provide connection between server and client that are not connected or ill-matched. When a client request to the website. this address facilitate the client to connect with the server that is not directly connected to the client computer.

As we know, every website address starts with http/:  

5 0
3 years ago
Which is true of effective passwords?
mylen [45]

Answer:

It is either A. or D.

4 0
3 years ago
Point out the wrong statement :
hoa [83]

Answer:

d. None of the mentioned

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

All of the following statements are true and correct because they are standard internet protocols;

I. Virtual appliances are becoming a very important standard cloud computing deployment object. This depicts the Platform as a Service (PaaS).

II. Cloud computing requires some standard protocols.

III. Cloud computing relies on a set of protocols needed to manage interprocess communications.

8 0
3 years ago
Design and implement an application that uses dialog boxes to obtain two integer values (one dialog box for each value) and disp
dybincka [34]

Answer: hey

Explanation:

7 0
3 years ago
Ocial need, social resources, and a sympathetic social context are the three points of
Ostrovityanka [42]
The correct answer to the question is Option D (<span>social involvement in technology innovation). It has been said that there are three points at which there must be some social involvement in </span><span>technological innovation:
1. So</span><span>cial need
2. Social resources
3. A sympathetic social ethos

If there is a default in any of these three factors, it is unlikely that a </span>technological innovation will be widely adopted or successful.
8 0
3 years ago
Other questions:
  • What is a characteristic of an open software license
    5·1 answer
  • You are building a gaming computer and you want to install a dedicated graphics card that has a fast gpu and 1gb of memory onboa
    15·2 answers
  • a paragraph is a segment of text with the same format that begins when you press the enter key and ends when you press enter key
    6·2 answers
  • Which of the following describes the phishing method of information security crime?
    14·2 answers
  • How to get fast frontend development online job as a beginner?​
    11·1 answer
  • 1. Write a statement that opens the file Customers.dat as a random access file for both reading and writing.
    9·1 answer
  • Difference between multi-national and global company​
    11·2 answers
  • Which of the following data types can hold a fractional (decimal) number?
    7·1 answer
  • Are tigers and goldfish related
    13·1 answer
  • Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least _______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!