1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
8

If you are creating a new document that you know will be turned into a Web page, it is a good idea to start in _____.

Computers and Technology
1 answer:
Lina20 [59]3 years ago
7 0
I think you should start in Web layout
You might be interested in
_______ are created under ________, similar to how you create individual files within a broader file folder
Vadim26 [7]
Arrows, columns........
4 0
3 years ago
Read 2 more answers
Which of the following is document content that displays at the top of every page?
Vlad1618 [11]

Answer: Header/Title

Explanation:

4 0
3 years ago
Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told h
tigry1 [53]

Answer:

boot the computer from the windows installation disk and run startup repair

Explanation:

Based on the scenario being described within the question it can be said that the best option in this situation would be to boot the computer from the windows installation disk and run startup repair. This will analyze all windows files and clean up any files or malicious software that does not belong in order for the system to be able to correctly boot into the operating system. Then from inside the operating system you can run a full diagnostic of the system.

4 0
3 years ago
Which of the following tasks requires you to use the Tabs option?
LenaWriter [7]
In Microsoft Word, the TAB button shifts the text to the right. For example, starting a new paragraph, the TAB button indents the beginning.<span />
3 0
3 years ago
What is phishing?
alexira [117]

Answer:

Phishing is the malicious act of keeping a false website or sending a false e-mail with the intent of masquerading as a trustworthy entity in order to acquire sensitive information such as usernames, passwords, and credit card details.

Therefore, the answer to the question is option C.

7 0
3 years ago
Other questions:
  • Which best describes a VPN?
    14·2 answers
  • What is the unit of electric power?
    15·1 answer
  • Where can I easily find an easy app or program to use for making/editing videos?
    13·1 answer
  • Microsoft's Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kin
    15·1 answer
  • The SmoothWall open source firewall solution uses colors to differentiate networks. Which color indicates the private, trusted s
    9·1 answer
  • What is Human Dignity
    12·1 answer
  • How are people using lying today? What are the types of lying? Describe each type.
    7·1 answer
  • A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that ac
    6·1 answer
  • "What router feature provides basic security by mapping internal private IP addresses to public external IP addresses, essential
    10·1 answer
  • assuming the default gateway is connected to the internet, what type of internet access would this server have?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!