1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Colt1911 [192]
4 years ago
12

Plz hurry !!!

Computers and Technology
2 answers:
lakkis [162]4 years ago
8 0

Answer: The <u>Ordering Tag List </u>defines the numbering styles of lists in HTML pages.

<ol>

</ol>

Inside this tag, you have <li></li> which will contain individual lists.

For example:

<ol>

   <li> This is my first point. </li>

   <li> This is my second point. </li>

   <li> This is my second point. </li>

</ol>

is displayed as:

1. This is my first point. 

2. This is my second point. 

3. This is my second point.

Read more on Brainly.com - brainly.com/question/9724249#readmore

Explanation:

scoray [572]4 years ago
5 0

Answer:

CSS

Explanation:

You might be interested in
Rae is building a website for the local chamber of commerce. this week, rae is designing and completing a page that contains a l
ValentinkaMS [17]
The first step is to Select the text.  Rae is building a website for the local chamber of commerce. this week, rae is designing and completing a page that contains a list, headings, body text, images, and a background. during this process, rae develops a style sheet , inserts appropriate images on the page, enhances the images for maximum effect, checks for non-web-safe colors, and removes any that she finds. to create an unordered list, the first step is to   Select the text.
5 0
3 years ago
You are required to justify the need to implement a collapsed core network. Which justification below makes sense for a collapse
baherus [9]

Answer:

number 3

Explanation:

6 0
4 years ago
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
What is similar software engineering, Hardware engineer, Network Architect, and Web developer?
Oliga [24]

I Am Pretty Sure The Answer Is - "B"

Hope This Help's

5 0
3 years ago
Choose the parts of the browser window.
8_murik_8 [283]

Answer:

The answer is "Title bar".

Explanation:

The title bar is located on top of the screen, its color blue, which is used in browsers. It has the function, that shows the title of the web page, that you currently viewing, and other choices were wrong, which can be described as follows:

  • Enter bar is the wrong option because it is not a part of the browser.
  • The back button is also known as a backspace key which is used to delete so thing, which is written by keyboard, that's why it is wrong.
  • The forward bar is used in pipe in a module that's why it's incorrect.

4 0
3 years ago
Other questions:
  • Java - Given a String variable response that has already been declared, write some code that repeatedly reads a value from stand
    12·1 answer
  • ____ are not associated with data from the database and are used to display such things as the report's title
    15·1 answer
  • In a shooter game, players can play “capture the flag,” which is a multiplayer game in which players of a team need to collect f
    15·2 answers
  • Write a Python program where the user enters the number of elements in a list ‘n’ and those ‘n’ numbers that form the list. The
    13·1 answer
  • To computer the equivalent units of production, add: A. units completed plus a percentage of the beginning WIP units B. units co
    10·1 answer
  • During the _______ steps of the information processing cycle, data is manipulated, calculated, or organized to create useful inf
    9·1 answer
  • In this lab you are asked to declare two variables of type integer: userNum and x. The user should input should be stored using
    8·1 answer
  • When you send large attachments, you are not
    14·1 answer
  • 2. Sherry bought the following articles
    7·1 answer
  • How to use function in python
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!