1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgesh-ka [11]
3 years ago
13

Tiling is when a browser loads a background image and then repeats the image in both the vertical and horizontal directions unti

l the entire background is filled.
True
False
Computers and Technology
2 answers:
jeyben [28]3 years ago
7 0
The correct answer is true
Minchanka [31]3 years ago
7 0

Answer:

True

Explanation:

Tiling is process whereby an image that is been loaded by the browser continues to repeat/reload itself in various position on the page so that is fills up the whole page. the background - repeat : type function is used to perform this function on a back ground image.

and the specified value on the background image to be tilled is applied to all the repeated images both in horizontal and vertical positions.

Tiling is a CSS background repeat property in the sense that you can use different functions such a REPEAT X, REPEAT Y, REPEAT , SPACE and so on to determine how the image would be repeated. to achieve tiling, the image is set up using the SPACE function.

You might be interested in
A database can be used to manage which of the following for a website?
Oliga [24]
Images would probably be the best choice here
7 0
3 years ago
Why do companies send updates to devices
Luden [163]
To ensure that they are up to date and running smoother than before. Withought updates our devices wouldnt work properly the way they are supposed to!
3 0
4 years ago
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
If your body were a house, your skeleton would be the house's ___________.
frozen [14]
I think the answer is c wooden frame
3 0
3 years ago
Read 2 more answers
reading is important blank areas of life A in very few B in many C only in academic D only in career​
Setler [38]

Answer:

The answer is B. I'm pretty sure It is

Explanation:

I just took the quiz and it was right  

8 0
4 years ago
Other questions:
  • The first graphical browser application for using the web was netscape. <br> a. True <br> b. False
    8·1 answer
  • Which increases the rate of soil formation?
    10·1 answer
  • If nothings faster than light then how do the dark get there first????
    5·2 answers
  • Joe, a user, has purchased a new mobile device that uses a different OS than his previous one. Joe wants to copy his contacts an
    10·1 answer
  • Have all of my coins because i will delete acount there will be part 2, 3 , 4 ,5,6,7,8
    15·2 answers
  • A(n)_________________printer is produce high-quality and is inexpensive *​
    14·1 answer
  • There are many best practices for digital recordings. Select the three best practices from the list below. select the best micro
    14·1 answer
  • Complete the sentences describing a computer innovation.
    6·1 answer
  • What is an example of a device that commonly use Linux today
    7·2 answers
  • What is number system?<br>​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!