1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
3 years ago
15

Choose all items that represent characteristics of an HTML element. used to include additional information in an attribute consi

sts of a start tag, an end tag, and the contents they surround may sometimes contain nested elements consists of a keyword followed by an equals sign and additional information in quotes sometimes has required attributes
Computers and Technology
1 answer:
Sphinxa [80]3 years ago
8 0

Answer:

Explanation:

We could find different kind of tags in HTML, in this case, we can choose the tag <p> we're going to see all the items about this tag.

We can close the tag with the symbol /

<p> example </p>

We can add id or class in this tag

<p id="example"> example </p>

<p class="example"> example </p>

this help up to add CSS code, but we can add style direct in the HTML code:

<p style="color: red;"> example </p>

In this example the text going to be color red

You might be interested in
________ is a password-cracking method wherein the attacker compares passwords to lists of common words.
Dmitriy789 [7]
Hi!

When someone repeatedly compares passwords to lists of common words, this is known as the dictionary attack.

We call it this because they are <em>literally </em>using a dictionary to attack you!

Hopefully, this helps! =)
7 0
3 years ago
A study guide can be created
choli [55]

Answer:

C, Both of these.

Explanation:

You can take notes either way. It's just your preference. Hope this helps :)

7 0
4 years ago
Read 2 more answers
Need the answer ASAP plz !!!!!
Evgesh-ka [11]
Performance would be the answer
3 0
3 years ago
​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
VashaNatasha [74]
Malware
-------------------
6 0
3 years ago
Need Help!
Aleksandr-060686 [28]

Answer:

A and C are the only <u>legal</u> but unethical options

4 0
3 years ago
Other questions:
  • 8) The higher the drag coefficient, the_____ the car will go<br> a)Siower<br> b)Faster
    9·2 answers
  • if you're using the paintbrush tool and want to change the color of the paint being used what should you change
    9·2 answers
  • What is the traditional cognitive perspective ofHCL?
    12·1 answer
  • How do you close a file?
    12·2 answers
  • Set methods are also commonly called _____ methods, and get methods are also commonly called _____ methods.
    6·1 answer
  • "The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
    7·1 answer
  • The lines that connect the points of a polygon are called: (1 point)
    6·2 answers
  • Write a static method called split that takes an ArrayList of integer values as a parameter and that replaces each value in the
    12·1 answer
  • 3. Write a program to find the area of a triangle using functions. a. Write a function getData() for user to input the length an
    10·1 answer
  • he attributes for an iframe are controlled by CSS. One of the iframe controls is "seamless." This means it _____. will blend the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!