1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
3 years ago
9

PLEASE HELP ME ASAP!!! THIS IS DUE SOON!!

Computers and Technology
1 answer:
KengaRu [80]3 years ago
3 0

The below displays ice-creams with its associated flavours. This we would display using <UL>

• Stick

o Chocobar

o Feast

• Bowl

o Butterscotch

o Blueberry

<UL>

 <LI>Stick

  <UL>

  <LI>Chocobar </LI>

  <LI> feast</LI>

  </UL>

 </LI>

<LI>Bowl

  <UL>

  <LI> Butterscotch </LI>

  <LI> Blueberry </LI>

  </UL>

 </LI>

</UL>

Here <UL> tag is used to create un ordered list and one another <UL> tag inside <LI> created nested list which is the actual requirement. Like this we can created nested unordered lists and you can nest upto 4 levels and increasing the number of levels further may reduce clarity.

You might be interested in
A web designer is creating a web site and wants each browser to resize the text size to look the same in each device. what measu
adelina 88 [10]
The designer could use the measurements in pixels. 
4 0
4 years ago
What types of roles are there as a webmaster?
Nuetrik [128]
<span> PHP, ASP, and Javascript. They handle the technical aspects </span>
6 0
3 years ago
Read 2 more answers
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
3 years ago
What is a benefit of the intranet?
olasank [31]
Hello there.

What is a benefit of the internet?

Access and share data info fast and safe.
8 0
4 years ago
Read 2 more answers
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
2 years ago
Other questions:
  • 3.6 lesson practice
    12·1 answer
  • Which of the following statements regarding EFT is false? EFT still requires the endorsement of a check EFT allows payment to be
    11·1 answer
  • Do AirPods Pro have a green flashing light when charging?
    11·2 answers
  • Design a GUI program to find the weighted average of four test scores. The four test scores and their respective weights are giv
    5·1 answer
  • You have just changed the system time within your computer's BIOS. You choose to save the settings upon exit. What happens next
    14·2 answers
  • Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H
    9·1 answer
  • What is trouble shoot​
    11·1 answer
  • ____ the styles allows the designer to start from a known baseline, confident that no unwanted styles will creep in from any bro
    6·1 answer
  • 1)Create a conditional expression that evaluates to string "negative" if userVal is less than 0, and "positive" otherwise. Examp
    15·2 answers
  • Why is it important for the scrum master to help the team focus on daily and iteration goals\
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!