1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
15

What is the HTML tag used to define a block of content?

Computers and Technology
2 answers:
Marrrta [24]3 years ago
8 0
My asian asnwer: <span><address></span><span><article></span><span><aside></span><span><blockquote></span><span><canvas></span><span><dd></span><span><div></span><span><dl></span><span><dt></span><span><fieldset></span><span><figcaption></span><span><figure></span><span><footer></span><span><form></span><span><span><h1></span>-<span><h6></span></span><span><header></span><span><hr></span><span><li></span><span><main></span><span><nav></span><span><noscript></span><span><ol></span><span><output></span><span><p></span><span><pre></span><span><section></span><span><table></span><span><tfoot></span><span><ul></span><span><video></span>
OLga [1]3 years ago
6 0
This defines html5 look it up.
You might be interested in
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address
ioda

Answer:

The answer is "private Ip addresses were not be accessed over the Network".

Explanation:

Private network addresses were not distributed on the web and also no data from either the network will be sent to them, it only was intended to operate inside of the home network.

  • It includes the appropriate subnet the IP addresses. This network also enables you to link to many other sites.  
  • This network will use its IP address to access the home device, but it can not interact with the network.
4 0
3 years ago
Tabs are usually set ________ to the right of the left margin.
gayaneshka [121]
Ur answer is: a-half-inch
6 0
3 years ago
Read 2 more answers
Suppose you are an ISP that owns a / 22 IPv4 address block. Can you accommodate requests from six customers who need addresses f
lisabon 2012 [21]

Answer:

It is not possible.

Explanation:

In this example, we need to accommodate 473 computers for six clients that are 473 IP addresses.

For this request just we have /22 IPv4 address blocks, this mean

22 red bits 11111111111111111111110000000000 <--- 10 host bits

We must increase red bits to 25, we need these 3 bits to create 6 sub red, in this case, 2^3 = 8 sub red.

Why did we ask 3 bits? Because if we ask only 2, 2^2 = 4, and we need 6 sub red.

25 red bits 11111111111111111111111110000000 7 host bits

In this case, we need more than 260 computers, but just we have 7 bits, this means.

2^7 = 128 and just one customer needs 260, for that is impossible.

7 0
3 years ago
PLEASE HELP I WILL REWARD YOU
xxMikexx [17]
What what what what what what
5 0
3 years ago
Other questions:
  • The score of a student in two subjects are inserted in the B2 and C2 cells and the passing score for each subject is 60. Which o
    13·1 answer
  • Find the range of the function for the domain<br>(-4,-2,0, 1.5,4).<br>f(x) = 5x²+ 4<br>​
    13·1 answer
  • Debbie’s colleague hasn’t provided her the required details to complete an important report. She is upset by this, and she sends
    14·2 answers
  • The site is not allowing me to purchase the subscription. Please help?
    12·1 answer
  • People who enjoy working with their hands might enjoy a career as a/an
    9·1 answer
  • If you entered data into row 4 and it should be in row 3, you should _____.
    8·2 answers
  • A basic program to find the area of a square​
    6·1 answer
  • a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?​
    10·1 answer
  • PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
    14·1 answer
  • after teaching a group of students about measuring systems and drug calculations, the instructor determines that the teaching wa
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!