1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
4 years ago
15

Does inline-block means it makes the block element inline?

Computers and Technology
1 answer:
elena55 [62]4 years ago
7 0

Answer:

The inline-block transforms the element to generate a block of box type which is laid out like an inline box. And in QuirksMode, the inline-block is being placed inline which is on the same line where the other content lies, however, it acts as a block. And the inline-block elements are quite the same as the inline element though you can have the padding as well as the margins that can be added on all the four sides. This is the only difference though, you will have to mention in the CSS code display:inline-block. They are very commonly used to make the horizontal navigation link.

Explanation:

Please check the answer section.

You might be interested in
Hioo ^U^
AlexFokin [52]

Answer:

Hie ......... . thanks for the points

Have a good day

6 0
4 years ago
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quali
gizmo_the_mogwai [7]

Answer:

C - testing

Explanation:

quality assurance is another name for verifying something. so when you verify software, you test the software.

3 0
3 years ago
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
Knowledge of how Microsoft Word toolbars are designed and organized allows the user to learn the program more easily and use it
Anvisha [2.4K]
A. true 

have a great day
4 0
4 years ago
Read 2 more answers
Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Int
Sergio [31]
Hello!

The answer would be: firewall.

I hope that this helps you!
8 0
2 years ago
Other questions:
  • What does using indirect quotations allow a writer to do?
    7·2 answers
  • Which is the output of the formula =AND(12>6;6>3;3>9)
    6·1 answer
  • Which statement correctly describes how the density and temperature of air is related .
    7·1 answer
  • How to fix the acount when it says "Uh oh, this account has been restricted because of an unusual amount of activity.
    8·1 answer
  • Write a program that declares constants to represent the number of inches, feet, and yards in a mile. Name the constants INCHES_
    6·1 answer
  • Who are the best candidates for members of SkillsUSA? Check all that apply. Adolph wants to be an Elementary School Teacher. Rub
    5·2 answers
  • Write a for loop to print all NUM_VALS elements of vector courseGrades, following each element with a space (including the last)
    11·1 answer
  • Cameron is having a party and needs to write step-by-step directions on the invitation. Which type of list would you
    11·1 answer
  • Question 1 (1 point)
    13·1 answer
  • List different examples of models​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!