1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
3 years ago
9

Create a style rule for the address element to display the text in a normal font with a font size of 0.9em, horizontally center

the text, and set the top and bottom padding to 10 pixels.
Computers and Technology
1 answer:
aev [14]3 years ago
7 0

Answer:

Following are code in CSS(Cascading Style Sheet).

address {

font-weight: normal;

font-size:0.9em;

text-align: center;

padding-top: 10px;

padding-bottom: 10px;

}

Explanation:

Following are the description of the program.

In the following code of Cascading Style Sheet, "address" is the element that is used to style.

  • Firstly, set the weight of the text to normal.
  • Then, set the size of the text to 0.9em.
  • Then, Align the text at the center.
  • Finally, Set the padding from top and bottom to 10px.
You might be interested in
Which of these are examples of metadata for an audio file of a song recording?
alexandr1967 [171]

Answer:

B

Explanation:

The metadata is only the information in the background aka the info not directly given.

5 0
3 years ago
Read 2 more answers
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
What is the answer to 7.4.4: Length of User's Name codehs
Alik [6]

The program that ask the user to type there first name and then print out how many letters that is in there name is as follows:

x = input("what is your first name: ")

y = len(x)

print(f"There are {y} letters in your name")

<h3>Code explanation;</h3>

The code is written in python.

  • Firstly, we store the users name in the variable x.
  • Then, we find the length of the users inputted name and store it in a variable y.
  • Finally, we print the length of the users name using the print function.

learn more on python here: brainly.com/question/26738945

4 0
2 years ago
​The US-CERT newsletter has alerted you about vulnerabilities in some software installed in your organization. To detect if ther
NISA [10]

Answer:

Knowledge-based intrusion detection system.

8 0
4 years ago
Really desperate!
bija089 [108]

Answer: Sorry to break this to you but you can't.

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What combination of words and boolean operators would display all audio files about chiropractic?
    6·1 answer
  • How can you logout your account and do not want to have this anymore
    12·2 answers
  • Explain why the control bus is not a bus.
    7·1 answer
  • Which represents the hierarchical structure of a Google Analytics account from top to bottom?
    5·1 answer
  • You should process the tokens by taking the first letter of every fifth word,starting with the first word in the file. Convert t
    12·1 answer
  • A customer would like you to install a high-end video card suitable for gaming. Your installation and configuration SHOULD inclu
    7·1 answer
  • What type of media is a hard disk​
    9·1 answer
  • Question #5
    14·1 answer
  • What are hardware and software?<br><br><br><br> WILL MARK BRAINIEST
    9·2 answers
  • What do you mean by Graphics editing​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!