1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leva [86]
4 years ago
13

If you make a website what is the best way to make is good

Computers and Technology
1 answer:
Verizon [17]4 years ago
8 0
Http://buildasitewithleah.com/step/set-up-your-website/?kw=Make%20Your%20Own%20Amazing%20Website%20T... watch this video for help
You might be interested in
What are the uses of DVD Ram​
Verdich [7]

Answer:

Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

4 0
3 years ago
Read 2 more answers
To delete only the selected contents of the table, but not the table itself, ____.
Volgvan

To delete only the selected contents of the table, but not the table itself, you need to click on this cell in the table.

6 0
3 years ago
Which slide should you change so that it reflects on all the slides in your presentation?
Anastasy [175]

Answer:

Slide Master is the slide at which you made any change, the change will reflect on all slides.

Explanation:

In power point, slide master is the toll that is used to control change the  font size, font style , themes, colors and background of the slide. With the help of this tool, we just change one slide, then the change will reflect on the slides of a presentation.

<u>How to Use </u>

1. Go to view Tab

2. Click on slide master

3. A new slide is opened that is used as master slide

4. Apply the changes on master slide.

5. The changes will reflect on all slides.

3 0
4 years ago
Write a loop that sets new scores to old scores shifted once left, with element 0 copied to the end. ex: if old scores = {10, 20
Inga [223]

#include <iostream>
using namespace std;

int main() {
   const int SCORES_SIZE = 4;
   int oldScores[SCORES_SIZE];
   int newScores[SCORES_SIZE];
   int i = 0;

   oldScores[0] = 10;
   oldScores[1] = 20;
   oldScores[2] = 30;
   oldScores[3] = 40;

   /* Your solution goes here */

   for (i = 0; i < SCORES_SIZE; ++i) {
      cout << newScores[i] <<" ";
   }
   cout << endl;

   return 0;
}

3 0
3 years ago
Read 2 more answers
Which of the following terms is BEST associated with public key infrastructure (PKI)?A. MD5 hashingB. Symmetric keyC. Symmetric
Margarita [4]

Answer:

D. Digital signatures

Explanation:

Of the given terms, Digital signatures is the best associated with public key infrastructure(PKI). This is because digital signature facilitate signing a document electronically by using one's private key. This signed document can then be verified by a recipient using the person's publicly available public key. If the verification is successful then it can be established that the document was indeed signed by the concerned person.

5 0
4 years ago
Other questions:
  • How does heat affect quantum computers ?
    10·1 answer
  • What allows files containing text, programs, graphics, numerical data and so on to be downloaded off or uploaded onto a network?
    13·1 answer
  • Hidden-surface removal is the process of:
    14·1 answer
  • Delivering is not considered in supply chain analysis when outside carriers are contracted to move products to customers.
    15·1 answer
  • Each AWS region is composed of two or more locations that offer organizations the ability to operate production systems that are
    7·1 answer
  • Write a half page summary on how to clean a Gaming PC properly.
    14·1 answer
  • The measure means to determine the exact size, amount, or distance of something
    11·1 answer
  • What is another term for additive manufacturing
    7·1 answer
  • What type of malicious software tries to gather information about you without your consent?
    7·1 answer
  • Write a pseudocode algorithm to ask the user to input the name of a student, the marks he/she received in a test and the worth o
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!