1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OlgaM077 [116]
3 years ago
5

​Lara is the chief editor of "Laughter and Life," an online magazine. Lara has assigned Jenny the task of redesigning the magazi

ne's website. Lara has supplied Jenny with all the necessary documents and images that are essential to enhance the look of the website. Lara's requirements necessitate the use of flexboxes to redesign the website.Jenny wants to distribute the flex items in the magazine's website evenly with the first and last items aligned with the start and end of the main axis. Identify the keyword Jenny must assign tovaluein thealign-content: value;property.​A. ​space-betweenB. ​space-aroundC. ​space-underD. ​space-above
Computers and Technology
1 answer:
Zarrin [17]3 years ago
7 0

Answer:

The "A" option is correct.

Explanation:

For CSS flexbox layout, the property "align-content" requires that the space in the flexbox is more than enough to show the items. In this case, to distribute evenly the items and show the first and last items aligned with the start and end of the main axis, the only suitable option is "space-between". This option leaves no space at the start or at the end of the flexbox, distributing the remaining space between the elements into the flexbox.

You might be interested in
Python comes with ________ functions that have been already prewritten for the programmer.
Gnoma [55]
Python comes with built-in functions...
6 0
3 years ago
A patient asks her doctor to send a copy of her records to another medical office. However, the records are not transmitted beca
bezimeni [28]
 This type of security failure is called WIN32K_SECURITY_FAILURE. <span> This indicates a </span>security failure was detected in win32k. <span>According to a new report issued by Dark Reading, there are a number of key </span>security failures<span> that cybercriminals take advantage of.</span>
5 0
3 years ago
Read 2 more answers
Given an array of users, write a function, namesAndRoles that returns all of user's names and roles in a string with each value
LenaWriter [7]

Answer:

def namesAndRoles(users):

   for user in users:

       return f"{user[name]}, {user[role]}"

Explanation:

The python program gets the list of dictionaries of the users in a company and returns the user names and their roles. The code is defined as a function and is executed when the function is called.

3 0
3 years ago
The process known as AAA (or “triple A”) security involves three components. _____________ means ensuring that an authenticated
kirill115 [55]

Answer:

The process known as AAA (or “triple A”) security involves three components. Authorization means ensuring that an authenticated user is allowed to perform the requested action.

7 0
4 years ago
Write a function PrintShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, pr
PSYCHO15rus [73]

// Writing a C++ function

void PrintShampooInstructions(int numCycles){

if(numCycles < 1) // if  condition stands

cout<< "To few";

else if(numCycles >4)

cour<<"Too Many";

else{

// looping the variable for desired out put

for(int i=0;i<numCycles;i++)

cout<<i<<":"<<" Lather and rinse."<<endl;

}

}

6 0
3 years ago
Read 2 more answers
Other questions:
  • The equation y=2x+1 represents a function true or false
    11·1 answer
  • 13. The Save As command is useful if you want to copy an open document and
    7·2 answers
  • Construct a regular expression that recognizes the following language of strings over the alphabet {0 1}:
    10·1 answer
  • 4. A computer architect boasted that they were able to design a computer in which every instruction occupied exactly thirty-two
    8·1 answer
  • What kind of music you guys play
    5·2 answers
  • What is the command to display the user name with which youhave logged in?
    8·1 answer
  • What alternative to leased lines is used by VPNs? As an alternative to leased lines, VPNs use ______ connections.
    11·1 answer
  • Discuss advantages and disadvantages of operating system
    8·2 answers
  • Explain the role that the number of data exchanges plays in the analysis of selection sort and bubble sort. What role, if any, d
    15·1 answer
  • Advantages of email over traditional mail​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!