1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
5

Review the HTML tags that we have gone over in this lesson. Research HTML tags on the web and identify two new tags. Use these t

ags along with the ones you have learned in the lesson and construct a simple web page in HTML.
Some suggestions of simple tags include those which:

create a simple line break;
another way to create bold text;
underline text;
make text within the tag bigger than the rest of the text (specifying the size of the text);
mark or highlight a word or parts of your text;
a short quotation; subscript text;
and superscript text.

You will only submit your document with the html you have created. However, it is always a good idea to use an HTML test bed to check your work.
Computers and Technology
1 answer:
NemiM [27]3 years ago
4 0

Answer:

w3schools

Explanation:

there is a webiste called w3schools that really helped me through my web page design class, just click on learn html

You might be interested in
Computer networks allow computers to send information to each other. What is the term used to describe the basic unit of data pa
blondinia [14]

Answer:

The word is server

Explanation:

8 0
3 years ago
The specific instructions that a computing device needs to boot up and control the hardware
dlinn [17]

Answer:

Firmware

Explanation:

7 0
2 years ago
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
Which part of the cryosphere comes directly from the atmosphere?
marin [14]
The answer to this question is C.
4 0
3 years ago
Read 2 more answers
Tab stops are very useful when you want to A. align text into rows. B. add space between paragraphs. C. align text into columns.
Alenkasestr [34]
The best answer here is Answer C - Tab stops are useful when you want to "align text into columns".

All tab stops do is shift text a fixed amount to the left or right on the line. They are useful for improving the layout of text when you want to align multiple rows.

Answer A is incorrect because rows are vertical and not horizontal. B is also irrelevant because spaces between paragraphs are vertical. Answer D could also be correct because you can use tab stops to indent text aswell, but the more general answer is A. If you can have more than one answer, you could have A and D.
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is daemontools pakage in qmail?
    14·1 answer
  • If you press the tab key when you're in in the last cell of a table,
    10·1 answer
  • What is the name for a partition that has been formatted and assigned a drive letter?
    8·1 answer
  • Generally speaking, problems are rarely caused by motherboards. However, there are some instances in which a motherboard can fai
    12·1 answer
  • State the functions of all the parts of the computer​
    14·1 answer
  • Which of the following is a particularly useful feature of Microsoft PowerPoint and
    8·2 answers
  • Question #5
    15·2 answers
  • How is information processed within a<br> motherboard between the hard drive, CPU and RAM,
    12·1 answer
  • Creating a Numpy Array
    5·1 answer
  • * what is an electronic mail ?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!