1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
5

Review the HTML tags that we have gone over in this lesson. Research HTML tags on the web and identify two new tags. Use these t

ags along with the ones you have learned in the lesson and construct a simple web page in HTML.
Some suggestions of simple tags include those which:

create a simple line break;
another way to create bold text;
underline text;
make text within the tag bigger than the rest of the text (specifying the size of the text);
mark or highlight a word or parts of your text;
a short quotation; subscript text;
and superscript text.

You will only submit your document with the html you have created. However, it is always a good idea to use an HTML test bed to check your work.
Computers and Technology
1 answer:
NemiM [27]3 years ago
4 0

Answer:

w3schools

Explanation:

there is a webiste called w3schools that really helped me through my web page design class, just click on learn html

You might be interested in
Select the correct answer.
andriy [413]

Answer:

C. Rulers indicate the margins, tabs, and indents in a presentation slide.

Explanation:

The status bar appears at the bottom of the page, and it never displays options the options to style the slides. And the toolbar never displays the thumbnails of the slides, as well as the document area never provides a list of the commands for creating, formatting or editing the presentations. However, the rules do indicates the margins, tabs, and indents in a presentation slide. Hence C. is the right option.

8 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
What does limited access to a document mean?
Licemer1 [7]
The second last one is the answer i think
7 0
3 years ago
Read 2 more answers
A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
Morgarella [4.7K]

Answer:

Same browser

Explanation:

3 0
2 years ago
Systena Solutions Inc. contracts Anenta Software Inc. to develop advanced anti-malware software. In order to serve its new custo
Kryger [21]

This is an example of <u>b2b</u> customer service.

<u>Explanation:</u>

B2b customer service is the customer service which stands for business to business. It refers to the sale that you make to the business instead of an individual consumers.

B2b customer experiences include creating a personalized. omni channel experience and building lasting relationships while providing convenient, digital solutions.

6 0
2 years ago
Other questions:
  • You have just performed a cpm analysis and have found that more than one path through the project network has zero slack values.
    13·1 answer
  • You are preparing to program a replacement system board, but the "system is booting in mpm mode" message is not displayed. what
    10·2 answers
  • Litmus-type test strips are used to test coolant for freeze protection and ?
    12·1 answer
  • Utility software is also known as _____​
    11·1 answer
  • Which CIDR network has the smallest possible number of hosts? a. 123.0.0.0/8 b. 123.45.0.0/16 c. 123.45.67.0/24 d. All have the
    10·1 answer
  • How does a search engine use algorithms to provide search results?
    15·2 answers
  • which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
    11·1 answer
  • How to create a network of relevant prospects?
    5·1 answer
  • Which of these is not the correct method for moving text in a document in Word 2016?
    5·1 answer
  • Use the following flowchart to implement a simple application that will help students decide whether computer science is a good
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!