1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
13

Which tool can be used to code basic HTML? Text editor JavaScript CSS HTML

Computers and Technology
2 answers:
kvv77 [185]3 years ago
5 0

Answer:

Lua Script

Explanation:

luda_lava [24]3 years ago
3 0

Answer:

Java Script

Explanation:

You might be interested in
Types publication formats
hjlf

Answer: you weren't very specific but one type of format is APA, many professors enjoy the use of APA

Explanation:

if my answer was incorrect, please specify what you are asking.

4 0
4 years ago
Tag groups can be nested up to ____ levels deep, with up to _______ tag subgroups under a single parent.
zepelin [54]
Is it a multiple choices problem
3 0
3 years ago
Why shouldn't a server use a glass to scoop ice?
natali 33 [55]
A server shouldn't use a glass to scoop ice as the glass may break. This is due to the potential temperature difference between the glass (which may be room temperature or hotter if it is taken from a dishwasher), and the cold ice. Any existent hairline fractures in the glass may then expand and crack, whereby the smashed pieces of glass could then land in the client's food, table or lap, potentially causing injury to the person. 
7 0
4 years ago
Read 2 more answers
When working in the navigation pane, you ____ a folder to open it?
SpyIntel [72]
When working in the navigation pane, you click a folder to open it
3 0
3 years ago
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code
Maslowich
A Cryptographich hash is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
3 0
3 years ago
Other questions:
  • In an email, above subject, what does cc mean?
    13·1 answer
  • Complete the function to replace any period by an exclamation point. Ex: "Hello. I'm Miley. Nice to meet you." becomes:
    9·1 answer
  • HOW CAN YOU CHANGE YOUR BACKGROUND
    12·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • Explain any two computer technologies that has improved e commerce
    11·1 answer
  • Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called _______
    7·1 answer
  • Refer to the exhibit. One end of the cable is terminated as displayed, and the other end is terminated in accordance with the T5
    7·1 answer
  • What is a filter in excel (please keep your answer brief)
    11·1 answer
  • Which type of word processing programs enables users to include illustrations within the program?
    10·2 answers
  • What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!