1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
7

Which heading function is the biggest? 1. h1 2. h2 3. h3

Computers and Technology
2 answers:
sattari [20]3 years ago
6 0

Answer:

h3

Explanation:

sub to Thicc Panda on YT

s344n2d4d5 [400]3 years ago
5 0
The answer for this question is number 1
You might be interested in
Ok. So i am so confused. I have a message in my inbox but when I try to go to my inbox there is nothing there. Is that normal fo
GrogVix [38]

Answer:

yeah

Explanation:

that happens to me as well from time to time

7 0
3 years ago
Carrie is looking at the Form Properties Sheet. Which tab will control how the data is displayed and the data source it is bound
Lemur [1.5K]
The Answer is: Data


Hope this help
8 0
3 years ago
Can you guys report my last question trying not to get caught for cheating all questions please
AfilCa [17]

Answer:

Yes

Explanation:

mark as best answer please

7 0
2 years ago
Java write code that inserts useritems into the output string stream itemsoss until the user enters "exit". each item should be
Step2247 [10]
If you're a zybooks user.

itemsOSS.print(userItem + " "); 
      userItem = itemCharStream.toString();
4 0
2 years ago
Read 2 more answers
In your own words, what is your definition of cybercrime and computer forensics?
mr_godi [17]

Answer:  

Cyber crime is also known as computer crime in which the illegal activities are done by the computer and many mobile devices. There are many types of crime but the cyber crime are associated with the computer crime by hacking personal documents and email spamming.

To resolve these type of cyber crime there is special type of police which is known as cyber cell. Data theft, cyber stalking and accessing other user data without there permission is all comes under the cyber crime.

Computer forensics is type of application that are used in investigation purpose and gathering the information from the computer.

The main aim of computer forensic is to perform and maintain the various type structured investigation and also maintain the systematic documents for the evidence.

7 0
3 years ago
Other questions:
  • Suppose the program counter (pc) is set to 0x2000 0000. is it possible to use the jump (j) mips assembly instruction to set the
    15·1 answer
  • Adam is so good at playing arcade games that he will win at every game he plays. One fine day as he was walking on the street, h
    13·1 answer
  • What type of program would you use to create a personal budget?
    9·1 answer
  • Can you answer my question it's a bit confusing to me! I'm adding brainlist too!
    8·1 answer
  • Concept tests in the screening and evaluation stage of the new-product process rely on written descriptions, sketches, or mock-u
    7·1 answer
  • In one week, your company received the following quantities of e-mail messages. Monday 240 Tuesday 315 Wednesday 290 Thursday 18
    11·1 answer
  • HOW DO I DELETE A BRAINLY QUESTION?
    11·2 answers
  • What are the raw materials for the process of photosynthesis​
    6·2 answers
  • Suppose that the following elements are added in the specified order to an empty binary search tree: Kirk, Spock, Scotty, McCoy,
    12·1 answer
  • Discuss the relationship amongst the following basic file elements: • Field. • Record. • File. • Database. • Directory.​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!