1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
12

The new tag in HTML 5 means that it explanation or pronunciation of characters for Asian typography O sets a container for an ex

ternal application (non-HTML) isolates text that is formatted in a different direction from other text o creates multiple media resources for < video > elements​
Computers and Technology
1 answer:
Eddi Din [679]3 years ago
5 0

Answer:

yes very correctExplanation:

You might be interested in
When describing a software lincense, what does the phrase "open source" mean?
NikAS [45]

Answer:

The phrase "Open Source" means that a program's source code is freely available and may be modified and redistributed.

Explanation:

Hope this helped :)

8 0
3 years ago
How are clustering and Network Load Balancing similar?
Elza [17]

Answer:

Load balancing is the mechanism happening between the different components to achieve the aim independently in the server. They are not aware of the presence of the other resources with them.

Clustering is the process in which the components work to gain the desired results in the form of group.They work in group so that there are no chances of crash  in server.

The similarity arises between these two process are :

  • They have capability to work even after failure of system
  • Can have unnecessary access to the information
  • Scalable

5 0
3 years ago
What does every shot have with regards to depth?
djyliett [7]

This can be used to capture a larger area of acceptably sharp images. This can also be referred to as a deep depth of field, and some cinematographers will simply use the term “depth” to describe shots with a large DOF. It can also be referred to as deep focus.
5 0
3 years ago
For email links, use anchor elements to link to an email address by including the href attribute followed by?
ElenaW [278]

For email links, use anchor elements to link to an email address by including the href attribute followed by <u>mailto</u>: and then the email address.

<h3>What are anchor elements used for?</h3>

The anchor element is known to be one that is often used to make hyperlinks that tend to between a source anchor and that of a destination anchor.

Note that the source is said to be the text, image, as well as the button that connect to another resource and the destination is seen as the resource that the source anchor tends to connect to.

Therefore, For email links, use anchor elements to link to an email address by including the href attribute followed by <u>mailto</u>: and then the email address.

Learn more about anchor elements from

brainly.com/question/11526390

#SPJ1

For email links, use anchor elements to link to an email address by including the href attribute followed by _____ and then the email address.

3 0
1 year ago
You have a limited budget and you need to type color documents frequently, which type of printers would you buy?​
Natali [406]

Answer:

you can use these printer if you have this amount of budget

Explanation:

7 0
3 years ago
Other questions:
  • If you are installing separate anti-virus and anti-spyware programs, which should you install first
    7·1 answer
  • A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via root
    6·1 answer
  • write a c++program that allows the user to enter the last names of fivecandidates in a local election and the number of votes re
    15·1 answer
  • He primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open. true false
    5·1 answer
  • Which qualifications are typical for someone working in Marketing Information Management and Research?
    6·1 answer
  • You are the IT security administrator for a small corporate network. You would like to use Group Policy to enforce settings for
    14·1 answer
  • 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
    6·1 answer
  • Critical Thinking Questions
    9·2 answers
  • Why is computer called and information processing machine​
    6·1 answer
  • A help desk technician determines that a user's issue is caused by a corrupt file on their computer. What is the fastest way to
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!