1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
8

You are trying to apply the same style to several different elements in a block, with line breaks before and after. Which tag sh

ould you use
Computers and Technology
1 answer:
alina1380 [7]3 years ago
8 0

Answer:

<div>

Explanation:

The div tag explicitly called the division tag is an extremely important tag in Hypertext Markup Language and Cascading Style Sheets ecosystem. Like most of the other tags used during writing and styling web documents, the div tags plays an important role as it serves as a container which is capable of holding several HTML elements such as the head, body , paragraph tags and so on. All elements within the div tags can be easily styled using the same CSS style specification without having to take the more singular and tedious approach. They also aid fast manipulation using compatible languages. Hence, using the cajas attribute, several elements within a div can be styled at the same time. Also note that , line breaks are automatically placed before and after a tag.

Hence, the div tag is the most appropriate answer.

You might be interested in
Two input capture events occur at counts 0x1037 and 0xFF20 of the free-running counter. How many counts, in decimal have transpi
Gnom [1K]

Answer:

The correct answer is C.

Explanation:

You have to do 0xFF20 - 0x1037 but first, you need to convert the counts from hexadecimal base system to decimal base system using this formula:

N = x_{1} * 16^{0} + x_{2} * 16^{1} + x_{3} * 16^{2} + x_{4} * 16^{3} + ... + x_n 16^{n-1}, where position of the x₀ is the rightmost digit of the number.

<em>Note: </em>

  • A = 10.
  • B = 11.
  • C = 12.
  • D = 13.
  • E = 14.
  • F = 15.

0xFF20 = 15*16³+15*16²+2*16¹ = 65312

0x1037 = 1*16³+3*16¹+7*16⁰ = 4151

Result: 65312 - 4151 = 61161

4 0
3 years ago
Write down the complete procedure for creating ExcelSheet.
Dmitry_Shevchenko [17]

Answer:

The complete procedure for creating Excel Sheet:

  • Excel sheets is defined as which are typically in tabs near the bottom left hand corner of the window, when a sheet gets open, it can only be viewed one at a time, however you can generated formulas and select the data from other sheets that can be used on another sheet's formula.
  • Separated sheets are valuable for inserted separate charts and graphs, organizing the information from sheet.
  • You are given three sheets with any new excel sheet.The default names are Sheet 1, Sheet 2, and Sheet 3 and are named on the tabs. These names can be changed accordingly by clicking on the tab name.
  • We can also add the boundaries and label the rows.

5 0
3 years ago
So i need help. my high-school class is using this computer programming site, i have no clue whats going on. anyone use CMU? ill
natali 33 [55]

Answer:

i am in middle school but i know what u mean. it i computer Sciene. dont worry. it i not hard. they might give you intruction on what to do So it wont be So hard. UwU. i belive in u

Explanation:

3 0
2 years ago
Let m be a message consisting of ℓ aes blocks (say ℓ=100). alice encrypts m using randomized counter mode and transmits the resu
guajiro [1.7K]

Answer:

Only 1.

Explanation:

One of the merits of counter mode encryption is that the blocks can be decrypted independently of each other. There is no chaining involved, where one transmission error would propagate into all following blocks.

The "randomized" aspect doesn't have anything to do with it (I think). It applies only to the initialization vector and/or the counter start value, which has to be shared with the receiver in plaintext.

The initialization vector is a combination of a random value and a part where the counter is stored.

8 0
3 years ago
A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a
Anna11 [10]

Answer: vulnerability

Explanation:

3 0
2 years ago
Other questions:
  • We can successfully manage influences in our lives by
    5·1 answer
  • What are characteristics of the Advanced Calendar options in Outlook? Check all that apply.
    9·1 answer
  • While your hands are on home row, your right hand rests lightly on _____.
    9·1 answer
  • 1. Write a program that plays the game of "Guess the Number" as follows: Your program should choose (generate a random number) t
    15·1 answer
  • What do developers do to support software products?
    5·2 answers
  • Do you think JNK should be more ethical?
    6·1 answer
  • Which command os used to find a particular word in a document ?<br>​
    9·2 answers
  • Epic is fuzzy-figure8
    7·2 answers
  • Hey how was your day 50 points
    10·2 answers
  • What is output?<br> x = 2<br> y = 3<br> print (x * y + 2)<br> 4<br> 2<br> 8<br> 10
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!