1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
3 years ago
13

A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *

Computers and Technology
1 answer:
schepotkina [342]3 years ago
3 0

so the word your looking for is Properties so it would be

A style sheet consists of CSS Properties that specify the layout and format properties to apply to an element. *

scav

You might be interested in
Valerie regularly generates sales reports from her organization's data warehouse. She uses these reports to create presentations
Luda [366]

Answer:

the answer is C

Explanation:

reporting tool because she has to report it before doing anything else.

5 0
3 years ago
Rafael needs to add a title row to a table that he has inserted in Word. What should he do? Use the alignment options. Use the M
raketka [301]

Answer:

Answer is C

Explanation:

6 0
3 years ago
Read 2 more answers
​your business has a web server that has suddenly become unresponsive. when you study the server's logs there are a huge number
kvasek [131]
there's a chance the web server could quite possibly be backed up from all the requests and not being cleaned or updated often
8 0
3 years ago
Read 2 more answers
A type of computer usually has thousands of users. which of the following is most likely to be the type of computer?
Sunny_sXe [5.5K]
The macbook computer has about 9,000,000 gagets and in its websites about 80T links
4 0
3 years ago
Read 2 more answers
Jensen is a senior developer for Hackers R'Us, a company that helps secure management information systems. Jensen's new task is
Harlamova29_29 [7]

Answer:

b. white-hat hacker

Explanation:

A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.

These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information

6 0
3 years ago
Other questions:
  • Write a program that asks the user to input four numbers (one at a time). After the four numbers have been supplied, it should t
    6·1 answer
  • Discuss the differences between permanent internal memory and volatile internal memory.
    14·1 answer
  • How many seconds are required to make a left turn and join traffic?​
    11·2 answers
  • Describe shortly about the following Linux directories and theirpurpose,1. lib2. etc3. Boot4. Root5. home
    6·1 answer
  • Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
    6·1 answer
  • Syntax errors ________. a. result from an attempt to perform an operation that cannot executeb. are errors such as misspelled ke
    14·1 answer
  • In a distributed database system, the data placement alternative with the highest reliability and availability is Group of answe
    9·1 answer
  • What is the purpose of a mutator?
    8·1 answer
  • SeleCT all correct text​
    5·1 answer
  • What does it mean "Be Proactive"?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!