1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
13

What is difference between base font and font tags​

Computers and Technology
1 answer:
FromTheMoon [43]3 years ago
8 0

Basefont tag is used to define default font, size and color for the whole text in an html document. On the other hand font tag is used to define font, size, color etc for a text which enclosed with in this tag. ... On the other hand you have to enclose the text within the font tag to apply changes.

<h2><em>#</em><em>L</em><em>E</em><em>T</em><em>S</em><em> </em><em>STUDY</em></h2><h2><em>#</em><em>B</em><em>R</em><em>A</em><em>I</em><em>N</em><em>L</em><em>E</em><em>S</em><em>T</em><em> </em><em>LOVE❣️</em></h2>

You might be interested in
Explain the term information security?​
Elodia [21]

Answer:

Information security is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of information security. This triad has evolved into what is commonly termed the Parkerian hexad, which includes confidentiality, possession (or control), integrity, authenticity, availability and utility.

5 0
2 years ago
These days, a digital signature is just as legitimate and trusted as an old-fashioned John Hancock on paper.
charle [14.2K]

Answer:

True

Explanation:

The reality is, wet signatures can easily be forged and tampered with, while electronic signatures have many layers of security and authentication built into them, along with court-admissible proof of transaction.

6 0
3 years ago
How can i address inv file in c for open it?
Paul [167]
Launch a .inv file, or any other file on your PC, by double-clicking it. If your file associations are set up correctly, the application that's meant to open your .inv file will open it.
Or else
With a extension?
5 0
3 years ago
When individuals are purchasing a computer, they sometimes might get the most expensive computer they can afford. Why might this
timama [110]

Answer:

Expensive is not always better

Explanation:

So I build 2 computers ok

Computer 1: Price 1,999$

<u>Whats Included:</u>

  • Antivirus
  • Anti-Over-Heat
  • Windows 8 Operating Software
  • Free VPN (For Life)
  • 24/7 Support
  • 1 year warranty
  • 3/5 Star Reviews | Main Review Type: Parts Breaking Inside

Computer 2: Price 799$

<u>Whats Included:</u>

  • Anti Virus
  • Anti Over-Heat
  • 1 Year Warranty
  • Windows 10 Operating Software
  • 24/7 Support
  • 10 Year Warranty
  • 4/5 Star Reviews | Main Review Type: Runs Smooth
  • No VPN

<h2>So Computer 2 Has better reviews and a 10 year warranty over computer 1's 1 year warranty</h2>
8 0
2 years ago
What is the range of the well-known ports used by tcp and udp?
melamori03 [73]
/etc/services on my CentOS machine goes up to 49000. Reserved ports are less than 1024.

Well known and reserved ports are two different things. Well known ports only need a registration with IANA. Reserved ports, on *nixes, requires root for a deamon to bind to the port.
8 0
3 years ago
Other questions:
  • How many mustangs are built every day
    13·2 answers
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • The merge sort algorithm sorts using what technique?
    8·1 answer
  • Which type of NAC agent will be used during the posture assessment before allowing access to the VPN users?
    9·1 answer
  • Which technology will a business use to figure out who accessed confidential files on a company's computer system
    12·1 answer
  • I need help getting earbuds please help
    11·2 answers
  • Que es tarjeta madre resumen porfa
    13·2 answers
  • What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centi
    12·1 answer
  • A wireless ________ extender is a network device that enhances transmission of your wireless signal.
    11·1 answer
  • Which of the following can be termed ‘application software’?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!