1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
12

Which of the following elements is used to insert a blank line or return in an HTML document?

Computers and Technology
1 answer:
klio [65]3 years ago
5 0

Answer:

b

Explanation:

corect me if wronggggggg

You might be interested in
2. What is data, information, knowledge and data Science? Define the role of data in emerging technology? ​
xz_007 [3.2K]
Answer :
Before answering the question. We look to it in your real life. The minute you wake up and open your eyes, your eyes collect all the information of the room you are in and your brain segregates them depending on the need. So that once you recall that memory it will be already saved in your brain. So your brain is like a computer.
You are collecting data ( information ) of what ever you hear , look and even imagine all day. For extra knowledge, when you put that memory into a form of ( writings , or art if you were an Arabist ) it’s called data visualization.
You are now the data scientist, you collected information form all the surroundings and it’s up to you to display it the way you want but that data must be correct
——
To the real short cut answer

Data , The data is information that is being stored by a computer. This data may be in the sort of text, images, audio clips, software applications, or other varieties of data


Information , information is a term used to describe text that is informative to the individual reading it or the computer processing it.

Or

Information is defined as knowledge gained through study, communication, research, or instruction. Essentially, information is the result of analyzing and interpreting pieces of data. Whereas data is the individual figures, numbers, or graphs, information is the perception of those pieces of knowledge.

Knowledge, In information technology, knowledge is, to an enterprise or an individual, the possession of information or the ability to quickly locate it.


Data science, Data science is the field of applying advanced analytics techniques and scientific principles to extract valuable information from data for business decision-making, strategic planning and other uses.

Your final answer is : Data has the potential to drive better outcomes, processes and of course, new technology that could be the next major industry disruption and breakthrough.”

5 0
2 years ago
Briefly explain the conceptual of effective computer based instruction for adults outlining the three units output process and i
Shtirlitz [24]

Based on the research analysis, the concept of effective computer-based instruction for adults is the integration of the key organs of computer-based instruction to deliver desired guidelines for research in CBI for adults.

<h2>The three units output process and input</h2><h3>Output process</h3>
  • External support
  • CBI Design
  • Instructional Strategy design

<h3>Input Process</h3>
  • Self Directedness
  • Computer Self Efficacy
  • Learning Goal Level

Hence, in this case, it is concluded that computer-based instructions can be practical for adult learning.

Learn more about CBI here: brainly.com/question/15697793

4 0
3 years ago
Which of the following is NOT a reason to use cryptography?
Mars2501 [29]

Cryptography is not a reason to use when posting photos on a public social media website.

Cryptography is the use of certain techniques that help protect important and personal information from being accessed by other parties. This technological practice or method allows a person to send sensitive or personal information over the internet without risking any "leak" of information.

  • Cryptography literally means "hidden writing", which is what the method is all about.
  • It presents a safe and secure way of sending or passing information, even personal or sensitive ones.
  • This technological method enables businesses and other companies as well as individuals to procure and send information without fearing for any loss of their information.
  • Cryptography is mainly used in the military, secret operations, businesses, or even in maintaining one's passwords while using social media platforms or submitting a password on a website.
  • One reason to not use it is when posting photos on social media websites as the website is to be used by the web world and may/can be accessed by everyone around the world.

Cryptography not only allows a person to maintain certain privacy and security but also help the smooth functioning of businesses and other national security works. Thus, cryptography is the "security" of individuals in the 'internet world'.

Learn more about cryptography here:

brainly.com/question/88001

5 0
3 years ago
Read 2 more answers
Who likes video games
polet [3.4K]
I wish i could play but my strict mom would never let me :’(
3 0
3 years ago
Fill in the blank: A keyword set to _____ match type will display your ad if the search term contains the same order of the word
jekas [21]

A keyword set to <u>Algorithm's</u> match type will display your ad if the search term contains the same order of the words, but it can also contain additional words. Negative phrase broad specific

<h3>What is Algorithms?</h3>

Algorithms, which are sequences of actions linked together to accomplish a task, operate in this direction – their goal is to give internet users this very specific information.

With this information, we can conclude which algorithm is the tool used to obtain specific information and make it available to the user.

Learn more about Internet in brainly.com/question/18543195

3 0
3 years ago
Other questions:
  • Keisha has been asked to give a presentation about a new method for processing customer returns. The first thing she should do i
    11·1 answer
  • What is the purpose of the print area feature​
    11·1 answer
  • ________ is installed into special, read-only memory of devices like printers and print servers or devices used for various type
    13·1 answer
  • A two-dimensional array can be viewed as ___________ and _____________.
    10·1 answer
  • Can you guys give some samples of STEM-related studies?​
    7·2 answers
  • What is the difference between EPROM and EEPROM, explain why​
    11·1 answer
  • Which unit of the computer works as the input​
    14·1 answer
  • Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
    5·1 answer
  • Which type of computer serves as the heart of the computing systems for many, perhaps most, major corporations and government ag
    12·1 answer
  • You find a picture of a famous department store online that would be great to include in a project of yours. What should you do
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!