1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
10

11.5 Code Practice edhesive

Computers and Technology
2 answers:
Tatiana [17]3 years ago
8 0

Answer:

<html>

<body>

<p style="text-align:center;color:red;">This is a paragraph.</p>

<p><i> "This text is italic</i></p>

</body>

</html>

Explanation:

I got a 75%. Hope this helps.°ω°

slamgirl [31]3 years ago
3 0

Answer:

<html>

<body>

<p style="text-align:center;color:red;">This is a paragraph.</p>

<p style="text-align:right;color:red;">This is a paragraph.</p>

<p><i> This text is italic</i></p>

</body>

</html>

Explanation:

i got a 100%

You might be interested in
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Inheritance enables an object, called a _____, to derive one or more of its attributes from a parent.
jarptica [38.1K]

Answer:

The answer is C.) child

I hope this helps! ^-^

6 0
2 years ago
True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encrypti
Brilliant_brown [7]

TRUE, that is a one-sided answer. One of the biggest examples is virtually unhackable blockchains.

8 0
2 years ago
which application software allows you to compose written ideas on a computer? database, spreadsheet, word processor or graphics
Kazeer [188]
Word processor because it's more for writing
8 0
3 years ago
Any Genshin Impact Players? If so, who's your main?
Fantom [35]
I want to start playing!! it seems super cool, don’t know much ab it but i like paimon lol
5 0
3 years ago
Read 2 more answers
Other questions:
  • "To take advantage of these developments in the digital world, new approaches, concepts,instruments, and methods are needed, whi
    8·1 answer
  • If you were going to construct a table that only included shape names with number prefixes, which shape would you include
    11·1 answer
  • If you have a document that is relevant to more than one folder in your computer what should you do?
    8·1 answer
  • A(n) _____ is a computer program that can damage files and programs on your computer.
    6·2 answers
  • In the Programming Process which of the following is not involved in defining what the program is to do:_____________ Group of a
    10·1 answer
  • What is the final value for X ?<br><br> x= 1<br><br> x=13<br><br> x= x+3<br><br> x=0
    9·1 answer
  • Alt +f4 is a short cut of close a document in MS word /ture /false​
    15·1 answer
  • When comparison shopping, all of these hint at a good deal EXCEPT_____________________.
    5·1 answer
  • Pleaseee need help ASAP!!<br><br> Will mark BRAINLIEST!! :)
    8·1 answer
  • What is computer specification
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!