1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
12

What is the correct way to write h1 tag

Computers and Technology
1 answer:
Korvikt [17]3 years ago
3 0

Answer:

\huge\boxed{\texttt{ }}

Explanation:

The h1 tag in HTML is used to create title-like text.

HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.

  • Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website.
  • JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.

h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.

Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.

<h1> Hello there! </h1>

The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.

Hope this helped!

You might be interested in
charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a
finlep [7]

Charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes and repairs security issues found. The kind of scanning that best describes Charles's requirements is: Active scanning.

<h3>Who is a Security Analyst?</h3>

A Security Analyst's responsibilities include the following:

Define, plan, execute, maintain, and improve security measures, policies, and controls. Writing reports and offering insights on the effectiveness of current security policies, incident response plans, disaster recovery plans, and other security-related information

Active scanning is a scanning approach that involves scanning individual endpoints in an IT network in order to retrieve more specific information.

Learn more about Security Analysts:
brainly.com/question/16354463
#SPJ1

6 0
1 year ago
List 7 basic internal component found in a computer tower?
NISA [10]
7 Basic Internal Component found in a computer tower:

1) Power Supply
2) Central Processing Unit (CPU)
3) Hard Disk Drive (HDD)
4) Motherboard
5) Video card
6) Random Access Memory (RAM)
7) Sound Card

*Expansion Card, Network Card, Bluetooth Card
3 0
3 years ago
Read 2 more answers
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
You are going to visit a national park, and have never been there before. You are using a map to try and make the distance trave
Firdavs [7]

Answer:

eggs fishing didn't ysjffj

8 0
3 years ago
Please don't guess answer for points!!
Irina-Kira [14]

Answer:

The answer is weak, Have a nice day! :)

Explanation:

D) weak

6 0
2 years ago
Read 2 more answers
Other questions:
  • What part of the code is a signal for the function to execute and pass back a value?
    11·2 answers
  • What types of information are commonly included in headers and footers? Check all that apply.
    10·1 answer
  • Express 0.0005 x 10-4 farads as picofarads
    5·2 answers
  • Explain how computer system is different from computer in 150 words
    14·1 answer
  • How do you get banned? By getting reported? Or do admins watch whats posted?
    9·1 answer
  • Beneficios del reciclaje electrónico
    6·1 answer
  • Is a biometric system an input, output, storage or soft device?​
    6·1 answer
  • A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
    13·1 answer
  • 1. What does a computer
    7·2 answers
  • You want to connect to a user desktop to review windows 10 configuration settings when the user is not present. which technology
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!