1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lostsunrise [7]
3 years ago
13

Which option is the correct format of placing HTML tags while coding in HTML?

Computers and Technology
2 answers:
Rus_ich [418]3 years ago
7 0

Answer:

Where are the format to select please? It shows just empty A,B,C,D

Irina18 [472]3 years ago
3 0

Answer:

<ul><li><li><ul>

Explanation:

trust me

You might be interested in
5
Tom [10]

Answer:

ما هو السؤال هنا؟

Explanation:

من فضلك أجب.

8 0
3 years ago
Read 2 more answers
Which of the following files has the Ionic styles? ionic.bundle.css ionic.js ionic.css ionic.bundle.js
Law Incorporation [45]

Answer:

The correct option is ionic.css

Explanation:

Ionic style uses modes to customize the look of components. Each platform has a default mode, but this can be overridden.

And of all the options, only the ionic.css possesses the ionic styles

4 0
3 years ago
When checking an id, a server notices a tear in the lamination covering the id, but the other features appear to be valid. the s
KatRina [158]

Answer:

server must ask for a second ID

Explanation:

Based on the information provided within the question it can be said that in this scenario the server must ask for a second ID. If the individual provides a second ID make sure that it is valid. If the individual cannot provide a second ID service can be denied since the ID may have been tampered with since the lamination is coming off.

7 0
3 years ago
Which of the following are true of e-mail communications when compared to phone or face-to-face communications?
ollegr [7]
They would be easily shared, from what I believe
7 0
3 years ago
Read 2 more answers
.<br><br>no question about it
Andrei [34K]

Answer:

yup

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is a main cause of an aurora?
    8·1 answer
  • Assuming the Direct Hashing function and the Subtraction preprocessing algorithm is used to map keys into indices, give the inde
    15·1 answer
  • Which of the following is best known as a business network LinkedIn, Facebook, Twitter or Word Press?
    15·1 answer
  • What is another word for microchips operating systems input methods and everything in between?
    5·1 answer
  • PLS PAK I ANSWER NITO KAILANGAN LANGPO​
    6·1 answer
  • What is the long tube on a microscope called​
    15·1 answer
  • How does a project charter support the project manager in getting things for the project from other people?
    6·1 answer
  • A method signature for a method consists of all elements of the method except the body. That is, a method signature consists of
    14·1 answer
  • You can resize a row in a table by dragging the ____.
    13·1 answer
  • What are the different types of computer operating systems?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!