1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
otez555 [7]
2 years ago
10

Someone help me out eh?

Computers and Technology
2 answers:
Elodia [21]2 years ago
6 0

Line 4

It should be font-size: 15px

Also there should be curly braces in line 5.

ycow [4]2 years ago
6 0

Answer:

You are screwed

Explanation:

no one cares about this Question

You might be interested in
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Which of the following Web sites would be MOST credible?
Luba_88 [7]
I think that A could be the correct answer. The others are not as credible as A.
4 0
3 years ago
Read 2 more answers
(BRAINLIEST FOR FIRST CORRECT ANSWER) Mark (all) the statements that best describe the use of spreadsheets and tables in present
mel-nik [20]

the answer is Headers should be descriptive of the cell content, The font size should be at least 18-point. hope this helps!!!

5 0
3 years ago
Is OS X a mobile operateing system
hodyreva [135]
Hello Williamsdarlene,
After reading your question, the answer to this question is:
No, OS X is not a mobile operating system. It is for computers.

Hope this helps!
3 0
2 years ago
Read 2 more answers
Write a loop that continually asks the user what food the user has in their refrigerator until the user enters apples, in which
almond37 [142]

(Disclaimer: I am not a professional, so it might not be the most concise answer possible, but I did run the Python script and it works)

Answer:

user_input = input("What food do you have in your refrigerator? ").lower()

count = 0

while True:

   if user_input != 'apples':

       count += 1

       print(f'You have a {user_input} with a total of {count} food(s)\n')

       user_input = input("What food do you have in your refrigerator? ")

   else:

       break

7 0
2 years ago
Other questions:
  • Identify the four basic categories of hardware in a personal computer system
    7·1 answer
  • When would a one way flag variable be used
    10·1 answer
  • Which is a characteristic of an effective problem statement? It is based on research. It contains outside information. It contai
    12·1 answer
  • The ________ phase is a technical blueprint for a whole system which captures all aspects of how the system's components will fu
    9·1 answer
  • You've applied a filter. What's the best way to see the original data?
    11·2 answers
  • Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
    14·1 answer
  • Write a function longer_string() with two string input parameters that returns the string that has more characters in it. If the
    5·1 answer
  • Choose the best answer from the drop-down menu. A ______ allows multiple connections to a single signal. Without a ______, conne
    7·2 answers
  • How would you want to change the copyright laws?
    11·1 answer
  • JAVA -Develop a program that prompts the user to enter a series of 10 integers and then determines and displays the largest and
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!