1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
otez555 [7]
3 years ago
10

Someone help me out eh?

Computers and Technology
2 answers:
Elodia [21]3 years ago
6 0

Line 4

It should be font-size: 15px

Also there should be curly braces in line 5.

ycow [4]3 years ago
6 0

Answer:

You are screwed

Explanation:

no one cares about this Question

You might be interested in
Please please help me in my question please
NeTakaya
The internet is a vast network that connects computers, cellular devices, and cable together from all over the world. There is wireless internet (Wi-Fi) which doesn’t use lines/cables to connect to devices. Cellular technology provides wireless internet access through cellphones. Finally there is satellite which travels an enormous distance from Earth to a satellite.
3 0
3 years ago
Read 2 more answers
Zachary is a member of Future Business Leaders of America at his school and is competing in the Impromptu Speaking competition.
Scrat [10]

Answer:

c start off with a story

Explanation:

I just took the test

4 0
3 years ago
Read 2 more answers
A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges fro
VikaD [51]

A solution which would best meet the CSO's requirements is: B. Sandboxing.

<h3>What is a sandbox?</h3>

A sandbox can be defined as an isolated environment in a computer system or on a network that is designed and developed to mimic end user operating system (OS) and environments, so as to detect unauthorized execution privileges from the operating system (OS).

In cybersecurity, sandboxing is typically used to safely execute suspicious code and data files without causing any harm to the host device or network. Also, sandboxing can work in conjunction with proxies or unified threat management (UTM).

Read more on sandboxing here: brainly.com/question/25883753

8 0
2 years ago
**PLEASE AN IPO CHART AND A C++ PROGRAM FOR EACH QUESTION**
Yuki888 [10]

answer is b

rtyujhygtrcdxrtgyhgtfr

7 0
3 years ago
Which of these appliances can be classified as a robot? You can choose 2.
Natali [406]

Answer:

ummmm i think b

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the answer please
    13·2 answers
  • Forms often allow a user to enter an integer. Write a program that takes in a string representing an integer as input, and outpu
    9·1 answer
  • PLEASE HELP I WILL REWARD YOU
    11·1 answer
  • Which of the following is considered information?
    6·2 answers
  • Give two reasons why cloud computing could be detrimental to a company.
    15·1 answer
  • Importance of availability of mobile devices content that is of interest for users.
    12·1 answer
  • While software vendors generally provide evaluation or demonstration copies of their products, hardware vendors never provide ev
    15·1 answer
  • (15) What is the best definition of a contextual tab?
    8·1 answer
  • This is used to copy information from cell to cell in the spread sheet
    7·1 answer
  • Use your editor to open the cc_data.js file and study the data stored in the staff object to become familiar with its contents a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!