1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
4 years ago
5

Among the web programming languages, css is used to define _____ of the web page

Computers and Technology
1 answer:
Slav-nsk [51]4 years ago
4 0

CSS is used to define format the layout text styles, table sizes, and other aspects etc of Web pages

You might be interested in
What era was the metalwork from
timama [110]

4000-5000 BCE was the earliest I could find (but this was for the Americas)

3 0
4 years ago
What can be changed when a style is modified?
Gwar [14]

Answer:

Font

no hate If I'm wrong :)

3 0
3 years ago
Read 2 more answers
Commercial websites have domain names so that users can easily access the web pages by typing the domain names instead of the IP
WINSTONCH [101]

The given statement is true.

<u>Explanation:</u>

IP address is really tough to remember by each and everyone, and even if you misspell one number, then the navigation will not go for the desired website. It is equivalent to remember phone numbers during the earlier days. As said the domain name has 4 parts.

They are,  

  • TLD – Top level domain (eg: .com, .org, .net, etc) .
  • Mid level domain – It is the part that comes after www keyword which is before the Top level domain name.
  • www is the machine name which is common for all the domain. It is a standard that needs to be used.
  • Second level domain .
8 0
3 years ago
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
1. Define Validation Rule
RoseWind [281]

Answer:

1. A Validation Rule is a rule given to a field that ensures that the attribute of data entered into the field meets the set criteria of the field before the data can be saved. The question asked by the field is either 'Yes' True or 'No' False, with the required answer being Yes or "True"

2. Compressed hours

Compressed hours is work mode where employees are allowed to do the number of hours to which they are contracted over a less number of working days

3. Microsoft Access

Microsoft Access is designed to automatically save data entered into forms as the user moves between records or when the form being worked on is closed thereby, ensuring  that data loss is prevented even when the form is closed after an edit is made

4. A document editor

A document editor can be used for the creation of new document and editing existing documents of different file types

Explanation:

5 0
3 years ago
Other questions:
  • HELP PLEASE
    7·2 answers
  • I'm using my PS4 dual shock controller to connect to the fire stick on the tv so I can play games with it but whenever I try to
    10·1 answer
  • The larger the Word Size of a computer
    6·1 answer
  • When it's time to change career paths, it's a good idea to first​
    7·2 answers
  • . Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
    6·1 answer
  • Create an array class consisting of a static array of three elements, and describe it in such a way that the Point and Vector cl
    8·1 answer
  • Which statement describes a biotic factor interacting with the environment?
    5·1 answer
  • Areas on which the development of the computer as a communication technology is based
    5·1 answer
  • what stage is the most inner part of the web architecture where data such as, customer names, address, account numbers, and cred
    11·1 answer
  • What should you commit to your family members?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!