1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
2 years ago
11

he attributes for an iframe are controlled by CSS. One of the iframe controls is "seamless." This means it _____. will blend the

iframe to mimic all surrounding images will format the iframe to code all the surrounding text will blend the iframe to look like the surrounding page will blend the iframe to create a border around pages
Computers and Technology
1 answer:
Aleks [24]2 years ago
3 0

Answer:

A. Will blend the iframe to look like the surrounding page

You might be interested in
Which actions changed the look of the following word?
jarptica [38.1K]

Answer:

D

Explanation:

The actions applied to change the look of the word are:

1. It was set to italics. This can be done easily by highlighting the word => press Ctrl + I together on the keyboard.

2. Next is to set to underline. While still highlighted => press Ctrl + U together in the keyboard.

6 0
3 years ago
Read 2 more answers
1 2
sweet [91]

Answer:

Both modules can generate random numbers.

Explanation:

Both the random and secrete modules are builtin programming modules used for generating random number variables. The random module consists of a number of methods in its module for random. number generation such as seed() ; getstate() ; random() ; choice() ; randrange() ; randint() and so on. Random methids are best for generating random numbers which are to be adopted for simulation or modeling. The secrete modules does the same however, numbers generated are stronger and less predictable than the random number modules. Secrete modules are usually adopted in the generation of authentication token and security pins.

6 0
3 years ago
Read 2 more answers
How does an employer judge a candidate ​
vaieri [72.5K]
Test the candidate
Assess for practical experience
Determine strengths needed for the position.
6 0
4 years ago
Which type of security policy is intended to provide a common understandingof the purposes for which an employee can and cannot
Zigmanuir [339]

Answer:A. ISSUE-SPECIFIC

Explanation:Security policy is a set of actions an organization,Country , State or local governments put in place on order to guarantee the security of life and properties. It can also be described as the restrictions on behavior or actions of members of a society, community or an organization as well as restrictions imposed on adversaries by processes such as doors, locks, keys and walls.

Issue specific policy are policies directed to treat or handle particular factors known to aid or abate a crime. It can also be used to outline or reach at an understanding of what to used or what not to use in order to ensure effective security in an organization.

6 0
4 years ago
Before you begin entering data in a worksheet, you should create a _____ for the worksheet.
DIA [1.3K]

Answer:

I'm pretty sure the answer is Template, But if I'm wrong sorry

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • in Google, how should you phrase your search if you want to exclude a certain word from your results(for example,"chocolate")?
    14·1 answer
  • Assume that we are using 0-1 integer programming model to solve a capital budgeting problem and xj = 1 if project j is selected
    6·2 answers
  • You have been having issues with your printer, so you decide to learn more about how the printer works. You learn that if you re
    12·1 answer
  • Python: initalize the variable first_name with the value from the user prompt "What is your first name? " initalize the variable
    9·1 answer
  • If we live 4000 meters from the fire hydrant, how many kilometers away do we live?
    6·2 answers
  • What is the benefit of making an archive folder visible in the Outlook folder list?
    6·1 answer
  • A(n) ___________ operating system provides process and memory management services that allow two or more tasks, jobs, or program
    6·1 answer
  • What is netiquettes?. Mention any 4 netiquettes. (for class 6)​
    5·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • What is a computing event
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!