Which type of element is a line break?

Answers

Answer 1

Answer:

<BR> element

Explanation:


Related Questions

How does the internet help you to improve your:
mental health
self esteem
Help you stay mentally active
Help you stay in contact with family

Like why is the internet useful and a good thing

Answers

Answer:

Help you mentally active

Explanation:

bcoz we can use internet in good ways

Helps you stay mentally active because it basically gives you something to do.

y aren't nobody helping me out
AND GIVE ME A GOOD EXPLANATION PLEASE I REALLY NEED THIS I DONT WANT ZERO IT DUE TOMORROW ​

Answers

Explanation:

So choose a software. Let's say you choose some sort of browser. What is required do install it?  And then for the second part, you specify the operating system. then you show images, logos and the user interface of the software (like what it looks like).

hope this helps!

(sorry, i wrote a lot more but for some reason it wouldnt let me upload it, i hope this works)

Answer + Explanation:

Software 1: Python

Python is a high - level programming language, in which many programmers use to build apps, databases and programs. This piece of software is free, and it only needs a small capacity of RAM (Random Access Memory), about 2GB. This programming language is one of the best, and it will run on any operating system, whether it be MacOS, Android or even Linux (Chrome OS)!

Software 2: Kodu Game Lab

Kodu Game Lab is a 3D game building environment that was designed for students of all ages to use. Although this software is the best that you could get, you need a huge amount RAM, about 4GB, if you want the program to run smoothly. Also, you cannot run or install this software in any other operating system other that Windows 10+ or possible MacOS.

Software 3: Davinci Resolve

Davinci Resolve is a professional video editor, and while professional video producers or photographers use it, it is not compatible with ChromeOS or Windows. It is only available on MacOS. Also, in addition to that, you need a large amount of VRAM, 10-20GB for the best, 6 - 8K.

Software 4: Unity

Unity is by far the best game maker. This is easily usable to professionals as there are a variety of different tools you can use. However, such a good software doesn't come free. If you want the pro version, your looking at about $150 / £109 every month. Also, you can only operate this software on MacOS and Windows.

Software 5: Maya

This is the best 3D editing software you could install, with a costly price. You are looking at £246 every month. You could insure a car for less than that! Also, this will only run on MacOS, and if you do want to operate this, you want your system to have an AMD64 and 9GB RAM. That is a lot for just one software to run!

Types of Hazards Mitigation Measures

A. Biological

1. Wear disposable clean gloves in

handling body substances.

2.

3.

B. Physical

1.

2.

3.

C. Chemical

1.

2.

3.

D. Ergonomic

1.

2.

3.

E. Psychological

1.

2.
3.​

Answers

Answer:

auto mechanics

Explanation:

keeps dirt and grease off hands

Yes I did but I didn’t know if I got my phone number but auto mechanics

Why do reviewers consider the context of a work?

A. To analyze whether or not the public will like the work

B. To pick chart all the content presented in the work

C. To research its original purpose and historical background


D. To take notice of one's physical reaction to a media piece

Answers

Answer:

I think the answer is C.

Explanation:

The _____________________ search is a very simple algorithm. Sometimes called the ________________________ search, it compares each element with the value being searched for, and stops when either the value is found or the end of the array is encountered. Group of answer choices

Answers

Answer:

linear search

sequential

Explanation:

Help please! i don’t know how to do this.

H2 should be:
-Blue
-Times New Roman or Arial
-Align to the right

2. Strong should be:
-Teal
-32pt
-Boldness of 700

3. P should be:
-All in uppercase
-Overlined
-Word space of 10em

Answers

Answer:

Make sure to create and link a css file with the following:

<link rel="stylesheet" href="./styles.css">

In your css file, enter these styles:

h2 {

   color: blue;

   font-family: 'Times New Roman', Times, serif;

   text-align: right;

}

strong {

   color: teal;

   font-size: 32pt;

   font-weight: 700;

}

p {

   text-transform: uppercase;

   text-decoration: overline;

   word-spacing: 10em;

}

Explanation:

In order for the html file to know where your styles are located, you have to link it to the css file with the code given above. In this file, you will enter some css to change the styles of the elements you have created in your html file.

To alter the style of an element, you first have to enter the name of the element itself, its class or its id. In this case, we have used the element itself, meaning that all the same elements in the html file will have the same style. The styles you wish to use are entered in between the curly brackets.

In your specific problem, we are trying to change the h2, strong and p elements, so that is what we have done. For the h2, you wanted it blue, therefore we use the color property to change the color. For the font, we use the font-family and finally we use text-align to align it to the right. The same pretty much applies for the other two elements. Your strong element needs to be teal,32pt and 700 bold. Therefore we use the color, font-size and font-weight properties respectively. And finally for the p element, we will use the text-transform, text-decoration and word-spacing properties respectively.

When you dont know the name of the property you want to change, I suggest googling it. You will definitely find the property name you are looking for. W3schools.com is a good source to use.

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network?
a. Use shared secret authentication.
b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE.
c. Configure devices to run in ad hoc mode.
d. Use open authentication with MAC address filtering.
e. INSTALL A RADIUS SERVER AND USE 802.1X authentication.

Answers

Answer:  Install a RADIUS server and use 802.1x authentication

Explanation:

To configure the wireless network with multiple access points and use WPA2, you should install a RADIUS server and use 802.1X authentication. The correct option is e.

What is configuration?

Configuration, in its broadest sense, describes the process of setting up or organizing anything in accordance with a given specification or needs.

Installing a RADIUS server and utilizing 802.1X authentication will enable you to configure the wireless network with numerous access points, WPA2, and other security features.

You can authenticate wireless clients based on their Active Directory credentials by using a RADIUS server and 802.1X authentication.

This will increase the wireless network's security by ensuring that only authorized users can connect to it.

Ad hoc mode, open authentication with MAC address filtering, and shared secret authentication are not advised for securing a wireless network since they offer flimsy protection and are simple to crack.

Thus, the correct option is e.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

in word 2010, the document information panel has been moved to the ______.

Answers

In word 2010, the document information panel has been moved to the File tab.

Microsoft Word is a word-processing program that is used for creating documents.

The steps taken to locate the document information panel is:

Open a new document in Word 2010. Click on the File tab located at the top-left corner of the window. Click on Properties and then click the Show Document Panel

In word 2010, the document information panel has been moved to the File tab.

Find out more at: https://brainly.com/question/17241854

what is the general term for programs used to operate a computer

Answers

Answer: SOFTWARE

Explanation: Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer. Software is a generic term used to refer to applications, scripts and programs that run on a device.

The general term for programs used to operate a computer is "operating system" (OS). An operating system is a software that manages computer hardware and software resources and provides services for computer programs.

It acts as an intermediary between the computer hardware and the user, facilitating the execution of various applications and providing a user-friendly interface. Some popular examples of operating systems include Microsoft Windows, macOS, Linux, and Android.

Android is an open-source operating system designed primarily for mobile devices such as smartphones and tablets. It was developed by the Open Handset Alliance, a consortium of various technology companies. Android is based on the Linux kernel and has become the most widely used mobile operating system globally.

Learn more about software on:

https://brainly.com/question/985406

#SPJ6

When and why would you use a prefab?
Subject video gaming

Answers

Answer:

You should also use Prefabs when you want to instantiate GameObjects at runtime that did not exist in your Scene at the start - for example, to make powerups, special effects, projectiles, or NPCs appear at the right moments during gameplay.

Which type of basic building blocks (constructs) is the following algorithm?

A.Sequence
B.Selection
C.Iteration
D.Iteration and Sequence

Answers

The type of basic building blocks (constructs) used in the above algorithm is: A. Sequence.

An algorithm can be defined as a standard formula (procedures) which comprises a set of finite steps or instructions, that is typically used for solving a problem on a computer.

Basically, there are three (3) basic building blocks (constructs) used in an algorithm and these include:

I. Iteration.

II. Sequence.

III. Selection.

Selection is a building block (construct) that is used to determine the set of instruction or step to execute in a program based on a Boolean expression such as:

True or False.Yes or NO.

If the conditional test (grade > 50) is True (Yes), a part of the program is executed, which is to output a "Pass."

Otherwise, the program would execute and output a "Fail" i.e the conditional test (grade > 50) is False (No).

 

Read more: https://brainly.com/question/21172316

Please helpp:)
To save your HTML document you should save it as

.html
Or
.txt

Answers

Answer:

.html

Explanation:

HOW TO CHANGE GRADE IN SKYWARD!!

This is a way to change your grades in skyward to show your parents that you have straight A's!!

Firs go to your gradebook, then tap with two fingers on the grade you want to change then locate where it says the grade and click it until you can delete in, put in the grade you want and BOOM

Answers

Answer:

Thank you!

Explanation:

TYTYTY!

pls help me with this coding/computer science question !!

Answers

Answer:

what is the question? I don't see it

tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?

Answers

A DNS attack which would only impact a single user is: DNS poisoning attack.

DNS is an acronym for domain name system and it can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a Domain Name System (DNS) is used to connect a uniform resource locator (URL) or a web address with their internet protocol (IP) address.

In Cybersecurity, there are different types of DNS attacks and these include:

‎DNS flood attack.DNS tunneling.DNS poisoning attack.

DNS poisoning attack is a special type of Domain Name System (DNS) attack that is designed to only impact or affect a single user.

Read more: https://brainly.com/question/17273205

how many levels of heading tags are allowed in html?

Answers

Answer:

six levels

Explanation:

HTML defines six levels of headings. A heading element implies all the font changes, paragraph breaks before and after, and any white space necessary to render the heading. The heading elements are H1, H2, H3, H4, H5, and H6 with H1 being the highest (or most important) level and H6 the least.

Answer:

six levels

Explanation:

The working of the computer on the input according to the program is called_______.​

Answers

Answer:

input program

Explanation:

Need help Plz i have only 20 min

Answers

Answer:

1. tripod

2.srry i don't know

3. true

4. sorry i don't know

5. prob true

Answer:

Tripod

2. The pixel

3. True

4. Goo_____gle Slides

5.  True

Which type of basic building blocks (constructs) is the following algorithm?

Answers

Answer:

Sequence

Explanation:

please tell me the answer a.1111+1011. b. 10111+11111 c. 1111*1011 d. 1110*1101 perform the binary calculations.​pleaseeeeeee​

Answers

Answer:

c.111*1011

Explanation:

because this is the perform fissionable or the binary calculations

mark me brainliest please

Answer:

[tex]11010[/tex]

Explanation:

Number 1 in the decimal system

[tex]1111^2 = 1510[/tex]

Number 2 in the decimal system

[tex]1011^2 = 1110[/tex]

Their sum

[tex]15 + 11 = 26[/tex]

Result in binary form

[tex]26 {}^{10} = {1101}^{2} [/tex]

Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.

Answers

Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Keep your files organized

Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.

Log off

Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.

Each person may only use one computer at a time

Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.

Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.

Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.

.Explanation:

sorry about only 9 rules

How can I use HTML to express a personal value

Answers

Answer: Order list

Explanation:

We can use HTML to express a personal value as a order list of some of our personal feelings.

What is HTML?

HTML stands for Hyper Text Markup Language. It is defined as the preferred markup language for texts intended for web browser display. HTML is the name of the language that describes how Web pages are organized. HTML allows authors to publish documents with headings, text, tables, lists, graphics, etc. online. Utilizing hypertext links, you can instantly access internet content by clicking a button.

You must assess the major facets of life, including the environment, job, enjoyment, romance, personal development, money, health, friends, and family, in order to develop a strong personal value system. Consider the significance of each area of your life, and then consider how fulfilled you currently feel in each area.

Thus, we can use HTML to express a personal value as a order list of some of our personal feelings.

To learn more about HTML, refer to the link below:

https://brainly.com/question/24065854

#SPJ2

___________ can only be used to create parts that are axisymmetrical.
a.casting
b.turning
c.milling
d.drilling

Answers

Explanation:

drilling can only be used to create parts that are axisymmetrical.

what to do if you forgot your locked notes password

Answers

Answer:

what you can probably do is go to an Apple store and book an appointment with the Genius Bar and tell them your problem to see if they can help you recover your password.

i hope this helps :D

why is there so much stuff popping up on my computer task manager

Answers

Answer:

Honestly there could be a number of reasons

Explanation:

could be that you have a virus.

could be unfinished tasks

there's really  lot of reasons this could be happening.

I suggest if its your browser task manager to reset your browser (via browser settings)

If its the system task manager, i suggest trying to restart the computer and go from there.

depending on the root of your problem, it may work, it may not.

Hope this helps :P

Please please help I don’t understand thus

Answers

Answer:

I am pretty sure the answer is path.

Explanation:

Each section in the user/juanita/etc thing makes up a path.

What are megapixels?
A. the size of an image captured by a camera
B. giant pixels inside the camera
C. a computer store
D. a video game played in a camera

Answers

Answer:

A.

Explanation:

A. It's the total number of pixels in an image obtained by multiplying the dimensions (height times width). For large images, this multiplication can be in the millions (=mega), hence the term mega pixels.

How graphic designing
changed in years? Write in 300 words.

Answers

Answer:

Graphic design has a rich and varied history. The word “graphic design” didn’t appear on the scene until 1922, when William Dwiggins created the word to describe the art of designing with graphics. In the earliest days of graphic design, professionals drew by hand. However, in the last 60 years graphic design has forged ahead, advancing rapidly since the addition of today’s digital art tools.

Earliest Graphic Design

Even though the term wasn’t yet coined, some of the earliest designs included typography for books and newspapers. One could also argue drawings on cave walls represent a form of ancient graphics.

Fast forward to the 1900s when posters became a form of expression. During the 1940s, graphic design appeared in propaganda posters of the era, such as the “We Can Do It” poster with Rosie the Riveter. Slogans were short, to the point, and added to a graphic that set the tone.

As technology began to change and become available to more people, the entire industry that would become known as graphic design began to emerge.

The 1990s

In 1990, Photoshop 1.0 arrived on the scene. Back then, you could only use Photoshop with Macintosh computers. The birth of this new tool again changed designers’ ability to experiment with new techniques, including overlapping text, faded elements, and digital overlays.

Grunge was also born in the ’90s, which showed up in movie poster designs, book covers, and album covers with dark looking images and simple colour palettes, such as white on black, perhaps with a pop of red. A few grunge typefaces even came about—gritty and raw-looking text.

The 2000s

The 2000s began an entirely new frontier for graphic designers. In addition to tools becoming even more powerful, people were suddenly designing on portable devices, such as smartphones. On top of that, designers began to realize the importance of designing in a way that looked good across all device types.

Movement became more of a focus, with designers looking for ways to make even static logos look like they’re in motion.

One example of a logo that appears to almost be in motion is the AT&T logo of a globe. Because of the mix of blue and white along with the angles of the logo, one can imagine that the image is spinning slowly just as the earth does. They debuted the logo in 2005.

Recent Changes

There isn’t one method that dominates graphic design today, but a mix of design techniques and styles. Trends emerge from year to year—and sometimes month to month. In 2017, the use of cutout text that meshed with strong images allowed designers to create unique looks for websites and logos.

Other trends included flat icons and the addition of videos across marketing channels. Websites need to be mobile responsive more than ever before, so simplicity is the order of the day, along with speeding up overall rendering. Print advertising meshes with mobile devices, bringing a new experience to users that is more immersive.

Evolution of Graphic Design

Where graphic design will go in the future is anyone’s guess, but the user experience is sure to remain at the forefront. Designs will become more personalized and more interactive over time. One example of this type of technology and personalization appears at Walt Disney World in Orlando. As riders stroll past digital posters, a sensor picks up the signal from a magic pass armband, and the guest’s name comes up on the poster, welcoming them.

Regardless of where design goes next, expect to see increasingly more personalized designs that enhance user experience in your daily life.

private void finishMap()

{

move();

turnLeft();

move();

move();

move();

takeBall();

takeBall();

turnLeft();

turnLeft();

move();

move();

move();

turnLeft();

}

}

for codeHS 1.5.5 mario karel what am i doing wrong?

Answers

Answer:

Where can I find Codehs answers?

You can view the solution for an assignment in multiple ways: Through the Assignments page.

...

To view solutions from the Assignments page:

Navigate to the Assignments page.

Click the '...' next to the assignment you wish to view the solution for.

Choose Solution and another page will open with the solution reference.

when must a breach be reported to the us computer emergency readiness team

Answers

Within 60 days the breach must be reported
Other Questions
You are considering buying stock A. If the economy grows rapidly, you may earn 35 percent on the investment, while a declining economy could result in a 10 percent loss. Slow economic growth may generate a return of 3 percent. If the probability is 14 percent for rapid growth, 17 percent for a declining economy, and 69 percent for slow growth, what is the expected return on this investment Activity 3: What's the Verb Complete each sentence by providing the missing letters of the verb. Write your answer on a separate sheet. 1. Social distancing s important at all times during the pandemic. 2. The youth K L . W that their opinions have an impact to society. 3. You have the skill in drawing. Ihan you should practice more to develop it. 4. You are stressed with your work. You _-take a break. 5. We cu watch your favorite TV series or play your favorite online game. (Score for Question 2: of 5 points)2. Consider the function f(x)= x + 2x 3 .(a) Graph the function.(b) What are the x- and y-intercepts of the graph?Answer: A statement of fact or Opinion How might the ban on depicting human figures have affected Islamic art? How do we know that a source regarding an upcoming election is reliable?A) it is written by a historian B) it is an autobiography C)it is trustworthy D) it can be found on the internet. What was the most important factor to contribute to World War I? Explain 1/5 x 7/8 in simplest form s Write a poem using any as peck of nature to express an emotion.(14 lines of iambic pentameter)-give the poem a title.(Please in your own words!)50 points!!!! Juan is paid a salary of $302 biweekly find Juans earnings per year Answer: 90,000x6,8991: Don't Che.at2:Have a wonderful day!!!!!!!XD Jason deposits $1700 in an account that earns 5% interest compounded weekly. How much will Jason have after 8 years? Can someone please show me their working on these on how to work out? The given diagram shows a construction completed using a straightedge and a compass.BEThe diagram shows the constructionIf m ABC is 249, then m FDE is I don`t know. It depend the weather. Need help finding this answer 9 8 = please answer ASAP, been answering this for 3 hours already, already have most of the answers, just need confirmation, thank you so much to the one who will help, may you live a long, beautiful life, thank you again in advance Who developed the classification system that contained five levels and two kingdoms?AristotleLinnaeusWhittakerWoese 1. ATOMIC RADIUS: For each of the following sets of atoms, rank the atoms from smallest to largest atomic radius.a. Li, C, Fb. Li, Na, Kc. Ge, P, Od. C, N, AI The pamphlet Common Sense, written by Thomas Paine asserted ___________