1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
3 years ago
15

How can i use css/html coding to create links

Computers and Technology
1 answer:
erik [133]3 years ago
8 0
Three Ways to Insert CSSThere are three ways of inserting a style sheet:External style sheetInternal style sheetInline styleExternal Style SheetWith an external style sheet, you can change the look of an entire website by changing just one file!Each page must include a reference to the external style sheet file inside the <link> element. The <link> element goes inside the head section:<span><head>
<link rel="stylesheet" type="text/css" href="mystyle.css">
</head></span>An external style sheet can be written in any text editor. The file should not contain any html tags. The style sheet file must be saved with a .css extension. An example of a style sheet file called "myStyle.css", is shown below:<span><span>body </span>{
    background-color:<span> lightblue;</span>}

<span>h1 </span>{
    color:<span> navy;</span>
    margin-left:<span> 20px;</span>}
</span>
Hint: Do not add a space between the property value and the unit (such as margin-left:20 px;). The correct way is:<span>margin-left:20px;
</span>
nternal Style SheetAn internal style sheet may be used if one single page has a unique style.Internal styles are defined within the <style> element, inside the head section of an HTML page:<span>Example<span><span><head>
<style>
body </span>{
    background-color:<span> linen;</span>
}

<span>h1 </span>{
    color:<span> maroon;</span>
    margin-left:<span> 40px;</span>
} 
<span></style>
</head></span></span></span>Inline StylesAn inline style may be used to apply a unique style for a single element.An inline style loses many of the advantages of a style sheet (by mixing content with presentation). Use this method sparingly!To use inline styles, add the style attribute to the relevant tag. The style attribute can contain any CSS property. The example shows how to change the color and the left margin of a <h1> element:<span>Example<span><h1 style="color:blue;margin-left:30px;">
This is a heading.</h1></span></span>Multiple Style SheetsIf some properties have been defined for the same selector in different style sheets, the value will be inherited from the more specific style sheet. For example, assume that an external style sheet has the following properties for the <h1> element:<span><span>h1 </span>{
    color:<span> navy;</span>
    margin-left:<span> 20px;</span>
}</span>then, assume that an internal style sheet also has the following property for the <h1> element:<span><span>h1 </span>{
    color:<span> orange;</span>    
}</span>If the page with the internal style sheet also links to the external style sheet the properties for the <h1> element will be:<span>color: orange;
margin-left: 20px;</span>The left margin is inherited from the external style sheet and the color is replaced by the internal style sheet.Multiple Styles Will Cascade into OneStyles can be specified:in an external CSS fileinside the <head> section of an HTML pageinside an HTML elementCascading orderWhat style will be used when there is more than one style specified for an HTML element?Generally speaking we can say that all the styles will "cascade" into a new "virtual" style sheet by the following rules, where number three has the highest priority:Browser defaultExternal and internal style sheets (in the head section)Inline style (inside an HTML element)So, an inline style (inside an HTML element) has the highest priority, which means that it will override a style defined inside the <head> tag, or in an external style sheet, or in a browser (a default value).
<span><span>
Hint: If the link to the external style sheet is placed below the internal style sheet in HTML <head>, the external style sheet will override the internal style sheet!</span></span>
You might be interested in
What is the typical educational requirement for a non-entry level software programmer?
Slav-nsk [51]
Certificate or associate's degree with considerable work experience; bachelor's degree most often required; master's degree for some jobs
7 0
3 years ago
Read 2 more answers
You are writing a program that defines a variable within a loop, and then tries to use that variable outside the loop. However,
Law Incorporation [45]

Answer:

The Variable is out of scope

Explanation:

In programming variables exists with scopes This could be local or global. When a variable is declared as a global variable it is available to all methods and procedures in the program. Java programming language as well as C++ and several others use the open and close braces to define the scope in programs. consider the following example

<em>public class ANot {</em>

<em>    public static void main(String[] args) {</em>

<em>        int i = 0;</em>

<em>        while ( i<10){</em>

<em>            int sum = 0;</em>

<em>            sum = sum+i;       </em>

<em>        }</em>

<em>    }</em>

<em>}</em>

In this example, the variable i is global and can be assessed within the while loop but the variable sum is local to the while loop and cannot be assessed outside of it

4 0
3 years ago
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
frutty [35]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

7 0
3 years ago
“When using a public computer for browsing the Internet, try to use for 1.________ transactions. Also, use 2.__________ browsing
Tamiku [17]

option 2 is c

option 1is B

3 0
3 years ago
Read 2 more answers
Images, symbols, and diagrams are types of
kifflom [539]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is :

Graphics

Because Graphics are the visual representation of information without text. Images, symbols, and diagrams are types of graphics. These graphics can be used in presentations to present information visually.

While other options are not correct because:

Art objects are some images or painting that is the artistic creation of aesthetic value. While graphs are the visual presentation of data and there are different presentation objects in PowerPoint such as images, symbols, text, and diagrams, etc. But it is noted that images, symbols, and diagram are not types of presentation objects but it is a type of graphics elements/objects.

4 0
3 years ago
Other questions:
  • Nicole wants to create a database to collect information about sales transactions. She would like to use the database to look up
    6·2 answers
  • Your computer is crashing on a regular basis. Which of the following is an operation available to the user that should help rese
    6·2 answers
  • Technician A says you should measure the parasitic load immediately after the vehicle is turned off. Technician B says you shoul
    10·1 answer
  • You are evaluating the bounce rate of your overall website traffic and find that users with a social media referral source have
    9·1 answer
  • Which of the following types of cloud platforms would a webmail service offered to the general public be considered?
    9·1 answer
  • Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
    6·1 answer
  • Emma lives in Pennsylvania, what climate does she live in?
    7·1 answer
  • Pick one of the following scenarios and
    6·1 answer
  • What do you think that the next version of IR (IR 5.0) will bring if it was discovered in near future? (hint:- advance IR 4.0 fe
    8·1 answer
  • Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This e
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!