1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sp2606 [1]
3 years ago
11

Explain Cascading Style Sheets and what they do. Describe their primary function, two effects that this function has on programm

ing, and explain why this is such a benefit to the programmer.
Computers and Technology
1 answer:
Leni [432]3 years ago
4 0

Answer:

Cascading Style Sheets are special codes that is used to style or format a web page.

Explanation:

<em>Imagine, you have two web pages, and you have to style them both, using a single format. For example, in two linked web pages, you wanted both information, can be read in uniform colors, style and font size. It would be much easier if you apply only one formatting tag to them right? But that is not the case in HTML (Hypertext Mark Up Language). You have to create formatting tags that is mixed with them to be able to style or format the page or text. CSS can make this easier. All you have to do is use a single format the call on the style by means of tag. The purpose of this is to create uniformity to all web pages and to minimize the coder's efforts. It can also be used in formatting tables (like cellpaddings, border styles, border thickness, color and other things that requires formatting in HTML. Listed below is a sample CSS codes for two different web pages. </em>

<em> </em>

<em>This file is saved as try.html </em>

<em><html> </em>

<em><head>  </em>

<em><link rel="stylesheet" type="text/css" href="style.css"> </em>

<em></head> </em>

<em><body> </em>

<em><p> The quick brown fox </p> </em>

<em></body> </em>

<em></html> </em>

<em> </em>

<em>And another file is saved as trytwo.html </em>

<em><html> </em>

<em><head>  </em>

<em><link rel="stylesheet "type="text/css" href="style.css"> </em>

<em></head> </em>

<em><body> </em>

<em><p> Jumps over the lazy dog </p> </em>

<em></body> </em>

<em></html> </em>

<em> </em>

<em>style.css </em>

<em> body{ </em>

<em>background-color: lightblue;  } </em>

<em> </em>

<em>p{ </em>

<em>color: navy; } </em>

<em> </em>

<em> Both webpage will be using the same font color which is navy blue. This would prevent the coder or programmer to redo the font formatting tags.With a single file, he can re use the styles to other webpages. </em>

<em> It would benefit the programmer to save himself effort and time. And it would allow him to debug the codes in much easier way. </em>

<em />

You might be interested in
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
Please Help meeeeeeeeeee:
Akimi4 [234]

Answer:

D) save as

Explanation:

If you press save as it'll give you the option where to save to.

6 0
3 years ago
Read 2 more answers
which of these is a placeholder in a document into which variable data is inserted during the process of a mail merge?
Margarita [4]

Answer: C. Merge Field.

The Merge Field is a placeholder that holds the variable data that will be inserted into the main document during a mail merge procedure. The columns in a document may represent the categories of information. The Rows represent the records of the different columns. The computer counts a row of data to be a single record.

7 0
3 years ago
Read 2 more answers
How to create database using access​
timurjin [86]

i think by using python

6 0
3 years ago
How can a company that collects and uses private customer data ensure it will move forward in a sustainable culture of privacy?
Len [333]

Answer:

I think that it is c and if not pls take the point

back

4 0
3 years ago
Other questions:
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • ___ consists of a central conductor surrounded by a shield (usually a wire braid).
    9·1 answer
  • Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
    8·1 answer
  • The copy constructor for a class is called____________.
    14·1 answer
  • If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’
    10·1 answer
  • Which options can be adjusted in the print settings?
    8·2 answers
  • A celebrity blogger you have followed for years advises readers to try a new beauty product. Before purchasing the product, a sa
    10·1 answer
  • 2.20 Write an expression involving a three-letter string s that evaluates to a string whose characters are the characters of s i
    6·1 answer
  • What function would you use to calculate the total interest paid for the first year of a mortgage?.
    15·1 answer
  • Write an application that allows a user to enter a filename and an integer representing a file position. Assume that the file is
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!