1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mila [183]
4 years ago
7

Heather wants a transition effect applied to the links in the gameLinks list in which a gradient-colored bar gradually expands u

nder each link during the hover event. To create this effect, you will use the after pseudo-element and the content property to insert the bar. Create a style rule for the nav#gameLinks a::after selector that: a) places an empty text string as the value of the content property, b) places the content with absolute positioning with a top value of 100% and a left value of 0 pixels, c) sets the width to 0% and the height to 8 pixels, d) changes the background to a linear gradient that moves to right from the color value rgb(237, 243, 71) to rgb(188, 74, 0), e) sets the border radius to 4 pixels, and f) hides the bar by setting the opacity to 0.
Computers and Technology
1 answer:
Usimov [2.4K]4 years ago
8 0

Answer:

Hi there Zelenky! This is a good question to practice style sheets and effects. Please find my answer below.

Explanation:

Below CSS contains the code to answer all parts of the question.

nav#gameLinks a::after {  

 content: ‘’;  

 top: 100%;  

 left: 0px;  

 width: 0%;  

 height: 8px;  

 position: absolute;  

 background: -webkit-gradient(linear, right, left, from(rgb(237, 243, 71)), to(rgb(188, 74, 0));  

 border-radius: 4px;  

 opacity: 0;

}

You might be interested in
If a packet is highlighted by black, what does it mean for the packet?
KATRIN_1 [288]

Answer:

If a packet is highlighted by black what does it mean for the packet It shows that there is a bad Spanning. Hope this helps! Pls give me BRAINLIEST!!!! =)

8 0
4 years ago
The prepaid tuition plan covers
rusak2 [61]
Hey there!

A prepaid tuition plan is a plan that allows you to pay the current rate of tuition now (say, years in advance), even if it's much higher than the time when the payment for tuition would actually be paid. This plan is great for anyone who wants to pay a lower price for high–cost education now (even if their kid isn't college age yet) and not have to worry about economic standing or inflation in the future that could drive the tuition prices up. 

The plan only covers tuition and other similar fees. You can not purchase books or room and board with it in advance. So, your answer should be: C. Tuition and Fees. 

Hope this helped you out! :-)
8 0
4 years ago
Read 2 more answers
Express 0.0005 x 10-4 farads as picofarads
Oksana_A [137]
0.0005 x 10⁻⁴ Farad = 0.000 000 05 Farad.
1 pF = 0.000 000 000 001 Farad

Divide them and get 50000 pF.
3 0
3 years ago
Read 2 more answers
What does it mean to compact and repair your database? What is the difference between a single
lara [203]

Answer:

  The utility of the compact database decreases the size of the given database by making a definite copy of our database in the system while likewise free the given database by overabundance space created by erasing and modifying the information.

Compacting is one of the best way to diminish the physical size of the database. The compact is the process which compress the database and also precise the information of our database.

It basically makes our data small by eliminating some extra space in the system and repairing process mainly improve the performance of the database.

The main difference between the single compact and a compact on close means that the database will be automatically compact when we close the database and single compact means we select the particular database to make it compact.

3 0
4 years ago
An _______ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiti
elena55 [62]

A Online Intrusion takes place when an unauthorized person gains access to a digital device by using an internet connection and exploiting vulnerabilities in hardware or software

4 0
3 years ago
Other questions:
  • Who will win the premier league
    9·2 answers
  • Identifying your learning preferences Helps You To
    12·1 answer
  • The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
    15·1 answer
  • Use the Crop tool on an image to
    6·2 answers
  • Unlocking your smart phone remote security protections that protect your mobile device from meniscus applications
    5·1 answer
  • Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
    12·1 answer
  • Any application that wants to be displayed on the web must use the HTTP protocol <br> True<br> False
    12·1 answer
  • When you set code inside other code, in an orderly fashion, it is called:
    11·1 answer
  • Select the processes that help to create a program.
    7·1 answer
  • HELP ASAP
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!