1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
12

You are reviewing the style sheet code written by a colleague and notice several rules that are enclosed between the /* and */ c

haracters. What will occur when you link the style sheet to a Web document?
Computers and Technology
1 answer:
Flauer [41]3 years ago
7 0

Answer:

Nothing will happen.

Explanation:

The rules written between /* and */ will be ignored because /* and */ are the standard way of writing comment in a style sheet code. So, whatever fall in between them will be ignored during rendering of the page.

You might be interested in
G The method of mapping where each memory locationis mapped to exactly one location in the cache is
Otrada [13]

Answer:

Direct Mapped Cache

Explanation:

Given that a Direct Mapped Cache is a form of mapping whereby each main memory address is mapped into precisely one cache block.

It is considered cheaper compared to the associative method of cache mapping, and it is faster when searching through it. This is because it utilizes a tag field only.

Hence, The method of mapping where each memory location is mapped to exactly one location in the cache is "Direct Mapped Cache"

4 0
3 years ago
Encoding is the process:
vodomira [7]

Answer:

Of translating an idea or a thought into a code

Explanation:

Encoding is the process of translating an idea or a thought into a code.

For example:

You want a friend to get you a gaming Laptop as a birthday gift, while describing the specification and how the laptop should look like. You visualize a fast laptop in black cover. You tell your friend it is "fast and portable". You translate your perceptions on a particular laptop into words that describe the model.

5 0
3 years ago
What is the largest decimal value you can represent, using a 86-bit signed<br> integer?
Nataly [62]

Answer:

2^{85}-1

Explanation:

Considering the number are stored using binary notations.

If there are total 86 bits and 1 bit is used as sign bit. Then in total one can have 2^{85} bit combinations since a bit can be either stored as 0 or as 1.

Therefore,  the largest number that can be stored will be 2^{85}-1.

To understand it in better way let's scale down the problem to 3 bits representation. The largest number that can be stored using 3 bits is 111 which in decimal form is 7 and is equal to 2^{3}-1.

4 0
3 years ago
Type the correct answer in the box. Spell all words correctly. Code in which server-side language can be embedded into an HTML d
Zarrin [17]

Answer:

What does the letter T in SMART goal represent? The letter T in SMART goal stands for .

Explanation:

Type the correct answer in the box. Spell all words correctly. What does the letter T in SMART goal represent? The letter T in SMART goal stands for .

A:

The correct answer would be, Time based goals.The letter T in SMART goal represents Time based Goals.Explanation:SMART goals is an approach in Business Administration. It is basic…

6 0
2 years ago
Read 2 more answers
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
fgiga [73]

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

3 0
3 years ago
Other questions:
  • You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
    13·1 answer
  • What is the purpose for the refresh button?
    10·2 answers
  • What are some ways tables can be inserted into a document? Check all that apply.
    5·2 answers
  • Which one of the following is not possible to view in the debug logs?
    8·1 answer
  • Hi I m from India plz follow me and I will follow u​
    15·2 answers
  • What statement best describes operating systems?
    12·1 answer
  • The ______ Works on a single variable or constant. *​
    8·1 answer
  • Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage de
    10·1 answer
  • Shandra recently bought a brand-new digital camera from a local camera shop but when she got it home, she noticed the lens was j
    11·1 answer
  • Why does this happen
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!