1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
14

Why is removing presentation-oriented markup from one's html document considered to be a best practice?

Computers and Technology
1 answer:
Gelneren [198K]3 years ago
3 0

Answer

Its for the purpose of  maintenance and readability

Explanation

A presentation-oriented markup web application generates interactive web pages containing various types of markup language.

Markup is a language designed for the purposes of processing definition and presentation. It specifies code for formatting, both the layout and style, within a text file. Markup describes the structure while the styling is how it looks. it uses the code to specify the formatting which are called tags.

You might be interested in
A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity.
levacccp [35]

Answer:

A mobile device is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity.

Explanation:

I guess say this considering a phone,watch,etc. all are small and mobile devices.

5 0
2 years ago
Both the original location and destination must be visible in file explorer when you
Xelga [282]

When you drag-and-drop files

Dragging and dropping files between two open windows is a quick way to transfer files and folders. If the file or folder and both the original and destination location where you want to transfer it are visible, you can simply drag the item/items from one location to the other. Dragging is unlike moving a file of folder. Dragging from one disk to another copies the file/folder so that it appears in the two locations.

5 0
3 years ago
Using data from a tal distribution database, define a view named toplevelcust. it consists of the number, name, address, balance
valentina_108 [34]
A) CREATE TABLE toplevelcust (number INTEGER PRIMARY KEY, <span> name TEXT, address TEXT, balance DOUBLE, credit DOUBLE</span>);

b) select number, name, credit - balance from toplevelcust

c) This I cannot answer
7 0
4 years ago
Read 2 more answers
Which tool should be used to verify the compatibility of an application run on Windows 10?
diamong [38]

I believe A is the answer here.

8 0
4 years ago
If we are using an 4-character password that contains only lowercase English alphabetic characters (26 different characters), ho
Trava [24]

Answer:

11,424,400 possible passwords

Explanation:

Since all characters are letters and only lowercase

we have 26∧4 = 456,976 possibilities

For a 5-character password which is still lower case sensitive.

we have 26∧5 = 11,881,376 possibilities

Many more possible passwords = (11881376-456976)

= 11,424,400 possible passwords

6 0
3 years ago
Read 2 more answers
Other questions:
  • In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
    5·1 answer
  • 18. Which type of briefing is delivered to individual resources or crews who are assigned to operational tasks and/or work at or
    14·1 answer
  • In a set associative cache memory, if the number of ways (lines) in a set is doubled while keeping the cache size and line size
    13·1 answer
  • Can someone please‼️‼️❗️help me with this?<br> I got an error that I can’t figure out how to fix it.
    6·1 answer
  • Works for a major manufacturer of computer processors. As a part of Susan's job, she is expected to run a series of diagnostic t
    9·1 answer
  • Which term originated on social media?<br> O A. LOL<br> O B. Unlike<br> O C. Notebook<br> D. Word
    7·2 answers
  • What would your leadership style be?
    14·1 answer
  • Excel creates which type of cell references in formulas by default?
    5·1 answer
  • 1. The opportunity to create several equations for launching program files is called
    5·1 answer
  • a client device on your network is trying to authenticate via radius proxy, but is failing. you check the relevant policy on the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!