1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
8

CJ is developing a new website blogging about cutting-edge technologies for people with special needs. He wants to make the site

accessible and user friendly. CJ wants to link to articles in his website. He has assigned specific values for each ID attribute. To link to that ID attribute, CJ must use a(n) _____ before the ID value in his href statement.
Computers and Technology
1 answer:
crimeas [40]3 years ago
3 0

Answer:

CJ is developing a new website blogging about cutting-edge technologies for people with special needs. He wants to make the site accessible and user friendly. CJ wants to link to articles in his website. He has assigned specific values for each ID attribute. To link to that ID attribute, CJ must use an # before the ID value in his href statement.

Explanation:

In order to create an internal link, a link's href element must be assigned to a hash symbol #, including the value of the id attribute for the element that is to be to internally linked to, usually further down the page. Then, there is also a need to add the same id attribute to the element to be linked to.

An id refers to an  attribute that uniquely describes an element. Below is an example of an internal anchor link and its target element:

<a href="#contacts-header">Contacts</a>

You might be interested in
A data center needs to ensure that data is not lost at the system level in the event of a blackout. Servers must stay operable f
poizon [28]

Answer: UPS

Explanation:

The redundancy effort that should be put in place to ensure the data remains available is the Uninterruptible Power Supply(UPS).

Uninterruptible Power Supply (UPS) is necessary in the provision of battery backup power when there's drop or stoppage in the flow of electricity. With regards to the question, it'll ensure that data is not lost at the system level in the event of a blackout.

3 0
3 years ago
​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
Elena L [17]

Answer:

D.  ReFS

Explanation:

File system is simply a management system for files that controls how and where data are stored, where they can be located and how data can be accessed. It deals with data storage and retrieval.

Examples of file system are NTFS, FAT(e.g FAT 16 and FAT 32), ReFS.

ReFS, which stands for Resilient File System, is designed primarily to enhance scalability by allowing for the storage of extremely large amounts of data and efficiently manage the availability of the data. It is called "resilient" because it ensures the integrity of data by offering resilience to data corruption. It does not support transaction, encryption, file based compression, page file and disk quotas, to mention a few.

6 0
3 years ago
Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
Lorico [155]

Answer:

a. Protected

b. Public

Explanation:

There are four acess modifier in Java.

Default: Acessible only within the same package.

Public: Can be acessed by any class.

Private: Acessible only within the class.

For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.

Protected: Used in classes that extend each other. For example, a class of employees would extend employee.

So:

a. A class Employee records the name, address, salary, and phone number.

The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.

b. An adding method inside of a class BasicMath.

This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.

4 0
3 years ago
Suppose you wanted to run a web server or ftp server from your home. what type of ip address would you want?​
Greeley [361]
You would need to have a static ip address.
3 0
3 years ago
What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?
sleet_krkn [62]
A mean is another word for average (kind of)
7 0
3 years ago
Other questions:
  • Which css property configures the capitalization of text?
    12·1 answer
  • . Once a vulnerability has been identified by Nessus, where would you check for more information regarding the identified vulner
    15·1 answer
  • Kyra needs help planning what images and text to use in her web page what technique can help her
    5·2 answers
  • 100 POINTS PLEASE HELP ASAP!!!!!
    5·2 answers
  • We will pass in 2 values, X and Y. You should calculate XY XY and output only the final result. You will probably know that XY X
    13·1 answer
  • Grace whistles while tickling Camille with a feather. Eventually, Camille starts to squirm and giggle every time Grace whistles,
    10·1 answer
  • Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the bool variabl
    6·1 answer
  • A national tax preparation firm is accessing industry-specific productivity applications in the cloud; many other tax preparatio
    13·1 answer
  • What is the binary conversion of 179.187.223.21?
    11·2 answers
  • Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!