1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
15

Another html/css assignment, drop css code below, thank you

Computers and Technology
1 answer:
Reil [10]3 years ago
6 0

This is what I come up with. I'm unclear what the 4th requirement means, so I've labeled it #unclear.


a { color : red; }

p:not(:first-child)  { text-indent: 5%; }

div { background-color: aqua; }

#unclear { width: 50%; margin-left: 25%; margin-right: 25%; }

.links:link { font-size 24px; background-color: yellow; }

#first { text-transform: uppercase; font-style: italic; }

You might be interested in
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
Which of the following is a Layer 3 protocol designed to permit routers to exchange information about networks that are reachabl
Nikolay [14]

Answer:

a. Routing protocol

Explanation

Routing protocol is a layer 3 (Network layer) protocol used by routers to exchange information about available routes , their associated costs and delays.

5 0
3 years ago
Read 2 more answers
Draw the Abstract Syntax Trees for the following statements and represent them in text form. i) 1+2+3 ii) 6÷3×4+3
MArishka [77]

Answer:

your a legend you can do it just pleave

Explanation:

:)

5 0
3 years ago
Which search strategy is most similar to greedy search?
lesya692 [45]

Answer:

I think the answer would be A.

Explanation:

If I'm wrong plz let me know (I think I may be wrong)

8 0
3 years ago
12. ______ is considered to be the first video game mascot.
Tatiana [17]
D pac man im hope im right
7 0
2 years ago
Other questions:
  • Domain of (x+8)/(x(x+10))
    12·1 answer
  • Cuales Son las características de la máquina analítica de Carlos Babbage ?
    11·1 answer
  • What is output by the following program? int i = 7; while (i>=2){System.out.print (i +""); if ((i%3) == 0){ i +2; } else { i/
    6·1 answer
  • what key aspects did you learn regarding the creation, analysis, and management of information systems? How will this impact you
    5·1 answer
  • Test if the word mold is stored in the variable word.
    5·1 answer
  • If someone said to you, “Pseudocode is a waste of time! It’s just more work because you end up writing the same program twice,”
    8·1 answer
  • The use of a concept or product from one technology to solve a problem in an unrelated one
    11·1 answer
  • WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
    5·1 answer
  • What is the purpose of heading tags?
    15·1 answer
  • Think about how you view your emails—either the email service you use yourself or an email service you would choose to use. Desc
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!