1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
5

The process of ensuring that web pages coded with new or advanced techniques still are usable in browsers that do not offer supp

ort for the newer features is called:__________.
Computers and Technology
1 answer:
grigory [225]3 years ago
8 0

Answer:

progressive enhancement

Explanation:

Progressive enhancement is a powerful method for web developers when building websites accessible to different level user-agents.

Progressive enhancement technique allows you start with <em>simple</em> and <em>foundational</em> layers and then building more complex technologies on top of it. This principle lets multiple level user-agents can access and retrieve your work no matter what level of technologies they are using.

You might be interested in
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
Define watcher block
DochEvi [55]

Answer:

Happens when you are watching a series / film / drama / etc. but can not retain the attention span to watch for long periods of time. As well as the shortened viewing time, the ability to retain what has been viewed is impaired.

Explanation:

5 0
3 years ago
Read 2 more answers
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two syst
irga5000 [103]

Answer:

Proxy Server                        

Explanation:

  • Proxy server is a server that acts as a mediator between two systems.
  • One system can be your computer and the other can be the server to which you are asking a service, such as requesting a web page.
  • Lets suppose you request a web page from a server and you type a URL of a website to access a web page.
  • This request goes to proxy server which sends this request on your behalf to the target server in order to retrieve that web page.
  • Proxy server makes this request to the target server on the internet by using one of its IP addresses.
  • When the proxy server gets that web page, it will forward that web page to your requesting computer.
  • If you request a specific service such as a website frequently the proxy server saves that website on its cache.
  • So if you request that website again, proxy server will forward it to you from its cache rather than requesting it again from the target server on your behalf resulting in quick response to the user's request.
  • Proxy servers provide users with privacy to access the websites, and they can surf the internet anonymously .
8 0
3 years ago
which term describes the layer of software that resides between the virtual operating system and the physical hardware it runs o
sasho [114]

Answer:

hypervisor

Explanation:

becauseis a thin layer of software that resides between the virtual operating system(s) and the hardware. The physical host is the actual hardware that the hypervisor software runs on.

8 0
3 years ago
To erase an entire entry in a cell and then reenter the data from the beginning, press the ____ key.
Mama L [17]
The ESC Key.

hope that helps


8 0
4 years ago
Other questions:
  • Find the maximum value and minimum value in milesTracker. Assign the maximum value to maxMiles, and the minimum value to minMile
    9·1 answer
  • Given a string, return a version without the first and last char, so "Hello" yields "ell". The string length will be at least 2.
    13·1 answer
  • What problem does chlorofluorocarbon (CFC) create?
    5·1 answer
  • How are procedural and object-oriented programming approaches similar?
    9·1 answer
  • Write a SELECT statement that returns these column names and data from the Order_Items table:
    14·1 answer
  • All of the Internet in your country disappears. What happens next?
    13·1 answer
  • You receive an offer in the mail that says you're eligible to win a cash prize if you place some stickers on a form and return i
    5·1 answer
  • Convert the following denary numbers into binary using 8-bit register:
    6·1 answer
  • Necesito ejemplos de actitud filosófica por favor
    8·1 answer
  • What are the three benefits of incremental development, compared to the waterfall<br> model?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!