1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
drek231 [11]
3 years ago
7

Which of the following statements are true?

Computers and Technology
1 answer:
ipn [44]3 years ago
7 0

Answer:

d. CSS can be included in an HTML document

Explanation:

HTML (Hypertext Markup Language) and CSS (Cascading Style Sheets) are not <em>programming languages</em>. They are, in fact, a different kind of <em>computer languages</em> and are some of the essential tools used in common web pages nowadays.

HTML and HTML5 are <em>different</em>. The latter is a new version of HTML which implies some improvements such as the availability of other technologies and features not found in HTML.

HTML is a <em>markup language</em>, i. e., a kind of computer language like <em>TeX</em>, <em>LaTeX</em>, <em>troff</em>, among others, that defines the <em>structure</em> of a text, and it tells to a computer how to show it in a web page using tags embedded into the content of the document. For example, a paragraph is defined using a tag like this <p> text inside </p>, a title: <title> text inside </title>, and so on with images, tables, et cetera.

CSS is a <em>style sheet language, </em>that is<em>,</em> another kind of <em>computer language</em> whose main emphasis is the <em>appearance</em> of the web page, telling the computer the <em>presentation </em>the <em>structured document</em> is about to have, that is, <em>how the document should look</em>.

As a result, CSS is used to describe the presentation of documents written in HTML and <em>can be included</em> in it.

On the other side, <em>programming languages</em> are <em>formal languages </em>(like the ones of mathematics and logic), that is, with some rules and a particular syntax intended to "communicate instructions to a machine, particularly a computer" [Wikipedia, 2019], and some examples of high-level programming languages are those like C, Python, Fortran, Lisp, CommonLisp, Pascal, JavaScript, among many others.

You might be interested in
To share a document in my online electronic journal, I should select the option to _____.
Jobisdone [24]
Select the option to send
3 0
3 years ago
Write a method so that the main() code below can be replaced by the simpler code that calls method mphAndMinutesToMiles(). Origi
defon

ANSWER

The JAVA program after simplification is as below.

import java.util.Scanner;

public class CalcMiles {

   

   // variables declaration

   static double milesPerHour;

   static double minutesTraveled;      

   static double hoursTraveled;

   static double milesTraveled;

   

   // method declared static

   public static void mphAndMinutesToMiles(double speed, double mins)

   {

       // computations to calculate distance travelled

       hoursTraveled = mins / 60.0;

       milesTraveled = hoursTraveled * speed;

       

       // result displayed on the screen  

     System.out.println("Miles: " + milesTraveled);

   }

   

   // Scanner object created inside main()

   // user input taken inside main()

   public static void main(String [] args)

   {

       Scanner scnr = new Scanner(System.in);

       System.out.println("Enter miles travelled per hour ");

       milesPerHour = scnr.nextDouble();

       System.out.println("Enter minutes required to travel ");

       minutesTraveled = scnr.nextDouble();

       

       mphAndMinutesToMiles(milesPerHour, minutesTraveled);

       

   }

}

OUTPUT

Enter miles travelled per hour  

2.3

Enter minutes required to travel  

1234

Miles: 47.30333333333333

EXPLANATION

The program is simplified as explained below.

1. User input is taken using the object of Scanner class.

2. This object of Scanner class can only be created inside main() method hence, user input can only be taken inside main().

3. The code to calculate the result is separated in another method, mphAndMinutesToMiles(). This method is declared with return type void since no value is returned.

4. After user input is taken in main() for miles travelled per hour and minutes required to travel, these values are passed as parameters to the mphAndMinutesToMiles() method.

5. These parameters are used in calculation part. The total miles travelled in total hours (obtained from minutes), is calculated. The code to display the result is added to this method.

6. Inside the main method, only the code to create Scanner object, code to take user input for two variables and code to call the mphAndMinutesToMiles() is included.

7. The variables are declared as static and declared at class level.

8. No variable is declared inside any of the two methods.

5 0
3 years ago
Read 2 more answers
Choose the term that matches each description.
lutik1710 [3]

Answer:

operating systems, word software, computer concepts for end users

Explanation:

operating systems allow users to interact with computer hardware and application software.

word software allows users to complete specific tasks, such as creating a document.

computer concepts for end users allows programmers to create new applications.

7 0
3 years ago
Which subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control
Nataly [62]

The subscription service that complements App-ID by enabling you to configure the firewall to identify and control access to websites is  URL Filtering.

<h3>What is URL filtering?</h3>

The term URL filtering is known to function by looking at the similarities of all web traffic against a given URL filters.

Note that it is one that is made up of database of sites that users do access and as such, the subscription service that complements App-ID by enabling you to configure the firewall to identify and control access to websites is  URL Filtering.

Learn more about subscription from

brainly.com/question/14073216

#SPJ1

4 0
3 years ago
. Hackers generally disguise their IP address. True False
maw [93]
I think that's true.
If they didn't they could be easily tracked by the police.
4 0
3 years ago
Other questions:
  • Which of the following is not considered as part of technology literacy?
    8·1 answer
  • What do you call the process of translating statements written by a developer? What is the result of this process?
    6·1 answer
  • A word processing program would probably be used to: 
    8·1 answer
  • COMPUTER SCIENCE:PIXELS
    5·1 answer
  • Retrieve the names of employees who work on exactly one project that is controlled by their department. (It does not matter how
    7·1 answer
  • HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical control
    12·1 answer
  • Give two reasons you should be aware of your computer's system components and their characteristics.
    10·1 answer
  • Suppose your name was George Gershwin. Write a complete main method that would print your last name, followed by a comma, follow
    9·1 answer
  • What is the next line? &gt;&gt;&gt; myTuple = [10, 20, 50, 20, 20, 60] &gt;&gt;&gt; myTuple.index(50) 3 1 4 2
    14·2 answers
  • Please help ASAP! will mark brianliest! 30 points!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!