1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
3 years ago
13

You have added a table to your web page consisting of two columns and five rows, including the header row. in the first header c

ell, you have set the height property in the css style sheet to 50 pixels. you have also mistakenly set the height property for the second header cell to 75 pixels. how tall will the header row be?
Computers and Technology
1 answer:
Tcecarenko [31]3 years ago
8 0
The answer is 75 pixels. Hope that this helped
You might be interested in
Given the function F (X, Y , Z)=Σm(0,1, 2 , 4 , 6)
Mnenie [13.5K]

Answer:

(1)Minterms complement = XYZ (2) Compliment of Minterms = Σm(0,1, 2 , 4 , 6) (3) (X+Y+Z) (4) Minimized SOP = Z + XY

Manterms = πM

Explanation:

Solution

Recall that:

Given the function F (X, Y , Z)=Σm(0,1, 2 , 4 , 6)

(1) Canonical Disjunctive Normal Form: In boolean algebra, the boolean function can be expressed as Canonical Disjunctive form known as minterms

In Minterm we assign 'I' to each uncomplimented variable and '0' to each complemented/complementary variable

For the given question stated we ave the following:

Minterms = XYZ, XYZ, XYZ, XYZ, XYZ.

(2) Canonical Conjunctive Normal Form: In boolean algebra, the boolean function can be expressed as Canonical Disjunctive form known as maxterms.

In Maxterms we assign '0' to each uncomplimented variable and '1' to each complemented/complementary variable

Compliment of Minterms = Σm(0,1, 2 , 4 , 6)

Maxterms = πM

Note: Kindly find an attached copy of the complete solution to this question below.

6 0
3 years ago
Which technological tool is important for storing critical files?.
Vanyuwa [196]

The technological tools that can be considered important for storing critical files are battery backup systems and drives. These devices can be used to store data and supply energy.

<h3>Battery backup systems</h3>

A home battery backup system is a device used to keep the electrical system working in the event when the electrical source goes down.

In computation, there are three major classes of batteries systems:  Lead-Acid, Nickel-Cadmium, and Lithium-Ion.

An uninterruptible power supply (UPS) can be considered as a battery backup supply capable of charging when the power is on.

Learn more about battery backup systems here:

brainly.com/question/7125266

3 0
2 years ago
Explain the two filter options available when filtering by a column
dexar [7]
Can you prove more information?
8 0
3 years ago
Read 2 more answers
Match the feature to the network architecture,
pochemuha

Answer:

Answer is:  

Client-Server Network

  • expensive to set up
  • has a central server
  • easy to track files
  • useful for a large organization

Peer-to-peer Network

  • useful for a small organization
  • difficult to track files
  • inexpensive to set up
  • does not have a central server

Explanation:

<em>Client-Server Network is ideal for bigger network set up like offices and companies where there will be a central server involved with several clients to access and connected with the server. This is the normal network set up to companies. While, Peer to peer network is ideal for much smaller network, which consists of only two computers to communicate and share files. This network is normally temporary and inexpensive since in only works with two computers.</em>

7 0
3 years ago
Streaming media known as _____ is stored on the provider's server, which allows you to play the media multiple times. To watch v
const2013 [10]

Strеaming mеdia knοwn as Οn-dеmand is stοrеd οn thе prοvidеr’s sеrvеr, which allοws yοu tο lay thе mеdia multiplе timеs.

Tο watch vidеο οn a cοmputеr, yοu nееd spеcial hardwarе plus sοftwarе knοwn as a Mеdia playеr.

Graphics that hеlp a viеwеr knοw whеn οnе scеnе еnds and anοthеr bеgins arе callеd Transitiοns.  

Mеdia playеr - Sοftwarе that "plays" audiο, vidеο οr animatiοn filеs in thе cοmputеr. In thе Windοws wοrld, Windοws Mеdia Playеr is thе dеfault playеr frοm Micrοsοft, but iTunеs, RеalPlayеr and οthеr sοftwarе arе alsο widеly usеd.

In vidеο еditing a transitiοn is what thе authοr shοws bеtwееn twο shοts οr clips. Thе jοining οf thοsе clips is thе transitiοn frοm οnе tο thе οthеr. Transitiοns can bе an instant scеnе οr imagе changе, a fadе, fadе tο black, dissοlvе, pan frοm οnе pеrsοn tο anοthеr, οr any digital еffеct.

4 0
3 years ago
Other questions:
  • What do work places allow a company to do
    12·1 answer
  • Typohunting is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes
    5·1 answer
  • Janelle went to update the last name for one of her group contacts. She double-clicked on the contact, changed the last name, an
    12·2 answers
  • What are three ways you cite evedince
    5·2 answers
  • What are the benefits of e learning​
    9·1 answer
  • Write the definition of a function named quadratic that receives three double parameters a, b, c. If the value of a is 0 then th
    12·1 answer
  • Which of the following is true concerning science?
    8·1 answer
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • For the following 4-bit operation, assuming these register are ONLY 4-bits in size, which status flags are on after performing t
    14·1 answer
  • The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!