1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
5

In modern web design, color, font, font size, and style should be declared using:

Computers and Technology
1 answer:
inn [45]3 years ago
5 0
They should be declared using style sheets (CSS).
You might be interested in
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two
s2008m [1.1K]

Answer:

Network.

Explanation:

The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard networking protocol which allows network devices such as routers, switches, and host computers to interconnect and communicate with one another over a network. The Transmission Control Protocol/Internet Protocol (TCP/IP) model comprises of four (4) layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

The network layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes.

Basically, this layer known as network layer is the fourth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and it is typically responsible for the transmission of packets from one network device to another.

4 0
3 years ago
What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
Deffense [45]
<span>The purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command is that </span>It allows many inside hosts to share one or a few inside global addresses. 
8 0
3 years ago
Why would a brokered CD pay more than a regular CD?
Lana71 [14]

Brokered CDs may have higher or lower rates than those purchased directly from bans and credit unions. The general consensus here is that higher rates are usually available for direct purchases.

3 0
3 years ago
Why are user application configuration files saved in the user’s home directory and not under /etc with all the other system-wid
kodGreya [7K]

Explanation:

The main reason why is because regular users don't have permission to write to /etc. Assuming this is Linux, it is a multi-user operating system. Meaning if there are user-application configuration files within /etc, it would prevent users from being able to customize their applications.

6 0
4 years ago
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Thepotemich [5.8K]

Answer:

def brute_force(array1, array2):

   for item in array1:

       for element in array 2:

           if element == item:

               print(f"{element} and {item} are a match")

Explanation:

A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.

The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.

5 0
3 years ago
Other questions:
  • If you are trying to create a web page for your band and having difficulty creating links to other groups on your page, what is
    7·1 answer
  • To type the letter address, _________ space from the dateline
    9·2 answers
  • What does the Sort feature do with a database
    13·1 answer
  • A dual looped Fibre Channel drive system is theoretically capable of transferring data at a rate of _____.
    7·1 answer
  • In the following code, what is the first line that introduces a memory leak into the program?
    6·1 answer
  • What is the purpose of networking with other businesses?
    10·1 answer
  • On tool hackers use to get sensitive information from victims is/are:
    15·2 answers
  • Pls help me computer science discoveries
    5·1 answer
  • alex needs to email his graduation certificate to a prospective employer. he has only physical copies of the certificate. what d
    6·1 answer
  • Pictures in the _____ gallery give the appearance of a physical object, such as water drops or sand, that can give your presenta
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!