1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
12

_____ are used to associate a style sheet or style rule with a specific device or list of device features.â

Computers and Technology
2 answers:
olasank [31]3 years ago
7 0

Answer:

Media queries

Explanation:

 Today, websites have to take into account the increasing volume of users who navigate using smart devices, phones and tablets.

These devices generally have screen dimensions and resolutions much smaller than those offered by desktops and laptops for which many websites were initially designed.

Ideally, the design of the site should be adapted to these means, for which it needs to detect the characteristics of the device from which it is being accessed and adapt to it. Initially, the mechanism of the meta viewport tag was specified, which we have already studied in other articles. Currently, more precise control can be obtained using CSS <u>media queries. With them, you can define sets of differentiated CSS rules for different screen resolutions, device orientations, etc., so that the design is adapted without generating a different HTML code for each type of device.</u>

Usimov [2.4K]3 years ago
6 0
Media queries are used to associate a style sheet or style rule with a specific device or list of device features<span> .This technique is used for delivering a tailored style sheet to different devices and applying </span><span>CSS styles depending on a device's general type, specific characteristics  or environment.
</span>
You might be interested in
i have a bag of trail mix . one half of the bag is peanuts. 1/4 of the bag is chocolate candies , and 1/4 of the bag is died fru
Lelu [443]
In our bag, 1/2 is peanuts, 1/4 is chocolate and 1/4 is dried fruit.

The likelihood of drawing a chocolate therefore is 1/4. 

The likelihood of drawing a peanut is 1/2 and the likelihood of drawing a dried fruit is 1/4.

Thus, D is the correct answer because the 1/4 likelihood of drawing a chocolate is less than the 1/2 chance of drawing a peanut.
8 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Using the spreadsheet below, which formula can be used to determine Albert's hourly wage?
algol13

Answer:

It will be average (B2:C2)

as it will select all the data between B2 and C2

7 0
2 years ago
Read 2 more answers
What is a scratch application pls help me build a game through scratch step by step​
borishaifa [10]

Answer:

Scratch is the a coding community and a coding language with simple visual interface that allows people to create digital stories, games and animeations ect.

Explanation: Migth be able to help depending on waht you are making

6 0
2 years ago
1. Actuators apply mechanical force in the form of pressure to overcome
Harman [31]
The answer is d torque because
3 0
3 years ago
Other questions:
  • How do the search methods differ for primary and secondary data?
    10·2 answers
  • Choose the sentences that describe techniques of formatting text.
    12·1 answer
  • A_____refers to the entire Excel file
    14·1 answer
  • Define an I/O port. Which functions are performed by it?
    10·1 answer
  • What is the term used to describe a computer system that can store literary documents, link them according to logical relationsh
    5·1 answer
  • Identify three best -selling tablet on the market, and decide on the one that you would like to buy? justify your respone
    9·1 answer
  • Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C
    13·1 answer
  • Choose all that apply.
    5·2 answers
  • Which option is the correct format of placing HTML tags while coding in HTML?
    13·2 answers
  • True or false scientists investigate and seek to explain the natural world
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!