1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
12

_____ are used to associate a style sheet or style rule with a specific device or list of device features.â

Computers and Technology
2 answers:
olasank [31]3 years ago
7 0

Answer:

Media queries

Explanation:

 Today, websites have to take into account the increasing volume of users who navigate using smart devices, phones and tablets.

These devices generally have screen dimensions and resolutions much smaller than those offered by desktops and laptops for which many websites were initially designed.

Ideally, the design of the site should be adapted to these means, for which it needs to detect the characteristics of the device from which it is being accessed and adapt to it. Initially, the mechanism of the meta viewport tag was specified, which we have already studied in other articles. Currently, more precise control can be obtained using CSS <u>media queries. With them, you can define sets of differentiated CSS rules for different screen resolutions, device orientations, etc., so that the design is adapted without generating a different HTML code for each type of device.</u>

Usimov [2.4K]3 years ago
6 0
Media queries are used to associate a style sheet or style rule with a specific device or list of device features<span> .This technique is used for delivering a tailored style sheet to different devices and applying </span><span>CSS styles depending on a device's general type, specific characteristics  or environment.
</span>
You might be interested in
The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for
Trava [24]

Answer:

The answer is "MAC address"

Explanation:

In the given statement some information is missing, that is the choices of the question, which can be described as follows:

A. MAC address

B. DAC  address

D. PAC  address

It is a unique id, that allocates to a routing protocol device for use as a network handle a network group interactions. Its use is popular in many other IEEE 802, like Lan, Wi-Fi, and other wireless technology, and certain alternative was wrong, which can be defined as follows:

  • In option B, DAC stands for both digital and data access control, that's why it is not correct.
  • In option C, It is used to access transmission medium, that's why it is wrong.
8 0
3 years ago
Next
andreyandreev [35.5K]

Answer:

sampling height

Explanation:

3 0
3 years ago
1. What are the biggest password mistakes that people and companies make? How can you avoid those mistakes?
Ghella [55]

Answer:

1. Keeping a password with user name or password is very easy word.

2. Passwords should be kept strong so that it cannot be haccked. One should use upper case letters along with lower case letters and numeric and special characters to make the password strong.

3. The businesses usually run anti viruses in case of virus attack. In case of haccker attack businesses are temporarily shut down from their routine work and alternate business plan is activated which runs the business activities incognito version.

4. High profile passwords can be leaked as it is on the computer system which can be accessed from around the world.  

Explanation:

The businesses should use DRP system in order to avoid complete shut down of business operations in case of a cyber attack. The passwords should be kept strong enough so that no one can crack the password and all employees should not be given complete access to business operations and planning activities. Employees access should be restricted to their job role.

5 0
3 years ago
Meats ages hair and feathers all contain this monomer
OverLord2011 [107]

Answer:Amino Acid

Explanation:

All proteins have amino acids

7 0
3 years ago
The application window controls include: minimize, maximize, and close<br><br> A) true <br> B) false
Arlecino [84]

Answer:

True

Explanation:

Look at the top right of your computer while having a chrome tab open. You will see a line, a box, and a x. Hover over each and you can see the names.

6 0
3 years ago
Other questions:
  • #Imagine you're writing a program to check if a person is
    8·1 answer
  • What does a first line indent look like
    13·1 answer
  • What is an advantage of sharing documents in PDF format instead of Word format?
    6·2 answers
  • Which is currently the most common cellular network?<br> 4G<br> 4G LTE<br> 5G<br> 5G LTE
    13·1 answer
  • Why is technology potentially important to the banking industry? What consumer needs does it fulfill?
    15·1 answer
  • For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (circle one)
    10·1 answer
  • 1.Menciona tres factores o variables que consideras influirán en el oscurecimiento del alimento cortado o pelado expuesto a la i
    8·1 answer
  • Consider the following code:
    13·1 answer
  • PLEASE SOMEONE PLEASE HELP ME OUT!!!!
    10·2 answers
  • Which of these statements are true about domain controllers (dcs)? check all that apply.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!