1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
12

_____ are used to associate a style sheet or style rule with a specific device or list of device features.â

Computers and Technology
2 answers:
olasank [31]3 years ago
7 0

Answer:

Media queries

Explanation:

 Today, websites have to take into account the increasing volume of users who navigate using smart devices, phones and tablets.

These devices generally have screen dimensions and resolutions much smaller than those offered by desktops and laptops for which many websites were initially designed.

Ideally, the design of the site should be adapted to these means, for which it needs to detect the characteristics of the device from which it is being accessed and adapt to it. Initially, the mechanism of the meta viewport tag was specified, which we have already studied in other articles. Currently, more precise control can be obtained using CSS <u>media queries. With them, you can define sets of differentiated CSS rules for different screen resolutions, device orientations, etc., so that the design is adapted without generating a different HTML code for each type of device.</u>

Usimov [2.4K]3 years ago
6 0
Media queries are used to associate a style sheet or style rule with a specific device or list of device features<span> .This technique is used for delivering a tailored style sheet to different devices and applying </span><span>CSS styles depending on a device's general type, specific characteristics  or environment.
</span>
You might be interested in
Which shortcut key aligns to the center of a page
riadik2000 [5.3K]

Answer:

To make text centered, select and highlight the text first, then hold down Ctrl (the control key) on the keyboard and press E. To make text right aligned, select and highlight the text first, then hold down Ctrl (the control key) on the keyboard and then press R.

Explanation:

4 0
3 years ago
[Assembly Language]Extended Subtraction Procedure.Create a procedure named Extended_Sub --(Receives: ESI and EDI point to the tw
alex41 [277]

Answer:

Modern (i.e 386 and beyond) x86 processors have eight 32-bit general purpose registers, as depicted in Figure 1. The register names are mostly historical. For example, EAX used to be called the accumulator since it was used by a number of arithmetic operations, and ECX was known as the counter since it was used to hold a loop index. Whereas most of the registers have lost their special purposes in the modern instruction set, by convention, two are reserved for special purposes — the stack pointer (ESP) and the base pointer (EBP).

For the EAX, EBX, ECX, and EDX registers, subsections may be used. For example, the least significant 2 bytes of EAX can be treated as a 16-bit register called AX. The least significant byte of AX can be used as a single 8-bit register called AL, while the most significant byte of AX can be used as a single 8-bit register called AH. These names refer to the same physical register. When a two-byte quantity is placed into DX, the update affects the value of DH, DL, and EDX. These sub-registers are mainly hold-overs from older, 16-bit versions of the instruction set. However, they are sometimes convenient when dealing with data that are smaller than 32-bits (e.g. 1-byte ASCII characters).

When referring to registers in assembly language, the names are not case-sensitive. For example, the names EAX and eax refer to the same register.

Explanation:

5 0
3 years ago
An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
Leya [2.2K]

Answer:

RADIUS

Explanation:

The administrator needs to set up a RADIUS server for this particular example, RADIUS is a networking protocol, this protocol provides centralized Authentication, Authorization for users who connect and use a network service, this is an authentication remote service, and we can use it with the VPN  (virtual private networks).

7 0
3 years ago
How do airbags prevent injury?
NARA [144]

honestly i think ur answer would be D because it keeps you from flying out of the window

8 0
4 years ago
What are some of the challenges that could arise from setting up a file management system on a computer?
erastovalidia [21]
One challenge is that arranging things in simple folders creates a limited structure that obstructs the way that would perfectly suit your needs. Any information that is dependent on those folders can easily get lost by removing as much as a simple image from that folder, in the events that the information is dependent on the folder structure.
7 0
3 years ago
Other questions:
  • Is a program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile de
    11·1 answer
  • business ethics chapter 7 jordan, a software engineer, is responsible for maintaining the private piece of his company's interne
    15·1 answer
  • What could cause a fixed disk error.
    15·1 answer
  • Which type of computer network ensures high security
    10·1 answer
  • It is necessary tto save updates often when working in google docs? True or false
    11·2 answers
  • pharmaceutical company is using blockchain to manage their supply chain. Some of their drugs must be stored at a lower temperatu
    5·2 answers
  • How can you apply multimedia for study explain​
    11·1 answer
  • It means fruit- trees garden.
    8·1 answer
  • According to the video, which tasks do Police Patrol Officers perform? Select all that apply.
    15·2 answers
  • Help asap please!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!