1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
15

Which CSS property configures the font typeface?

Computers and Technology
1 answer:
Vitek1552 [10]3 years ago
5 0
The answer to this is font-family.
Example of usage:
```
<em>#headerFont{</em>
<em>   font-family: Times New Roman;</em>
<em>}
</em>
```
You can put your font name in quotes <em>(eg: "Ariel")</em> but it's not always necessary- but it is a good practice to get into because it helps to avoid certain fonts not being able to show up. Please note there are some fonts that will not work in certain browsers.

   If you choose a custom font ether you made or you downloaded, unless you have the font itself saved into your code, unless the user has that font on their end, they will <em>not</em> see it- this is where backup fonts are helpful until or using universal ones; at least until you learn how to integrate the font fully into your website.
You might be interested in
The class constructor function must have the same_______ as the class,
inn [45]

Answer:

Name.

Explanation:

The constructor in the class must have the same name as the class.Constructors are used to initialize the object when created.There are basically three types of constructors which are as following:-

  1. Default Constructor.
  2. Parameterized Constructor.
  3. Copy Constructor.

Default Constructor:-This constructor is already present in the class when the class is defined.It does not have any arguments.

Parameterized Constructor:-As the name suggests this constructor have parameters that are used to initialize the object.

Copy Constructor:-This constructor is called whenever an object is copying the values of other object.For example:-

There is already an object present with name obj1.

class obj2=obj1;

5 0
3 years ago
The program that solves problem 2 (a) on p.275 should be named as proj4_a.c. It must include and implement the following functio
avanturin [10]

Answer:

#include <iostream>

#include <cstring>

using namespace std;

bool isAPalindrome(char* palindrome);

int main()

{

   char palindrome[30];

   bool palindrome_check;

   cout << "Please enter an word or phrase.\n";

   cin.getline(palindrome, 30);

   palindrome_check = isAPalindrome(palindrome);

   if (palindrome_check = true)

   {

       cout << "Input is a palindrome\n";

   }

   else

   {

       cout << "Inputis not a palindrome\n;";

   }

system("pause");

return 0;

}

bool isAPalindrome(char* palindrome)

{

   char* front;  

   char* rear;  

front = palindrome;// starts at the left side of the c string

rear = (palindrome + strlen(palindrome)) - 1;//starts at the right side of the c-string. adds the c string plus the incriment value of s

while (front <= rear)

{

 if (front = rear)

 {

  front++;

  rear--;

 }

 else

 {

  return false;

 }

}

   return true;

}

7 0
3 years ago
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
The _______ system coordinates computer resources, provides the user interface, and runs applications.
pychu [463]
Not sure but it could be operating system 

could be wrong though
5 0
3 years ago
Write the first line of a function named Days. The function should return an integer value. It should have three integer paramet
nexus9112 [7]

Answer:

<u>Program:</u>

Module Module1

Function Days(intYears As Integer, intMonths As Integer, intWeeks As Integer) As Integer

' 1 year = 365days

' 1 month=30.417 days

' 1 week = 7 days

Days = 365 * intYears + 30.417 * intMonths + 7 * intWeeks

End Function

Sub Main()

Dim years, months, weeks As Integer

Console.Write("Enter the number of years: ")

years = Convert.ToInt32(Console.ReadLine())

Console.Write("Enter the number of months: ")

months = Convert.ToInt32(Console.ReadLine())

Console.Write("Enter the number of weeks: ")

weeks = Convert.ToInt32(Console.ReadLine())

Console.WriteLine("Days: " & Days(years, months, weeks))

Console.ReadKey()

End Sub

End Module

7 0
2 years ago
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • The ____ is a new feature in versions of microsoft office, starting with office 2007; it consists of tabs, which contain groups
    5·1 answer
  • Where (what memory location) is the data read from for the following code:
    12·1 answer
  • If a user's input string matches a known text message abbreviation, output the unabbreviated form, else output: Unknown. Support
    14·2 answers
  • You are trying to troubleshoot a desktop power supply issue using a voltmeter. Which of the following options are the MOST commo
    6·1 answer
  • I need help under standing an assignment, I've contacted my teacher but I want to finish this class already. Here's the directio
    11·1 answer
  • Which of the following is NOT considered an interactive?
    8·1 answer
  • In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
    7·1 answer
  • (iii) ............ characters can be stored in memo field. (a) 50 (b) 64000 (c) 255 (d) 200 ​
    8·1 answer
  • You are using a device that reads the physical addresses contained in incoming data that travels along network cables. Based on
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!