1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NNADVOKAT [17]
2 years ago
6

What framework uses CSS to access and manipulate HTML elements?

Computers and Technology
1 answer:
Jlenok [28]2 years ago
4 0

Answer:

The correct answer is JQuery

Explanation:

JQuery uses CSS to access and manipulate HTML elements.

You might be interested in
The cost of an items is Rs 200. what will be the cost of 50 such items. write a simple program​
alexandr402 [8]

Answer:

In Python:

Unit_Cost = 200

Cost50 = 50 * Unit_Cost

print("Cost of 50 items: Rs."+str(Cost50))

Explanation:

This initializes the unit cost to 200

Unit_Cost = 200

This calculates the cost of 50 of such items

Cost50 = 50 * Unit_Cost

This prints the calculated cost

print("Cost of 50 items: Rs."+str(Cost50))

4 0
2 years ago
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
storchak [24]

Answer:

telnet

Explanation:

<h2><u>Fill in the blanks </u></h2>

Terminal emulation, especially the unprotected <u>telnet </u>protocol, should be blocked from any access to all internal servers from the public network.

3 0
3 years ago
You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs connected to the router. A new us
notka56 [123]

Complete Question:

You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen?

Group of answer choices.

A. The user with 802.11b will access the network at 11Mbps while the users with 802.11g will access the network at 54 Mbps.

B. The user with 802.11b will not be able to communicate on the network.

C. The user with 802.11b will access the network at 11 Mbps. The users with 802.11g will access the network at 54 Mbps unless they are communicating with the 802.11b device,which will be at 11 Mbps.

D. All users will access the network at 11 Mbps.

Answer:

D. All users will access the network at 11 Mbps.

Explanation:

A 802.11g is one of the wireless network standards developed by the Institute of Electrical and Electronics Engineers (IEEE) which operates on a 2.4 GHz microwave bandwidth and as a result can only transmit over a short distance. The 802.11g has a data transfer rate or throughput of 54 megabits per seconds (Mbps).

Basically, the 802.11b is a similar standard to the 802.11g wireless standard that typically allows the transmission (transfer) of data for up to 11 megabits per seconds (Mbps).

In this scenario, you are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC.

Hence, what will happen is that, all the users will access the network at 11 Mbps.

6 0
3 years ago
You are asked to add speech to a robotic receptionist that sits at the front desk of a large organization. The robot has an anim
Firlakuza [10]

Explanation:

The requirements would be that the receptionist robot detects the incoming person and speak;

<em>Good morning (based on time), Welcome to XYZ organization. How can i help you. Do you need to visit HR, finance, marketing, sales, engineering etc representative or other function?</em>

Now based on that a visitee information is printed out.

Limitation

A person comes who does not understand what robot speaks

Interaction with existing dialogue would be made possible through speech recognition system

The system will work well as speech recognition has now been used in many functions and robots have also now become quite advanced

7 0
3 years ago
Read 2 more answers
_____ is a major factor in the widespread use of global information systems
Paha777 [63]

Answer:

E-business

Explanation:

7 0
3 years ago
Other questions:
  • Write c program to check character is alphabate or not?​
    15·1 answer
  • Multibeam sonar technology uses _____.
    14·2 answers
  • Which windows tools would you use to browse the files system on a hard drive?
    6·2 answers
  • Which functions return a logical value (TRUE or FALSE)?
    10·1 answer
  • To test for the current date in a query, type ____ in the criteria row of the appropriate column.
    12·1 answer
  • When you set up social connections, each generic icon in the contacts list and the People Pane will be replaced with the profile
    12·1 answer
  • What is the language of computers?
    9·1 answer
  • Aranjează următoarele cuvinte din documentul word Proiect, într-o scrisoare în care soliciți directorului școlii sprijin în priv
    8·1 answer
  • Match the TCP/IP Layer to a problem that can happen there.
    8·1 answer
  • Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!