1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kati45 [8]
3 years ago
9

When the Credit Card Number box and the CSC box receive the focus, a transition effect should appear that slowly adds a glowing

brown shadow around the boxes. The glowing brown shadow appears but without a transition effect. Return to the code8-4_debug.css file and study the code that applies a transition effect to both the input#cardBox and input#CSC objects, and the input#csc:invalid style. Correct any mistakes you find in the code. Verify that when the Credit Card Number and CSC boxes receive the focus a transition effect appears that adds the glowing brown shadow to the boxes.
Computers and Technology
1 answer:
svp [43]3 years ago
5 0

Answer:

dire ako maaram hito because dire ako baltok

medyo <em><u>la</u></em>

You might be interested in
Carly wants to be able to look at a document without having to use the horizontal scroll bar located on the bottom of the screen
Leno4ka [110]

Answer:

I think it's "Carly will set the page to Page Width, and Rhianna would zoom to 150%." If Carly doesn't want to use the zoom thingy, then she probably would just change the page orentation (idk if I spelled that right). Rhianna wants to zoom in, so that's why I said that. It's either "A" or "C."

Explanation:

I hope this helps!

5 0
3 years ago
To ensure rapid recovery and security of data, backup data should be ________.
Nataly [62]

Answer:B kept at a secure location at the facility

Explanation:

8 0
3 years ago
Please write an Introduction on intrusion detection system and prevention system<br> PLEASE
77julia77 [94]

Answer:

An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.

6 0
2 years ago
What is the name for the size and style of text?
Mashcka [7]

Answer:

Font

Explanation:

4 0
3 years ago
Read 2 more answers
Window server how it works
bearhunter [10]
The server handles the administrative group-related activities on a network. It basically stores, recover and send the files to all the devices that are connected to the network of that server. Windows has made a line of operating systems specifically for use in servers.
Windows Server is a group of operating systems designed by Microsoft that supports enterprise-level management, data storage, applications, and communications. Previous versions of Windows Server have focused on stability, security, networking, and various improvements to the file system.
A window is a separate viewing area on a computer display screen in a system that allows multiple viewing areas as part of a graphical user interface ( GUI ). Windows are managed by a windows manager as part of a windowing system . A window can usually be resized by the user.
4 0
3 years ago
Other questions:
  • Acomputer with a domain name is called a
    8·1 answer
  • Which type of address defines a single network interface in a computer or other device?
    7·1 answer
  • Convert the following 8­bit binary numbers in two's complement format to decimal (If the number is negative, include the minus s
    5·1 answer
  • To record your own audio, you must have _____.
    14·2 answers
  • A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested
    11·1 answer
  • How do you make computers or microwaves?
    13·1 answer
  • g write a recursive function that prints out all the even numbers between x and y inclusive if x is odd then the print out will
    5·1 answer
  • Which of the following sentences from the section "The Limits To Free Enterprise With A Mixed Economy" BEST develops a central i
    10·1 answer
  • What do you understand by the term input, output, processing and storage.​
    12·2 answers
  • I WILL MARK IT BRAINLIEST FOR SURE ☺️❤️
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!