1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vova2212 [387]
3 years ago
10

You learned that you can use the tags to insert a link to another webpage. One problem that webpage developers face is that, aft

er a time, links may no longer work. Can you think of ways that you can avoid broken links?
Computers and Technology
1 answer:
chubhunter [2.5K]3 years ago
7 0

Answer:Image Control

We can use the height and width properties to control the size of our image. Let’s say we only want the recipe image to take up approximately one-third of the page. Do you remember from math class what percentage one-third is? Type in the following CSS rule, and watch your picture change size before your very eyes!

img {

   height:33%;

   width:33%;

}

That wasn’t too difficult, right? Let’s make the image stand out a bit more by adding a border. Inside the img rule, add the following declarations:

border-style:dashed;

border-width: 5px;

Your picture should now have a dashed border around it that is five pixels in width. Play around with the different border styles that are available. You should see a drop-down box of choices, including dotted, dashed, double, groove, inset, and outset. You can also adjust the width of your border. Using your informative guessing skills, can you predict what property you might use to change the color of the border? Try it and see if you’re right!

Explanation:

 this is a direct quote from my lesson

You might be interested in
List 2 end to end test commands. <br><br> Will mark Brainliest!!
Delvig [45]

Answer:

ibm pll

Explanation:

4 0
3 years ago
When declaring the data type for a multidimensional array of strings, which statement would be most appropriate?
romanna [79]

Answer:

This question required option (See Explanation)

Explanation:

Required

How to declare 2D array

Using Java as a programming language of reference, the syntax to declare a 2D array is:

Data-Type [][] Array-Name = new Data-Type[Rows][Column]

From the question, the data type is String. So, the syntax becomes

String [][] Array-Name = new String[Rows][Column]

Assume the array name is: myArray; The above becomes

String [][] myArray= new String[Rows][Column]

<em>I will not assume values for Rows and Column, but it is worth saying that Rows and Columns are positive integers greater than 1 to make the array a 2 D array</em>

4 0
3 years ago
P6. In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second fr
Karo-lina-s [1.5K]

Answer:

To avoid collision of transmitting frames.

Explanation:

CSMA/CA, carrier sense multiple access is a media access control protocol of wireless networks that allows for exclusive transmission of frames and avoidance of collision in the network. When a frame is not being sent, nodes listening for an idle channel gets their chance. It sends a request to send (RTS) message to the access point. If the request is granted, the access point sends a clear to send (CTS) message to the node, then the node can transmit its frame.

Many nodes on a wireless network are listening to transmit frames, when a frame is transmitting, the node has to wait for the access point to finish transmitting, so it sends a RTS message again to exclusively transmit a second frame.

8 0
4 years ago
A list that is not sorted by numbers is called a?
Feliz [49]

Answer:

An unordered list(HTML)

6 0
4 years ago
What is the most accurate way to describe the excerpt?
kifflom [539]

choose the option it is a dependent clause

7 0
4 years ago
Read 2 more answers
Other questions:
  • When driving a truck is fuel crucial
    9·1 answer
  • What is the code for loading image in matlab
    15·1 answer
  • Dots (or periods) in a Java statement are used to separate the names of the components that make up the statement.
    8·1 answer
  • 1) Discuss when it is best to use indexes. ​
    6·1 answer
  • A _______ is a shortcut to a web page saved in a list in the internet explorer desktop application.
    14·1 answer
  • Access-lists pose a logical problem which often has more than one solution. Can you think of a different set of rules or placeme
    8·1 answer
  • The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an inf
    12·1 answer
  • 1. Build and test D-type Flip-Flop using a built-in SR flip-flop.
    12·1 answer
  • Your program will search for prime numbers. You will first ask the user for the range of values to search, and use for loops to
    6·1 answer
  • Who benefits the most from billing by the second for cloud resources, such as virtual machines?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!