1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
11

Structural Styles

Computers and Technology
1 answer:
Eva8 [605]3 years ago
3 0

Solution :

For Structural Styles the browser's background color.  

html {

background-color: rgb(151, 151, 151);

}

For creating style rule for the background color and setting the body text

body {

background-color: rgb(180,180,223);

font-family: Verdana, Geneva, sans-serif;  

}

For displaying all the h1 as well as h2 headings with the normal weight.

h1, h2 {

font-weight: normal;

}

For create the style rule for all the hypertext link that is nested within the  navigation list  

nav a {

text-decoration: none;

}

For creating style rule for footer element which sets the color of the text to color white and the color of the background to as rgb(101, 101, 101). Also setting the font size to 0.8em. Placing the footer text to horizontally center , and setting the top/bottom of the padding space to 1 pixel.

footer {

background-color: rgb(101, 101, 101);

font-size: 0.8em;

text-align: center;

color: white;

padding: 1px 0;

}

/* Structural Styles At one place*/

html {

background-color: rgb(151, 151, 151);

}

body {

background-color: rgb(180,180,223);

font-family: Verdana, Geneva, sans-serif;  

}

h1, h2 {

font-weight: normal;

}

nav a {

text-decoration: none;

}

footer {

background-color: rgb(101, 101, 101);

font-size: 0.8em;

text-align: center;

color: white;

padding: 1px 0;

}

You might be interested in
Technician A says that to cover all possible vehicle conditions, coolant must have a high freezing point. Technician B says cool
tiny-mole [99]
It would be option A!
please mark me brainliest ,
8 0
3 years ago
Read 2 more answers
What’s some WiFi passwords for some big brands that I can connect to while traveling?
Wewaii [24]

Answer:

download the app instabridge.

With Instabridge you get more than a million up-to-date WiFi passwords and spots on your phone.

7 0
3 years ago
To create a chart, you need to select at least
Nitella [24]

To create a chart, you need to select at least two cells in a range of data.

two cells

<u>Explanation:</u>

In MS excel end user can create graph through insert menu and select chart. In MS excel end user should have enough data in each cells to generate graphs.  

In MS EXCEL end user can create bar graph, pie chart, and line graph. Normally graph means comparing either two sets of values or range of values.

If we select one value it is just graph which gives performance data.

Purpose of graph is to do analysis in graphical presentable manner which an organization can under visual rather than comparing values.

6 0
3 years ago
The file containing the definitions of the member functions of class DateType is called the ______ file.
Free_Kalibri [48]

Answer:

Implementation file

Explanation:

In popular object oriented programming languages like C/C++, The implementation file (source file) of a class is used to hold the code implementaion of the method(s) of the class, this is helpful for seperating interface and method implementation. When this seperation exists, header files will be used to declare all the methods and fields of the class.

In this way, the implementaion file will hold the actual source code of the methods that are declared in the header file and will have a line to include its associated header file. A major advantage of seperating code in this way is the enhancement of better code organization and code re-use

6 0
3 years ago
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
Murljashka [212]

Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack.

<h3>What is downgrade security attack?</h3>

A downgrade attack is known  to be a kind of of cyber attack that is made up of the fact that an attacker is known to often forces a network channel to make a switch to a kind of an unprotected or one that is said to be less secure data transmission standard.

Note also that the  Downgrading of a given protocol version is said to be a key element of  a type of a  man-in-the-middle attacks, and it is known to be one that is often used to take or hijack encrypted traffic.

Hence, Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack

Learn more about Downgrade attack from

brainly.com/question/24304791

#SPJ1

3 0
1 year ago
Other questions:
  • Why was Unicode invented?
    6·1 answer
  • What is one course of action available in every problem solving process?
    9·2 answers
  • Why does someone put 'human' at the end of their social media profile as a summary or description? I've seen this a lot online n
    15·1 answer
  • Which diagram is used as a popular technique for investigating causes and effects? 1. Cause and effect 2. Fishbone/lshikawa 3. R
    13·1 answer
  • Jim is writing a program to calculate the wages of workers in a teddy bear factory.
    7·1 answer
  • Respond to the following in a paragraph of no less than 125 words. Describe the steps to active listening.
    7·2 answers
  • How did the military in the early 1900s move resources?
    7·1 answer
  • What happened to the ten commandments tablets.
    9·1 answer
  • ______________________ can run on a workstation or server and is at the heart of all business applications.
    7·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!