1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
5

Write a summary of five things that you learned about CSS. Do not copy and paste the information. Summarize each point in your o

wn words. Also, try the exercise to expand your understanding.
Computers and Technology
1 answer:
docker41 [41]3 years ago
5 0

Answer:

We don't know what you leaned.

But, I'll do it anyway.

1. Getting id's from html content.

2. Getting classes from html content.

3. changing text fonts.

4. animation.

5. Getting all of one element type from html content.

Explanation:

Start from here.

You might be interested in
What are the keys in all rows that sit between the touch keys?
AysviL [449]
The keys in all rows that's sit between the touch keys are the stretch key
6 0
3 years ago
Which of the following is the most important system if a company wants to consolidate fan data from multiple sources, i.e., exte
irina1246 [14]

Answer:

Option B is the correct answer for the above question.

Explanation:

  • The data warehouse is a collection of large data or a database that includes historical and operational or current data. This database can be used to make the decisions for the prospects of the organization.
  • The above question asked about to select the database which can collect the historical and operational data from various source. That type of database is a data warehouse that is described above. Hence option B is correct while the other is not because:-
  1. Option a states about data model which is used to define the database structure.
  2. Option c states about the relational database which is used to collect only current data.
  3. Option d states about the DBMS which is used to manage the relational database.
6 0
3 years ago
Given f(x) = -2x2 + 5x - 1 and g(x) = 3x + 4 determine a simplified
lukranit [14]

Answer:

-6x^4 + 7x^3 + 17x^2 -4x

Explanation:

( f x g )( x )

Substitute

[( -2x^2 + 5x -1 )( 3x + 4 )]( x )

Use the Distributive Property

[-2x^2( 3x) + 5x( 3x) - 1( 3x) -2x^2( 4) + 5x (4) -1 (4)] (x)

Simplify

( -6x^3 + 7x^2 + 17x -4)(x)

Distributive Property

-6x^4 + 7x^3 + 17x^2 -4x

7 0
3 years ago
10 disscused reasons why organisatoions use electronic spreedsheet​
alina1380 [7]

Well, In any accounting role, you can benefit from incorporating spreadsheets into everyday tasks, making your job streamlined and easier to manage. If you’re looking to progress onto AAT Level 3 Advanced Diploma, it’s good to see how spreadsheets can support you.

a) Easy payment tracking  - While small business owners and those new to accounting can find it difficult to track payments, spreadsheets offer a simple solution.  Spreadsheets are commonly used to analyse money that has been spent and income that has been received. They allow you to split the amount of money you have spent and received by time period and source. For example, you can separate out different types of expenditure such as rent or insurance, and track exactly how much can been spent on these in each month, by using a simple table.

8 0
3 years ago
Janis is preparing a financial document. She needs to use the dollar symbol placed above the number key 4. Which key will Janis
Shkiper50 [21]

Answer:

shift key

Explanation:

4 0
3 years ago
Other questions:
  • What should every Software Engineer know about Software Architecture?
    6·1 answer
  • Vlad is the leader of a group; he receives most of the messages from the group members, and he provides most of the information
    6·1 answer
  • a corporation needs an operating system that allows the various teams in its office to network & collaborate on projects. wh
    11·2 answers
  • Which component is a part of the CPU of a computer
    12·2 answers
  • For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this
    10·1 answer
  • Speech about society being normal
    12·1 answer
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
  • 45 points pls help
    14·2 answers
  • Can i have help for a ggogle class room
    14·1 answer
  • A program has a infinite while loop. How can you interrupt it?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!