1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
5

Write a summary of five things that you learned about CSS. Do not copy and paste the information. Summarize each point in your o

wn words. Also, try the exercise to expand your understanding.
Computers and Technology
1 answer:
docker41 [41]3 years ago
5 0

Answer:

We don't know what you leaned.

But, I'll do it anyway.

1. Getting id's from html content.

2. Getting classes from html content.

3. changing text fonts.

4. animation.

5. Getting all of one element type from html content.

Explanation:

Start from here.

You might be interested in
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
Choose which statement is wrong by applying your knowledge from the reading. a. A security manager works on tasks identified by
Novosadov [1.4K]

There are reasons why a statement can be wrong. The option that is a wrong statement is Since 2015, the number of unfilled cybersecurity positions has increased by 10 percent.

<h3>How are many cybersecurity jobs unfilled?</h3>

The U.S. is known to have a high total employed cybersecurity workforce and some that are unfilled positions as reported by Cyber Seek.

Studies has shown that since 2015, the number of unfilled cybersecurity positions has gone up by 50 percent. Such that  the total expected rate has been approximated to be at 1.8 million open cybersecurity positions by 2022.

Learn more about cybersecurity from

brainly.com/question/14286078

8 0
2 years ago
Which internet protocol is used to transmit encrypted data?.
Y_Kistochka [10]
HTTPS is a combination of HTTP with TLS to provide encrypted communication with, and secure identification of, web servers.
6 0
2 years ago
Aloha users!<br><br>What's the principle behind lie detecting machine?
Mashcka [7]
The principle behind a lie detecting machine is your brain waves !
5 0
3 years ago
100 points!! What should you click on to relocate broken link files?
brilliants [131]

Answer:

B. Locate!

let me know if im wrong pls :]

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Class 00 rubber gloves are used when working with voltages less than​ _____.
    15·1 answer
  • ________ are used in input, processing, and output operations that can help create more efficient programs as the data can be pr
    11·1 answer
  • Write a program that prints the numbers 1 to 4 on the sameline with each pair of adjacent numbers separated by a single space(1
    5·1 answer
  • Your team has been asked to design a LAN for a very successful CPA firm with five departments in one building and a total of 560
    6·1 answer
  • What is x squared times b squared
    8·1 answer
  • . Consider the problem of finding the largest element in a list of n elements. What will be the basic operation of an algorithm
    9·1 answer
  • Which one is the answer for the question.
    11·1 answer
  • I need help thanks please!
    8·2 answers
  • Ano ang bunga ng pagsunod sa tamang konsiyensiya?
    12·2 answers
  • What Microsoft feature enables you to represent text as colorful visuals
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!