1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
3 years ago
11

Due to the internal style sheets of some browsers, your website may look different to someone who is using firefox as opposed to

internet explorer. imagine that you are a web designer. explain how would you address this problem and eradicate these inconsistencies. imagine that you are web designer for a company of your choice (travel, bank, pet food, hair salon, high school, college, landscaper, retail store, etc.). identify the company and describe what you would check to ensure that a website is compatible with most browsers.
Computers and Technology
1 answer:
Bogdan [553]3 years ago
3 0
The must support the same codecs, most old browsers such as chromium and internet explorer are bleeding edge, the are lacking many codecs than ones like Firefox and Chrome, 
You might be interested in
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
Document could not be saved bad file handle
creativ13 [48]
To help fix this problem try reviewing the file and opening it on your own when your sure its good on your side then try to save it if all else fails make a new one
8 0
4 years ago
How is the internet a vast network?
8_murik_8 [283]

Answer:

it help you with what you need to ask and more

Explanation:

5 0
3 years ago
Write a Java program that reads an 8-bit binary number from the keyboard as a string and then converts it into decimal. For exam
cestrela7 [59]

Answer:

public class Brainly

{

 public static void main(String[] args)

 {

   BinaryConverter conv = new BinaryConverter();

   String binStr = "01001101";

   System.out.print(binStr + " in decimal is "+conv.BinToDec(binStr));

 }

}

public class BinaryConverter

{

 public int BinToDec(String binStr)

 {

   int d = 0;

   while(binStr.length() > 0)

   {

     d = (d << 1) + ((binStr.charAt(0) == '1') ? 1: 0);

     binStr = binStr.substring(1);

   }

   return d;

 }

}

Explanation:

The program "eats" the string from left to right, and builds up the integer representation in variable "d" on the go. While there are digits left, it shifts the previous result to the left and sets the least signficant bit to 1 only if the corresponding string character is a 1.

5 0
3 years ago
"The hash values for a wide variety of passwords can be stored in a database known as a"(n) __________, which can be indexed and
Vikki [24]

Answer: Rainbow table

Explanation:

Rainbow table is one of the type of pre-computed table that usually used for cracking the password hashes in the function. In the rainbow table, the hash values are stored in the database that can be used for quickly searches buy using the hash values.

 In the rainbow table, the computer system is basically require the password for authentication which contain the password of the database either in plain-text and hashed. It basically used for determining the plain-text password.

8 0
3 years ago
Other questions:
  • Windows Server 2012 R2 provides hardware-independent NIC teaming or bonding to allow for better network performance and adapter
    6·1 answer
  • A palindrome is any word, phrase, or sentence that reads the same forward and backward. Here are some well-known palindromes: Ab
    11·1 answer
  • Which type of cover letter would the above excerpt come from?
    7·1 answer
  • What is the useful chart used for comparing values over categories?​
    8·1 answer
  • What is the BCC feature used for?
    12·2 answers
  • Help me! I’ll mark you brainly
    13·1 answer
  • Which factors have led to the fast growth in IT​
    13·1 answer
  • Ismael is examining a report in Access. He needs to access a view that will be used to examine and change the structure of the r
    9·2 answers
  • A manufacturing company has decided to be carbon free by 2030. What can it do to achieve this goal?.
    7·1 answer
  • Write a program that prompts the user to input an integer and then outputs both the individual digits of the number and the sum
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!