1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksandrR [38]
3 years ago
6

Ed says that no matter how carefully he checks his CSS code and HTML markup, and has validated his document at the W3C Markup Va

lidation Service Web page, the document doesn’t render as expected in his Web browser. Some of the flexbox properties simply don’t work. What do you tell Ed?
Computers and Technology
1 answer:
slega [8]3 years ago
5 0

Answer:

Try another browser

Explanation:

Some browsers do not support advanced features like flex box.

You might be interested in
If there is an int/integer in a array, and the same int/integer comes at the same spot, does it cancel each other out or does it
joja [24]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

When you use an array in the program, it occupies the memory where to store the data. However, it is noted that the other array cannot store the variable value where the first array has to store its variable value.

however, when you reassign the value their index position of the array, the values are reassigned. But it also depends on the CPU, because sometimes when you release the memory from the array, maybe some other programs get to occupy that location where the first array values were stored.

However, In Java, it is possible that the same int/integer comes at the same spot of the existing integer in an array, then the value at that particular index is reassigned.

7 0
3 years ago
4.2 code need help plz someone 15 points if u help
Korolek [52]

def func():  

 total = 0

 while True:

   pet = input("What pet do you have? ")

   if pet == "rock":

     return

   total += 1

   print("You have a {} with a total of {} pet(s)".format(pet, total))

func()

We wrapped our code in a function so that whenever the user enters rock, we can simply return and exit the function. If you have any other questions, I'll do my best to answer them.

8 0
3 years ago
Please help me!! i’m so confused on this
DaniilM [7]
D I really hopes this helps
8 0
2 years ago
All of the fossils that have been discovered make up the
erastovalidia [21]

Answer:

D. fossil record

Explanation:

When animals and plants died in historical times , in some cases their remains were preserved as imprints on rocks. These constitute fossil records and provide lot of information about evolution of life. These fossil records when arranged chronologically in order of time, constitute a fossil record. Fossil Record provides a very valuable indirect insight about historical times to archaeologists.

6 0
3 years ago
________ includes reviewing transactoin logs and uses real-time monitoring to find evidence
denpristay [2]

Complete Question:

________ includes reviewing transaction logs and uses real-time monitoring to find evidence.

Group of answer choices

A. Log analysis

B. Network analysis

C. Code analysis

D. Media analysis

Answer:

B. Network analysis

Explanation:

Network analysis includes reviewing transaction logs and uses real-time monitoring to find evidence. Network analysis is a form of computer forensic service, which involves the scientific process of identifying, capturing and analyzing or examining data that are stored on digital devices in an electronic format, for the sole purpose of unraveling the truth about an allegation such as fraud, without preempting the outcome of the investigation.

Network analysis involves the use of network analyzers such as a sniffing and tracing tool to analyze or examine network traffic in real-time. Some examples of network analyzing tools are netdetector, tcpdump, pyflag, networkminer, xplico, tsat, wireshark, omnipeek, etc.

<em>Please note, network analysis is also known as network forensics in computer science.</em>

4 0
3 years ago
Other questions:
  • Which method of encryption is based on physics principles?
    5·1 answer
  • A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
    13·1 answer
  • What does "WPA" stand for?
    15·2 answers
  • Which statement is true about the purpose of a work in process constraint?
    15·1 answer
  • Consider the following code:
    13·1 answer
  • Sistema binario, realizar el pasaje de binario a decimal; 00110011 11101100 11100001 11001100 10010101 11001111 10000001 1000110
    14·1 answer
  • True or false we can used virus not use pirated software and programs ​
    10·1 answer
  • An employee is working on building a new computer application for a friend. For this purpose, he uses the software that is regis
    5·1 answer
  • Choosing a per_formatted presentation that already has a design and the slots is called choosing What​
    8·1 answer
  • If a while loop iterates forever,what is the most likely cause?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!