1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksandrR [38]
3 years ago
6

Ed says that no matter how carefully he checks his CSS code and HTML markup, and has validated his document at the W3C Markup Va

lidation Service Web page, the document doesn’t render as expected in his Web browser. Some of the flexbox properties simply don’t work. What do you tell Ed?
Computers and Technology
1 answer:
slega [8]3 years ago
5 0

Answer:

Try another browser

Explanation:

Some browsers do not support advanced features like flex box.

You might be interested in
Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems developm
hram777 [196]

Answer:

Agile/adaptive methods.

Explanation:

The user has just decided to join a firm and will also be accountable to determine whether that system development technique that group uses to establish the latest software for a significant medical distributor to his position as just a lead analyst.

After that, he consumes a week for the purpose to understand his group members for reason to know their strengths and weakness and how would they work under pressure.

So, the following method is required for him to understand about the disadvantages of each of them.

4 0
3 years ago
What's the main idea??
tatyana61 [14]
My computer wont let me download this pdf

7 0
3 years ago
Most _____ focus on galning entry over the internet to a secure computer system by finding a
dangina [55]

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

5 0
3 years ago
Convert (520)10 into base 16​
kakasveta [241]
The base-10 value of 52010 is equal to base-16 value of 20816.
3 0
3 years ago
Read 2 more answers
I don't understand how to write both. If I repeat the first code but with 3 and 6 it doesn't work.
hram777 [196]

It looks like you need to get both numbers from the input. Try doing something like this:

print(int(input()) + int(input()))

4 0
2 years ago
Other questions:
  • What is a constructor? Why would you include a constructor in a class?
    6·1 answer
  • What are the benefits of using a multiview sketch?
    11·1 answer
  • Write a program to calculate and return total surface area of a box using FUNCTION _END FUNCTION.​
    15·1 answer
  • In programming, what is a string?
    8·2 answers
  • PLEASE HELP ASAP!!
    11·1 answer
  • The right to make others do things is referred to as _________.
    14·2 answers
  • When you use a business class with an object data source, the business class Group of answer choices must have attributes that m
    5·1 answer
  • Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim
    15·1 answer
  • 14. Which of the following is NOT a
    6·2 answers
  • Justine was interested in learning how to play the piano. She has successfully passed every level of music book and is planning
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!