1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
10

Name one common framework that is used by web developers to build responsive websites​

Computers and Technology
1 answer:
Alenkinab [10]3 years ago
5 0

Answer:

Twitter Bootstrap

Explanation:

Bootstrap is a popular, modern front-end/UI development framework.

You might be interested in
Order the steps to use a logical argument as a rule type.
muminat

Answer:

Click home tab, click conditional formatting, click new rule, use formula to determine

6 0
3 years ago
Read 2 more answers
What is the output of the following program fragment? int alpha [ 5 ] = {100, 200, 300, 400, 500}; int i; for (i = 4; i > 0;
masha68 [24]
Out put:
500 400 300 200
3 0
3 years ago
Why would you use a billeted list in a slide presentation?
Damm [24]

Answer:

You would use a Bullet Point on a slide presentation because its concise and to the point.

Explanation:

The correct way to use a Bullet point is to keep it simple. Its not made to be a full sentence. You need to create a bullet point you can expand upon. when you keep it plain and simple you can get more info on your points.

7 0
3 years ago
Wirte a print statement that used an f - string to output $ 5,242.83<br> What is ans
Anuta_ua [19.1K]

Answer: print(f'$5,242.83')

Explanation: print(f'$5,242.83')

3 0
2 years ago
Symmetric key algorithms depend on the shared secret encryption key. What are symmetric key algorithms?
Zolol [24]

Answer:

AES or Rijndael is one example of a symmetric encryption algorithm.

Explanation:

With these type of algorithms, the key for encrypting is the same as for decrypting, so sender and receiver need to safely share this key without any third party getting a hold of it.

7 0
4 years ago
Other questions:
  • Software that interprets commands from the keyboard and mouse is also known as the A.hard drive.B.operating system.C.desktop or
    7·2 answers
  • The type of power that has the ability to call on connections and networks both inside and outside the organization for support
    6·1 answer
  • Microsoft windows server and linux are examples? of:
    12·1 answer
  • Write a function named sortie that takes three integer parameters by reference and rearranges them in ascending order--the first
    6·1 answer
  • Why must programs written in a high-level language be translated into machine language?
    5·1 answer
  • If you are creating a new document that you know will be turned into a Web page, it is a good idea to start in _____.
    8·1 answer
  • Write an expression that whose value is the fifth character of the string name.
    10·1 answer
  • U.S. cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate net
    15·1 answer
  • If you go over 255 in RGB by 1 does it reset to 0 or 1
    11·1 answer
  • Which element is included in the shot breakdown storyboard? Which element is included in the shot breakdown storyboard?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!