1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
2 years ago
7

5. An external CSS file is saved with D. Answer the following questions. 1. Explain the purpose and advantages of using CSS.​

Computers and Technology
1 answer:
jekas [21]2 years ago
7 0
When you create a single, simple web page, you can tag each item (such as a heading or a paragraph) with whatever font, size, color, and so on that you like. It's simple HTML.

If someone then asks, "Can we use a different font for the headings?" it's a 10-minute edit.

But when you have a site with a thousand pages of corporate content and your boss arrives to tell you that head-office has determined that the "corporate style" of such-and-such font must be applied to every web page...

Then you'll have a week's worth of work ahead of you.

When they tell you that the web page must utilize a different font and color in India than the rest of the world...

You're dealing with a nightmare.

CSS takes all of the scattered formatting and layout information from the real documents and centralizes it into "style sheets."

Now, if all of your web pages are constructed correctly with CSS, you can change the font, color, size, or anything else - possibly the entire look and feel of your website - with a single-line update in the CSS file.

This concept of separating the "data" from the "presentation style" is quite powerful...

Even on a small website, there is justification in doing so.
You might be interested in
Which slot type would you install a video card in to get the best performance?
erma4kov [3.2K]
It really is hard to say because there are many slots and we do not know what your teacher is teaching. I have seen a lot of teachers teaching out of date material. With that said, here is a list from best to worst.

PCI Express x16
PCI Express x1
AGP
PCI

This is list is based on greatest to least and base on the bandwidth read and write speed.

6 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
Kyla, a business analyst uses test scripts while testing an application before it is released to the client. Why do business ana
Mariana [72]

Answer:

D. to create a test environment

Explanation:

After releasing it will be "production"

8 0
3 years ago
A (n) _____, similar to a trojan horse, installs monitoring software in addition to the regular software that a user downloads o
galina1969 [7]

Answer:

Spyware

Explanation:

Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.

Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.

Bot: this is a software application that runs automated tasks. So, it is not the correct option.

Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.

Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.

5 0
3 years ago
Read 2 more answers
(5 pt.) The name of a variable in the C programming language is a string that can contain uppercase letters, lowercase letters,
lilavasa [31]

Answer:

The different variable in C is 21213316700.

Explanation:

Given value:

Total value  = letters + underscore value

Total value  = 52 + 1

Total value =53

choice for first character = 53 letters +10 digits

first character = 63

choice for remaining characters

So,

Variable number With one 1 character = 53

Variable number With 2 character  = 53 × 63

Variable number With 3 character = 53 × 63²

Variable number With 4 character  = 53 × 63³

.

.

.

Variable number With 7 character  = 53 \times  63^{7}

Total difference variable = 53 + 53 × 63+ 53 × 63²+ 53 × 63³+....+ 63^{7}

Total difference variable = 53(1 + 63 + 63²+ 63³+ .... + 63^{7})

Formula:

1+x+x^2+x^3+x^4+........x^n\\\\\Rightarrow  \frac{x^{(n+1)} -1}{x-1}

Total difference variable

53 \times \frac{63^{7+1} -1 }{63-1}\\\\53 \times \frac{63^{8} -1 }{63-1} \\\\ \therefore 63^8 = 2.48 \times 10^{14}\\\\53 \times \frac{2.48 \times 10^{14} -1  }{62}\\\\53 \times \frac{1.48 \times 10^{14}}{62}\\\\21213316700

6 0
3 years ago
Other questions:
  • Obtain a file name from the user, which will contain data pertaining to a 2D array Create a file for each of the following: aver
    5·1 answer
  • While inspecting an element in the DOM on my website using the Chrome Devtools I accidentally deleted the DIV that had all my au
    8·1 answer
  • ) A popular PivotChart that is used in Access is (Points : 4) column.
    9·1 answer
  • “identify the skill in the following scenario” :
    6·2 answers
  • How is a microkernel architecture different from a monolithic architecture?
    5·1 answer
  • You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on y
    9·1 answer
  • What is the next line? >>> myTuple = [10, 20, 50, 20, 20, 60] >>> myTuple.index(50) 3 1 4 2
    14·2 answers
  • Which of the following did you include in your notes?
    7·1 answer
  • What is the output of the following code:
    10·1 answer
  • 2. The On and Off states are represented by _____________ class 7 number system​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!