1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
2 years ago
7

5. An external CSS file is saved with D. Answer the following questions. 1. Explain the purpose and advantages of using CSS.​

Computers and Technology
1 answer:
jekas [21]2 years ago
7 0
When you create a single, simple web page, you can tag each item (such as a heading or a paragraph) with whatever font, size, color, and so on that you like. It's simple HTML.

If someone then asks, "Can we use a different font for the headings?" it's a 10-minute edit.

But when you have a site with a thousand pages of corporate content and your boss arrives to tell you that head-office has determined that the "corporate style" of such-and-such font must be applied to every web page...

Then you'll have a week's worth of work ahead of you.

When they tell you that the web page must utilize a different font and color in India than the rest of the world...

You're dealing with a nightmare.

CSS takes all of the scattered formatting and layout information from the real documents and centralizes it into "style sheets."

Now, if all of your web pages are constructed correctly with CSS, you can change the font, color, size, or anything else - possibly the entire look and feel of your website - with a single-line update in the CSS file.

This concept of separating the "data" from the "presentation style" is quite powerful...

Even on a small website, there is justification in doing so.
You might be interested in
Query " frosty the snowman
julsineya [31]
I don't think that is a query...
5 0
3 years ago
Innovation made from establishment of abucas to the present 5th
Minchanka [31]

Answer:

Douglas-fir, spruce, true fir, beech, and maple are toward the top of the list for oxygen release.Douglas-fir, spruce, true ...

4 0
3 years ago
16. If a user can make modifications to database objects, what permission has that
Vsevolod [243]

B

Explanation:

The Alter command is used when we want to modify a database or object contain in database.

5 0
2 years ago
When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?
kumpel [21]

Answer:

The essence including its issue is listed in the interpretation subsection below.

Explanation:

  • Representing means the practice of someone using abstract, tangible as well as pictorial symbols as well as phrases and related circumstances to discuss ideas and express comprehension.
  • Representing fractions could indeed be overcome in almost the same manner as the positive factors of twice represented integers are using the negative factors of two to summarize to essentially fractional amounts.
4 0
3 years ago
3. Wi-fi connections have limited range of :
Tamiku [17]

Answer: D) 300 metres would be my choice because our wifi can only go that far outdoors, inside wifi can only travel up to 150 metres.

Explanation: Hope this helps! Have a wonderful day!

Don’t forget to thanks & Brainliest is always appreciated!

3 0
2 years ago
Other questions:
  • A url consists of a ____, a domain name, sometimes the path to a specific web page or location in a web page, and the web page n
    11·1 answer
  • Write a statement that reads 5 successive integers into these variables that have already been declared : x1 x2x3x4 x5. Then wri
    7·1 answer
  • Properly defined the primary part of a CPU​
    5·1 answer
  • Describe any four rights of users of information systems.
    8·1 answer
  • I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
    13·1 answer
  • The communication channel used in IMC must rev: 12_06_2018_QC_ CDR-223 Multiple Choice match the traditional channel used in tha
    14·1 answer
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • Write a function that takes as input a single integer parameter n and computes the nth Fibonacci Sequence number. The Fibonacci
    8·1 answer
  • If you play gta and don't know the song ''Glamorous'' Then what do you even do when you play?
    6·2 answers
  • Group of programs are software <br>​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!