The set of instructions that define how to display the html elements in your site is:.

Answers

Answer 1

Answer:

CSS

Explanation:


Related Questions

What would be the result of sending the string AAAAAAAAAAAAAAAAAAAA into a variable that has allocated space for 8 bytes

Answers

The result of sending the string above into a variable that has allocated space for 8 bytes is that there will be Buffer Overflow Attacks.

What occurs when a string of data  sent to buffer is large?

A buffer overflow is also known as buffer overrun. This  is known to be a process that occurs when or if  the size of data is known to be more than the storage capacity of any kind of memory buffer.

Note that due to the overload, the program that is trying to write the data to the buffer will therefore overwrites to the adjacent memory locations.

Learn more about string from

https://brainly.com/question/26427527

Debate whether social networking is harmful or helpful to society.

Answers

Answer:

I believe that Social Networking IS helpful to society, but, people use it for wrong stuff.

Social networking can be both harmful and helpful to society.

Is social networking a double-edged sword for society?

Social networking has significantly changed the way people connect, share information, and interact. On one hand, it has facilitated global communication, allowed people to stay connected with friends and family, and provided a platform for sharing ideas and information.

It has also enabled social movements and activism, bringing together like-minded individuals to drive positive change. However, on the other hand, social networking can lead to issues like cyberbullying, privacy breaches, addiction, and the spread of misinformation.

Read more about social networking

brainly.com/question/1163631

#SPJ2

will choose one famous of animation and describe it
and add its picture.
-Why did you choose this character?

Answers

Answer: Toy Story 4

Explanation:this is great animated movie you should try it

What type of credentials should a network administrator base the security system around in order to protect the company's resources on an enterprise network

Answers

Answer:

What type of credentials should a network administrator base the security system around in order to protect the company's resources on an enterprise n … etwork You are using Automator, System Report, and Disk Utility as some of the tools for managing a fleet of laptops.

1. Network 5 Certification. Technology today is 'networked' - even in the literal sense. Networks have become an integral part

Explanation:

Which of these are correctly formatted python lists? check all that apply. list1=(race, cars, trucks, bikes) list2=[‘computer science’, ‘math’, ‘psychology’] list3=["programming 101", "intro to python"] list4=(‘summer’, ‘fall’, ‘winter’, ‘spring’) list5=[52, 24, 71, 72, 56]

Answers

Answer:

B,C,E

Explanation:

because i did it

these are pictorial images displayed on a computer screen​

Answers

Answerthats nice

(: -With Star

Explanation:

Why will advertising continue to grow in social media?


It is more persuasive than other types of advertising.


It is extremely appealing to consumers.


It reaches more people than mass media.


It is highly cost-effective.

Answers

Answer:

It is highly cost-effective

Explanation:

got it right on edge 2022

You are writing an algorithm and want to tell the computer what to do if the user does not perform an action. Which type of statement should you include in your algorithm?

Answers

Answer:

If-else statements.

Explanation:

If-else statements, also know as selection statements help computer programs make dicision on how to handle different events or inputs.

pseudo code will look something like this:

if (condition):

do 1, 2, 3, ...

else:

do 4, 5 , 6, ...

If-else statements, also know as selection statements help computer programs make dicision on how to handle different events or inputs.

What is Algorithm?

In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially.

All aspects of information technology employ algorithms extensively. A simple technique that resolves a recurring issue is typically referred to as an algorithm in mathematics and computer science. Algorithms are essential to automated systems because they serve as specifications for processing data.

An algorithm may be employed for simple tasks like sorting lists of numbers or for more challenging ones like suggesting user content on social media. The starting input and instructions for an algorithm's computation are often provided.

Therefore, If-else statements, also know as selection statements help computer programs make dicision on how to handle different events or inputs.

To learn more about Statement, refer to the link:

https://brainly.com/question/2285414

#SPJ7

A network administrator needs to allow employees to upload files to a remote server securely. What port should be allowed through the firewall

Answers

The port that the network administrator should use to allow employees to upload files to a remote server securely is Port 22.

What is Ports 22 in computer system?

A port is a virtual place in the operating system of a computer network where connections starts and ends.

Types of ports include:

well-known ports,registered ports andprivate ports.

Ports 22 is a common port number that is associated with secure shell login.

Port 22 was assigned to file transfer protocols(FTP) by the Internet Assigned Numbers Authority.

When employees needs to upload files to a remote server, Ports 22 should be used because it is secure and allows remote administration access to the server.

Learn more about computer ports here?

https://brainly.com/question/18133590

- What information do you obtain from the double digest XhoI/AlwNI? What is your expectation if the plasmid is a reclosed vector without an insert? What is your expectation if your plasmid has an insert in the correct orientation (how many bands, what are their sizes)? - What is your expectation if your plasmid has an insert in the incorrect orientation (how many bands, what are their sizes)?

Answers

Plasmids are used as vectors in recombination technology to transfer genes. Plasmids or the genes can be double digested by two restriction endonucleases simultaneously.

What are restriction endonucleases?

Restriction endonucleases are the enzymes that identify the precise DNA sequence to cleave them from the rest of the sequence.

If a plasmid is reclosed vector without an insert then only one band of size 2964 bp will be seen. A plasmid that has correct orientation will have two bands of sizes 1570 and 2100 bp.

If the plasmid has a sequence in incorrect orientation then will also result in two bands but of different sizes like 2740 bp and 940 bp.

Therefore, plasmids can be used as vectors.

Learn more about plasmids here:

https://brainly.com/question/17156726

#SPJ1

A program has 3500 loads, out of which 1680 are in cache. Consider the access time to cache of 1 cycle, access time to main memory of 200 cycles, and that the instructions not in cache are all in main memory. What is the average memory access time in number of cycles (AMAT)

Answers

Answer:

hope it helps!

Explanation:

answer is below

In what year did apple introduce the macintosh computer?.

Answers

Answer:

1984

Explanation:

You have implemented a network where each device shares files with all other devices on the network. What type of network do you have

Answers

Answer:

You have implemented a network where each device shares files with all other devices on the network. What type of network do you have?

✓ Peer-to-peer

Explanation:

✓ Peer-to-peer

Tracking your spending can help you

Answers

It can help you become more aware of what you are spending and where you are spending it. That can help you identify the areas where you need to make changes.

The following function is supposed to return -1 when x is negative, +1 when x is positive, or if x is zero. What, if anything, is wrong with the function? def plusMinusZero(x): if x == 0 : return 0 elif x <= 0 : return -1 else x >= 0 : return 1 A. A return statement must be added at the end of the function B. Both occurrences of elif must be replaced with if C. The <= and >= must be replaced with < and > D. Nothing is wrong with the function

Answers

def dx(fn, x, delta=0.001):

   return (fn(x+delta) - fn(x))/delta

def solve(fn, value, x=0.5, maxtries=1000, maxerr=0.00001):

   for tries in xrange(maxtries):

       err = fn(x) - value

       if abs(err) < maxerr:

           return x

       slope = dx(fn, x)

       x -= err/slope

   raise ValueError('no solution found')

Describe how redundancy and fault-tolerance have made the internet robust and scalable even amidst a global pandemic that caused a huge spike in internet traffic.

Answers

Redundancy and fault-tolerance is one that has been built onto systems so that they can be able to withstand any condition. They act as a form of back and working around issues.

What is Redundancy and fault-tolerance?

Redundancy is known to be the inputting of some key back-up elements into a system in the scenario where one part fails.

While Fault tolerance is known to be the capability of a system to still carry out its work around issues. This build up has helped made the internet robust and scalable even amidst a global pandemic that caused a huge spike in internet traffic.

Learn more about redundancy from

https://brainly.com/question/17880618

Rapid application development, the unified process, extreme programming, and scrum have led to ________. agile development systems development life cycle (SDLC) joint application development dynamic systems development model

Answers

Answer:

A

Explanation:

Rapid application development, the unified process, extreme programming, and scrum have led to ________. a. the dynamic systems development model. b. the systems development life cycle (SDLC) c. joint application development. d. agile development.

How to track a cell phone location without installing software on target phone?.

Answers

Answer:

maybe u can put a GPS on ur phone

iPhones come with "FindMy", and for android there’s a similar app called "Find My Device"

Enrique, a web developer, is creating a new website for a customer and is using Ruby to provide dynamic content for the web
pages. Which language type is he using?
Scripting
Compiled
Assembly
Machine

Answers

The development of the web pages for the website with the Ruby language is using scripting.

What is Ruby?

Ruby is the computer programming language and is used for the development of websites, software, and other applications with simple syntax.

The development of the website by Enrique is based on the formation of the syntax with the works that form the running of the application. He has been using scripting for the development of web pages. Thus, option A is correct.

Learn more about the Ruby language, here:

https://brainly.com/question/9966767

#SPJ1

14 points!!!!! Please hurry!

Web design incorporates several different skills and disciplines for the production and maintenance of websites. Do you agree or disagree? State your reasons.

25 to 50 words please!!!!

Answers

I do  agree with the statement because for one to be able to design a website for any field such as engineering, medicine, one must know about that field.

What is the statement about?

Web design is one that is known to be made up of a lot of skills and disciplines that is often used in the making and keeping of websites.

Conclusively,  Web design has a lot of parts that work together to develop  the finished work of a website making, such as graphic design, user experience design, and others.

Learn more about Web design from

https://brainly.com/question/25941596

#SPJ1

You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm that the reported problem is solved

Answers

Could be anything?
Maybe you get an email from them on their PC, which means they have internet

Hi there! I need a bit of help on my computer's assignment. Question is below!


[tex]\underline{\large\text{Question}}[/tex]

Selena would like go back to a page that she visited recently. She should use the _____.


A) links in the display window


B) scroll bar to scroll up through the pages


C) back button in the navigation bar


D) click on the back button in the display window


[tex]\underline{\large\text{Exceptions:}}[/tex]


The answer must:


- Be correct.

- Be well explained


The answer must not include:


- Spams

- Incorrect answers

- Incomplete explanation


Good luck :)

Answers

Answer:

The back button of the navigation bar

Explanation:

The back and forward buttons are standard on the many web browsers. The navigation bar is the same place where you type your URLs. In this case, Selena would use the back button to go back to an active window she had previously visited. It helps you move backward in the same order you previously made your visits.

Other Questions
A synapse is the specific location where ____________ is functionally connected to either another neuron or ____________ . There are two types of synapses in the human body: chemical synapses and electrical synapses. Most synapses within the nervous system are ____________ synapses. Find the center of the circle given by this equation: If f(x) = 1 / (3x 5), what is the inverse of f? I'll mark brainlist 50 pointsDescribe a plan for personal wellness. Include in your plan how you can help prevent disease and access health care and medical services at different stages of life. Make sure your plan is adaptable to changing health needs based on genetics, family history, and personal health behaviors. Who did the allies fight after the war in europe ended Who pushed the British out of Persia in the 1920s, and renamed the country Iran?Mahmoud AhmadinejadMustafa KemalAyatollah KhomeiniReza Pahlavi Listen to each sentence and write the infinitive of the subjunctive verb you hear.Audio Text1. Nous demandons que la chasse soit interdite.2. Ces gens exigent que le dboisement arrteimmdiatement.3. Les ingnieurs recommandent que nous fassions pluspour prserver le lac.4. Les gens prfrent que lagence fasse plusdcotourisme.5. Tu ne souhaites pas quils aient plus despace?6. Le professeur a suggr que vous preniez quelquespierres.Modele:You hear: Je veux que tu regardes la Lune ce soir.You write: regarder In the event a terminated or ineligible employee dies during the conversion period from a group life plan, whether they were going to elect individual coverage or not, a death claim will be paid by the group policy, less the premium due for the benefit, which means that the conversion period is really: During the second trimester of pregnancy, a woman who began her pregnancy at a healthy weight should increase her daily calorie intake by _____. Examine this image from Citizenship and read President Kennedys quote in the speech bubble. How does this quote reinforce the author's purpose in the book? It stresses the need for each citizen to take responsibility for his or her own well-being. It introduces the idea of citizens giving back more to the community than they take. It helps frame the idea that citizenship requires being actively involved in civic life. It states the theme that citizens and great leaders need to work together. help asap its for my sis mathh BRAINLIEST! please help me so much... im stuck... What was one similarity and one difference between the cultural achievements of early South American civilizations and the cultural achievements of the Kingdom of Axum?PLEASE write 1 paragraph It is important for researchers to use precise operational definitions when. is the following a statistical question? How many quarts are in a gallon?yes or no simplify each of the following fractions :25__30 How long are hard boiled eggs good for after peeled?. Which layer is responsible for creating data frames? 1 2 3 4 5 6 7 8 9 10 Which expression is equivalent to (x Superscript one-half Baseline y Superscript negative one-fourth Baseline z) Superscript negative 2?StartFraction x Superscript one-half baseline Over y z squared EndFractionStartFraction x Superscript one-half baseline Over y Superscript one-fourth Baseline z squared EndFractionStartFraction y Superscript one-half Baseline Over x z squared EndFractionStartFraction x z squared Over y Superscript one-half EndFraction What can reasonably be inferred about nitrogen fixation?Choose 1 answer:Fixed nitrogen ultimately reverts to its gaseous form.Nitrogen fixation can reduce the need for chemical fertilizers.Nitrogen-fixing bacteria can adapt to any plant species.Nitrogen fixation has little application in commercial agriculture. 55. A projectile of mass 2.0 kg is fired in the air at an angle of 40.0 to the horizon at a speed of 50.0 m/s. Atthe highest point in its flight, the projectile breaks into three parts of mass 1.0 kg, 0.7 kg, and 0.3 kg. The 1.0-kg part falls straight down after breakup with an initial speed of 10.0 m/s, the 0.7-kg part moves in the originalforward direction, and the 0.3-kg part goes straight up.At peak after explosionV3,f = (V3,1))At peak before explosionV=(V.x)xm3 = 0.3 kgm = 0.7 kgV2,1 = (v,1)m = 1.0 kgV = (50.0 m/s)v,f= -(10.0 m/s)40Launcha. Find the speeds of the 0.3-kg and 0.7-kg pieces immediately after the break-up.b. How high from the break-up point does the 0.3-kg piece go before coming to rest?c. Where does the 0.7-kg piece land relative to where it was fired from?