subject

Which of the following is true about css? a. a seperate css file is needed for each html file in a website. b. it is a language used to customize web pages based on user preferences. c. it is contained in a seperate file than html files. d. it is used to combine formatting information and content into one single file. in the following piece of css code, what is the rule? p { color: #676767 } a. #676767 b. color c. p d. p { color: #676767 } what is the following an example of? p { color: $676767 } a. property b. rule c. selector d. value in the following pieces of css code, what is body called? body { color: # } a. property b. rule c. selector d. value in the following piece of css code, what is the property selector? body { body: # baclground-color: #525252 font-family: arial, "lucida console", sans-serif } a. body b. background-color c. color d. font-family

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 13:30
Me ! evelyn is a manager in a retail unit. she wants to prepare a report on the projected profit for the next year. which function can she use? a. pmt b. round c. division d. what-if analysis
Answers: 2
question
Computers and Technology, 24.06.2019 21:30
Computer security/cybersecurity1) each of the following code fragments contains a number of security vulnerabilities. for each fragment, identify these security vulnerabilities and, for each vulnerability, discuss at least one way that it could be improved. note that in your discussion of how each vulnerability could be improved, you do not need to re-write a new version of the program in c; simply discuss your solution, either in pseudocode or in 1-2 sentences.a) /* file descriptor leak */#include #include int main(int argc, char *argv[]){ char *filepath = argv[0]; char *shellpath = argv[1]; file *passwords; passwords = fopen(filepath, "r"); /* read the password and do something with it */ /* . . */ /* fork and execute alternative shell */ execl(shellpath, "shell", null); }b)#include /* assume the following function is written for an electronic storefront. the user will enter the id of the item to be ordered, as well as the quantity of units that they would like to purchase. the program will then lookup the price for the price for the item using a predefined function, and return the total cost of the order.*/int gettotalcost(){ char itemid[9]; int price, unitsordered, cost; printf(" enter the 9-digit id of the item to be ordered: "); scanf("%s", & itemid); /* lookup the price according to the itemid */ price = getpricebyid(itemid); printf(" enter the quantity of units to be ordered: "); scanf("%d", & unitsordered); cost = price * unitsordered; return cost; }c)#include /* the following function is intended to return a user's full name by concatenating the user's first and last name into a single string and then returning that string. */char *getfullname(char *firstname, char *lastname, int max_len){ char fullname[max_len]; strcpy(fullname, firstname); strcat(fullname, " "); strcat(fullname, lastname); return fullname; }d)#include /* the following code snippet runs through the list of cli arguments entered and displays them to the console. */int main(int argc, char *argv[]){ int i; printf("you've entered the following arguments: "); for(i = 0; i < argc; i++){ print(argv[i]); printf("\n"); } /* */}
Answers: 2
question
Computers and Technology, 25.06.2019 04:20
Austin rare coins, inc., buys and sells rare coins, bullion, and other precious metals through eight web sites with different domain names. an unknown individual took control of austin's servers and transferred the domain names to another registrant without austin's permission. the new registrant began using the domain names to host malicious content—including hate letters to customers and fraudulent contact information—and to post customers' credit-card numbers and other private information, thereby tarnishing austin's goodwill. austin filed a suit in a federal district court against the new registrant under the anticybersquatting consumer protection act. is austin entitled to a transfer of the domain names? austin rare coins, inc., buys and sells rare coins, bullion, and other precious metals through eight web sites with different domain names
Answers: 3
question
Computers and Technology, 25.06.2019 11:30
What is a wiki farm? a.) a hosting service that allows you to build a wiki. b.) a collection of servers that store wiki search queries. c.) an association of wiki hosting companies. d.) a wiki created using environmentally friendly material.
Answers: 2
You know the right answer?
Which of the following is true about css? a. a seperate css file is needed for each html file in a...
Questions
question
Mathematics, 28.01.2021 08:20
question
Mathematics, 28.01.2021 08:20
question
Spanish, 28.01.2021 08:20
question
Mathematics, 28.01.2021 08:20
question
Mathematics, 28.01.2021 08:20
question
History, 28.01.2021 08:20
Questions on the website: 13722363