Answer:
B. You get predictable styles throughout the site without having to code each HTML tag.
Explanation:
CSS (Cascading Style Sheet); Allows you to style Html tags, classes and ID. CSS can be written directly in the HTML file alongside the tags or added to head of the HTML tag using the script tag or added as an external link.
Adding CSS as an external link you can use the same CSSto style mutiple html pages.
How is a source file different from a "listing file"?
The process of ensuring that web pages coded with new or advanced techniques still are usable in browsers that do not offer support for the newer features is called: validation valid enhancement progressive enhancement optimization
Progressive Enhancement remains to be a very powerful methodology that allows designing of web pages with more features. It is a strategy that builds web pages for the most modern web browsers. They then ensure that these modern web browsers work perfectly well with less functional browsers
In the lab, you created a Group Policy Objects Report and a Resultant Set of Policy Report that can be used to __________ the group policies
"write code that prints: countnum ... 2 1 your code should contain a for loop. print a newline after each number. ex: countnum
Which of the following illustrates an example of a Boolean data type?
Max needs to study more effectively to get a better grade on his next exam. What can he do to improve his study habits? Check all that apply.
Answer:
set aside specific times to study every day
get adequate sleep every night after studying
study in a quiet room with plenty of light
Explanation:
just finished the test
If a wire has insulation that allows it to operate in a temperature of up to 194 degrees Fahrenheit, what temperature will the wire operate up to in degrees Celsius?
Why should you run disk cleanup before running the optimize drives tool?
Given the code below, how many times would "I love C#" be output to the Console Window?
1
int counter = 10;
2
do {
3
Console.WriteLine("I love C#");
4
counter--;
5
}while (counter<5) ;
6
C#
0
1
10
11
Infinite Loop
_______ involves the number of images or cels that will be shown in a second.
CCD
Sampling
FPS
Animation
In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt the servers' answers to routine dns queries from other systems on that network.
Also known as DNS spoofing, this is a type of attack that exploits the Domain Name System to divert traffic away to legitimate servers. It inserts corrupt data into the cache database of the DNS server. In this attack, a hacker sends forged responses from an imposter DNS with an intention to reroute a domain name to a new IP address. This new IP is almost always controlled by the hacker.
To annotate a document with a remark for another reviewer to address, select the _____ feature.
An automotive engine's camshaft rotates at
A. one-quarter the speed of the crankshaft.
B. twice the speed of the crankshaft.
C. one-half the speed of the crankshaft.
D. the same speed as the crankshaft.
Answer: The correct answer is choice C - one-half the speed of the crankshaft.
Explanation: An automotive engine’s camshaft rotates at one half of the speed of the crankshaft. There are two full rotations of the crankshaft for each rotation of the camshaft.
Mobile phones that function as credit cards are called _____.
a. mobile wallets
b. e-caches
c. universal cards
d. bitcoins
Final answer:
Mobile phones that function as credit cards are known as mobile wallets, allowing users to make payments with their smartphones. A is correct.
Explanation:
The correct answer to the question "Mobile phones that function as credit cards are called _____" is a. mobile wallets. Mobile wallets are applications on smartphones that store payment information from credit or debit cards and allow users to make payments directly from their phones. This form of payment was especially useful during the COVID-19 pandemic as it helped reduce the handling of physical currency during transactions, thereby limiting the risk of virus transmission.
As we've seen an increasing trend towards a cashless society, mobile wallets have become a prominent feature. They represent a shift from traditional physical money to more abstract forms of payment, complementing other cashless options such as credit cards, online banking, and cryptocurrencies like Bitcoin.
While smart cards and electronic purses are related concepts, they involve using a physical card that stores value, whereas mobile wallets transform your mobile device itself into a payment instrument, making transactions even more accessible and seamless.
If you want to refine your Google search results by date, which option should you use?
Question 8 options:
News search
Simple search
Safe search
Advanced search
Do you see traffic flowing from the internet into your system or from your network to the internet? explain why or why not:
"the firewall acts as a proxy for which two types of traffic? (choose two.)"
The question above has multiple choices as follows
a) SSH
b) Non-SSL
c) SSL Inbound Inspection
d) SSL Outbound
The answer is C and D
To enable the firewall act as a proxy for these two types of traffic, it has to perform an SSL forward proxy decryption. The Network admin has to set up certificates needed to establish the firewall as a trusted 3rd party to the session that exists between client and server.
The firewall can use self-signed certificates to authenticate SSL session with the client.
A firewall acts as a proxy for HTTP and VPN traffic.
Explanation:A firewall acts as a proxy for two types of traffic: HTTP and VPN.
HTTP traffic: When acting as a proxy for HTTP traffic, the firewall intercepts requests from clients and forwards them to the appropriate web server. It also receives the response from the web server and forwards it back to the client. This allows the firewall to inspect and filter web traffic, providing an extra layer of security.VPN traffic: When acting as a proxy for VPN traffic, the firewall receives encrypted data from VPN clients and decrypts it. Then, it forwards the decrypted data to its destination. Similarly, when data is received from the destination, the firewall encrypts it and sends it back to the VPN client. This allows the firewall to control and secure VPN connections.To locate all locations in a document with the word "employer" and replace it with "company," you should use the _____ function.
What is the software called that allows the user to create, access, and manage a database? question 8 options:
a.dlp
b.dbms
c.oo model
d.relational model?
Which research questions would be the most effective for researching the Ford Model T? Check all that apply.
A. How was the Ford Model T built?
B. What speed did the Ford Model T reach?
C. How did the Ford Model T change American society?
D. What were some challenges associated with owning a Ford Model T?
E. How much did the Ford Model T cost?
The research questions that would be the most effective for researching the Ford Model T are:
A. How was the Ford Model T built?
C. How did the Ford Model T change American society?
D. What were some challenges associated with owning a Ford Model T?
What are the research questions?"A question that a research effort sets out to answer" is what is meant by a research question. Both quantitative and qualitative research requires a well-chosen study question.
Data gathering and analysis are necessary for the investigation, and there are many methodologies for doing so.
To write good research questions, follow these steps: focused and lucid To put it another way, the question should make it apparent what the writer must do. Neither too wide or too narrow.
Therefore, the correct options are A, C, and D.
To learn more about research questions, refer to the link:
https://brainly.com/question/25655057
#SPJ2
1. The first popular animated feature film was 1937’s Snow White and the Seven Dwarfs. (1 point)
true
false
2. Who caught attention of the work of Alexander Schure? (1 point)
Walt Disney
the president
Steven Spielberg
George Lucas
3. Which of the following is a storyboard? (1 point)
graphic organizer that contains illustrative images arranged in certain sequences
motion picture with no 3-D animation present
illustration for children’s book
interactive media
4. 3-D printing has been hailed as the phenomenon that will bring forth which of the following? (1 point)
new and improved informational storage systems
the fourth Industrial Revolution
gravity defying shoes
cloud-based programming
5. Which of the following is 3-D printing? (1 point)
the process of making a physical object from a 3-D model, usually by creating a single layer at a time
the only thing that a 3-D artist does
a computer simulation to replicate various human activities
technology products or services on their introduction to an already established niche that changes established markets and establishes new ones
6. Which of the following started the home video game industry by creating the first video game console? (1 point)
Nintendo Wii®
Super Mario Bros.®
Atari®
PlayStation®
7. The kids of the 1980s basically played with two-dimensional sticks, dots, and quadrilateral-shaped characters.
(1 point)
true
false
8. France and Japan produced some of the earliest examples of animation. (1 point)
true
false
9. In the 1980s, working with CAD was exactly the same as it is today. (1 point)
true
false
10. Which of the following is Computer Animation Production System (CAPS)? (1 point)
a drawing program only useful for graphic designers
layering for animation
software specifically designed to aid with 2-D and 3-D modeling
a video game that allows you to see in 3-D
11. Who is Steven Spielberg? (1 point)
a science fiction writer
a computer animator
an American director, producer, and screenwriter
one of the Wise Old Seven
12. Pixar Studios® is responsible for animated movies such the Toy Story franchise, Finding Nemo, and Monsters University.
(1 point)
true
false
13. 3-D modeling, simulation, and artificial intelligence will allow for law-enforcement agents to do which of the following? (1 point)
pull over more cars that are speeding
run faster to catch criminals
recreate crime scenes
read the human mind
14. Walt Disney used a computer graphics lab at the college he founded, New York Institute of Technology, to push computer animation forward. (1 point)
true
false
15. Which of the following is a robotics team? (1 point)
a team working together to build robots
a team of teacher robots
a team of personal chefs that use robots
members of a 3-D Arts department
These are the correct statements about the film industry and about technology:
TrueGeorge LucasGraphic organizer that contains illustrative images arranged in certain sequencesThe fourth Industrial RevolutionThe process of making a physical object from a 3-D model, usually by creating a single layer at a timeAtariFalseTrueFalseSoftware specifically designed to aid with 2-D and 3-D modelingAn American director, producer, and screenwriterTrueRecreate crime scenesFalseA team working together to build robotsFilm industry: 3D printer technologyIn this exercise, there are a lot of questions about the film industry and also about specific technology such as the 3D printer.
3D printers are very useful for the film industry. They are used to create prototypes of different things that are then used in the movies because a 3D printer allows to print many different versions of the same prototype and allows comparisons.
Check more information about the film industry here https://brainly.com/question/1212208
Access control is more of a problem for wired lans than for wireless lans.
a. True
b. False
This answer is false because usually a wired LAN tends to be less problematic than a wireless LAN. Not only does a wired LAN provide better efficiency and security than wireless but also it usually tends to have lesser fluctuations. For example, a wireless LAN can have problems with its portable battery, the strength of its Wi-Fi signals, radio-electric signal discrepancy. None of these issues exist in a wired setup.
Header and footer elements such as worksheet name, current date, and time are _____ elements, they change as your worksheet does.
Header and footer elements like worksheet name, current date, and time are dynamic elements that change as your worksheet does. The Correct Answer Is Dynamic elements
In Excel, headers and footers can contain various data such as worksheet names, current dates, and times, which are all considered dynamic elements. These elements automatically update as your worksheet changes.
For example, if you insert the current date into a header, it will always display the actual current date whenever you open or print the worksheet.These features ensure that your document maintains accurate and up-to-date information, without manual updates each time.
Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining the security of all the computers that are part of the company's network. melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.
Two small engine technicians are disassembling the engine shown in Figure A-9. After observing the engine components, both technicians say that this engine has a splash-type lubrication system. Technician A says that the engine uses a dipper that's attached to the connecting rod to splash oil from the crankcase onto its components. Technician B says that engine uses a slinger that's driven by the timing gears to splash oil onto its components. Which of the following statements is correct?
Which feature will mark all formatting changes made to a document?
You can see who has been making changes in a document by turning on the track changes feature. When this feature is turned on, MS word will mark up new changes made to the document. Click on the review tab, tracking group and then select the track changes.
If you would like to accept all formatting changes but not text, you will follow the same procedure and on the track changes option, you will click on show markup and then turn off all check marks apart from the formatting check mark.
Answer:
track changes
Explanation:
Chelsea wants to know about the requirements for being a lab technician. Where could she find that information?
In resources at her school or public library
What is the smallest gear in a gearbox?
A. Rack Gear
B. Wheel Gear
C. Pinion Gear
D. Worm Gear
E. Spur Gear
In a gearbox, the smallest gear is referred to as the Pinion Gear, usually the driver gear, which engages with larger gears or racks to transmit motion and create a mechanical advantage in torque.
The smallest gear in a gearbox is the C. Pinion Gear. A pinion is typically the smallest gear in a gear set and works in conjunction with larger gears or racks. When comparing gears such as worm gears, spur gears, and rack-and-pinion systems, the pinion would be the smaller driver gear in terms of the physical size and number of teeth.
Worm gears, for instance, consist of a worm that drives a worm wheel, which tends to be larger. Similarly, in a set of spur gears or a rack-and-pinion system, the pinion gear is the one that transmits motion to the larger gear(s) or rack. Gear ratios help us understand this relationship, as a small driver (pinion) gear will rotate more times to cause one rotation of a larger driven gear, demonstrating a mechanical advantage in torque.
What is zenmap typically used for? how is it related to nmap? describe a scenario in which you would use this type of application?
Zenmap is the graphical User Interface representation for NMAP Security Scanner. It is an open-source program designed to make NMAP easy for starters to use. Typically, it is used to collect and identify a list of hosts, OS, as well what services are running on them by using a port scanning tool. It is used specifically for the scanning and vulnerability phase of ethical hacking.
A network administrator who wishes to audit all the devices on a specific IP scheme in a network can use NMAP. The admin can go ahead and scan the ports to know exactly which ports are closed and which are opened.
The chart shows an example of a study-time survey. Students can use the formula shown in the survey to figure out ways to track when assignments are due. ways to prioritize tasks for a project. how many hours they can socialize. how many hours they can work on a project.
Answer: how many hours they can socialize
Explanation: