_____ are used to associate a style sheet or style rule with a specific device or list of device features. a)Flexible layouts b)Responsive images c)Viewports d)Media queries

Answers

Answer 1

Media queries are used to associate a style sheet or style rule with a specific device or list of device features.

What is Media queries ?CSS 3's media queries feature enables content rendering to adjust to various circumstances, like as screen resolution (e.g. mobile and desktop screen size). In June 2012, the W3C suggested standard was established, and it is a key technology for responsive web design (RWD).The first draught of media queries appeared in Hkon Wium Lie's CSS proposal in 1994, but they were not included in CSS 1. A historical example of how media queries can be added in the future is the HTML4 Recommendation from 1997. W3C began working on media queries and another device support scheme called CC/PP in 2000. Both approaches deal with the same issue, however CC/PP is server-focused, whereas media queries are browser-focused.

To learn more about Media queries refer to:

https://brainly.com/question/27903045

#SPJ4


Related Questions

Discuss some of the ways in which analytics assist information systems management as well as the organization at large. What kinds of data are most useful and how is it gathered? How do managers protect customers, clients, and even employees’ personally identifiable information in order for those who may not have permission to view it? How is the data secured in general?

Answers

The ways in which analytics assist information systems management as well as the organization at large are:

It often personalize one's customer experience. It make better business decision-making. It often Streamline operations. It lowers Mitigate risk as well as handle setbacks.

What kinds of data are most useful and how is it gathered?

The types of data that to be most useful to firms are:

Customer dataIT data internal financial data.

They can be gathered through:

Online poolsSurveysTransactional TrackingObservation, etc.

Note that data is secured in general through the use of good security measures and also through security technology.

Learn more about analytics from

https://brainly.com/question/28376706
#SPJ1

1) Which of the following would you NOT see on a Windows 10 Start menu?
O Power
O Task View
O tiles
o
apps list
Next Question

Answers

Task view

I hope this helps you :)

Passive devices _____ require any action from the occupants. A. Do not B.Sometimes C.Rarely D.Occasionally

Answers

Answer:

D:

Explanation:

I think, but double check!

Have a nice life and I hope you get full marks on your test/paper/work!

:)

When you use a rest area, you should:
A. Make sure your windows are closed tightly
B. Stop in a dark place where you can sleep
C. Walk around your car after resting
D. Sleep with the windows rolled down

Answers

The answer would be A.
The rest seem impractical.
The answer is A because you need to make sure you’re safe before resting

Workers at a particular company have won a 7.6% pay increase retroactive for six months. Write a program that takes an
employee's previous annual salary as input, and outputs the amount of retroactive pay due the employee, the new annual
salary, and the new monthly salary. For example:

Answers

The C++ code for the program in question will be as follows:

#include <iostream>

using namespace std;

int main()

{

double oldSalary, retroSalary, newSalary, increaseSalary, newMonthlySalary;

const double payIncrease = .076;

 

cout << "Enter your old annual salary." << endl;

cin >> oldSalary;

newSalary = (oldSalary * .076) + oldSalary;

increaseSalary = newSalary - oldSalary;

newMonthlySalary = newSalary / 12;

retroSalary = (oldSalary / 2) * payIncrease;

cout << endl;

cout << "Your new annual salary is: $" << newSalary << endl;

cout << "You received a $" << increaseSalary << " increase in salary." << endl;

cout << "You will receive $" << retroSalary << " in retroactive salary." << endl;

cout << "Your new monthly salary is: $" << newMonthlySalary << endl;

return 0;

}

What is C++ programming? Why is it useful?

Applications with great performance can be made using the cross-platform language C++. As a C language extension, it was created by Bjarne Stroustrup. With C++, programmers have extensive control over memory and system resources.

Given that C++ is among the most widely used programming languages in use today and is used in embedded devices, operating systems, and graphical user interfaces, it is helpful. C++ is portable and may be used to create applications that can be converted to other platforms since it is an object-oriented programming language, which gives programs a clear structure and allows code to be reused, reducing development costs.

To learn more about C++, use the link given
https://brainly.com/question/24802096
#SPJ1

Although it is not a term Excel uses, how do most people think of Excel?

Answers

They think of it as a spreadsheet

Most people think of Excel as a spreadsheet software. Therefore option C is correct.

Excel is widely known and used for its powerful spreadsheet capabilities, allowing users to create, organize, and analyze data in tabular form.

It provides a grid-like interface where data can be entered into cells, and users can perform various calculations, create formulas, and generate charts and graphs based on the data.

Excel's spreadsheet functionality makes it a versatile tool for various tasks, from basic data entry and calculations to complex data analysis, financial modeling, and business planning.

While it offers features like charts and lists, its core identity lies in being a robust spreadsheet application, making it one of the most popular and essential software tools for businesses, academics, and individuals worldwide.

Therefore option C is correct.

Know more about Excel:

https://brainly.com/question/30324226

#SPJ3

Your question is incomplete, but most probably your full question was.

Although it is not a term Excel uses, how do most people think of Excel?

Select an answer:

a) as an analytical tool

b) as a set of charts

c) as a spreadsheet

d) as a set of lists

Which of the following is true about how the packets will arrive at her computer

Answers

Answer:

yes

Explanation:

:)

What is the missing term?
class raft:
def __init__(
,capacity):
self.capacity = capacity
self.location = 'Gauley'
self.repairs = []

Answers

The missing term in the code is the constructor method's name, which should be __init__.

What is this method used for?

This method is used to initialize the object's attributes when an instance of the raft class is created.

In this case, the __init__ method takes a parameter called capacity, which is used to set the capacity attribute of the raft object. The method also initializes the location attribute to 'Gauley' and the repairs attribute to an empty list.

Overall, this code defines a raft class with three attributes: capacity, location, and repairs. The __init__ method is used to set the initial values of these attributes when a new raft object is created.

Read more about programming here:

https://brainly.com/question/26134656

#SPJ1

how can you protect yourself from internet hoaxes

Answers

Someone can protect himself from internet hoaxes by using online sites to confirm or expose potential hoaxes.

What is an internet hoax?

On the internet, hoaxes are fairly common. Even with contemporary digital technologies, such as social media, a lot of disinformation is now spreading at a faster and wider rate.

It is critical that we, as individuals, parents, and instructors, are aware of the possibilities of disturbing news about children and that the internet could be a hoax.

There are many fraudulent activities on the internet, and it is critical to protect yourself from them. There are strategies and online resources available to assist you in identifying and responding to a potential hoax.

Therefore, Internet hoaxes can be avoided by using online services to confirm or expose suspected hoaxes.

To learn more about internet hoaxes, refer to the link:
https://brainly.com/question/25915602

#SPJ1

In Coral Code Language - A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given the caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours.

Ex: If the input is 100, the output is:

After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
Note: A cup of coffee has about 100 mg. A soda has about 40 mg. An "energy" drink (a misnomer) has between 100 mg and 200 mg.

Answers

To calculate the caffeine level after 6, 12, and 18 hours using the half-life of 6 hours, you can use the formula:

Caffeine level = Initial caffeine amount * (0.5 ^ (time elapsed / half-life))

Here's the Coral Code to calculate the caffeine level:

function calculateCaffeineLevel(initialCaffeineAmount) {

 const halfLife = 6; // Half-life of caffeine in hours

 const levelAfter6Hours = initialCaffeineAmount * Math.pow(0.5, 6 / halfLife);

 const levelAfter12Hours = initialCaffeineAmount * Math.pow(0.5, 12 / halfLife);

 const levelAfter18Hours = initialCaffeineAmount * Math.pow(0.5, 18/ halfLife);

 return {

   'After 6 hours': levelAfter6Hours.toFixed(1),

   'After 12 hours': levelAfter12Hours.toFixed(1),

   'After 18 hours': levelAfter18Hours.toFixed(1)

 };

}

// Example usage:

const initialCaffeineAmount = 100;

const caffeineLevels = calculateCaffeineLevel(initialCaffeineAmount);

console.log('After 6 hours:', caffeineLevels['After 6 hours'], 'mg');

console.log('After 12 hours:', caffeineLevels['After 12 hours'], 'mg');

console.log('After 18 hours:', caffeineLevels['After 18 hours'], 'mg');

When you run this code with an initial caffeine amount of 100 mg, it will output the caffeine levels after 6, 12, and 18 hours:

After 6 hours: 50.0 mg

After 12 hours: 25.0 mg

After 18 hours: 12.5 mg

You can replace the initialCaffeineAmount variable with any other value to calculate the caffeine levels for different initial amounts.

for similar questions on Coral Code Language.

https://brainly.com/question/31161819

#SPJ8

Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)

if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):

Answers

The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):

In the given statement, the condition is that a person should be 18 years or older in order to vote.

The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.

This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.

Let's analyze the other if statements:

1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.

However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.

2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.

Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.

3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.

While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.

For more questions on Boolean condition

https://brainly.com/question/26041371

#SPJ8

Which is an example of an operating system

a
Adobe Photoshop

b
Internet Explorer

c
Windows

d
Microsoft Word

Answers

Answer:

windows

Explanation:

Examples of Operating Systems

Some examples include versions of Microsoft Windows (like Windows 10, Windows 8, Windows 7, Windows Vista, and Windows XP), Apple's macOS (formerly OS X), Chrome OS, BlackBerry Tablet OS, and flavors of Linux, an open-source operating system.

QUESTION NO-1: The Highest quality printer is dot-matrix True False Prev​

Answers

It is false that the Highest quality printer is basically dot-matrix.

What is dot-matrix?

A dot matrix is a patterned 2-dimensional array used to represent characters, symbols, and images.

Dot matrices are used to display information in most types of modern technology, including mobile phones, televisions, and printers. The system is also used in the textile industry for sewing, knitting, and weaving.

Dot-matrix printers are an older technology that uses pins to strike an ink ribbon in order to print characters and images on paper.

While dot-matrix printers are capable of producing multi-part forms and have low operating costs, they are generally regarded as having lower print quality when compared to more modern printer technologies.

Thus, the given statement is false.

For more details regarding dot-matrix, visit:

https://brainly.com/question/4953466

#SPJ9

What are the two types of programming languages?

Answers

Answer:

High level language.

Low level language

Explanation:

please give brainliest

Benny is writing a program to design t-shirts. Which of the following correctly adds a new instance of style?

newStyle = "Style"
newStyle = Style()
newStyle: Style()
newStyle + Style()

Answers

newStyle = Style()

This would work in Python

In JavaScript/TypeScript it is
newStyle = new Style()

I need them on this question

I need them on this question

Answers

Answer:

Extended wear contacts. ...

Toric contacts. ...

Colored (tinted) contacts

Explanation: hope this helps

HELPPPP THESE STATEMENTS DESCRIBE DTP

HELPPPP THESE STATEMENTS DESCRIBE DTP

Answers

The correct statements that describe  DTP (Desktop Publishing) are:

DTP treats graphics and text boxes differently.

DTP lets you resize and rotate graphics.

DTP helps workers produce documents that improve communication.

What is the statements that describe DTP.

DTP  refers to the process of utilizing specialized operating system and finishes to create and design miscellaneous types of documents, in the way that brochures, flyers, newsletters, papers, books, and added printed fabrics.

DTP spreadsheet allows consumers to integrate text, representations, drawings, and other components to form visually attractive and professionally formatted documents.

Learn more about   Desktop Publishing from

https://brainly.com/question/7221406

#SPJ1

Question #2

Multiple Select

These statements describe DTP.

DTP treats graphics and text boxes differently.

DTP lets you resize and rotate graphics.

DTP helps workers produce documents that improve communication.

Many DTP features are included in WP programs.

WP and DTP are the same.

This is to be done in java
Task 1: Write a car class - this is a prototype or blueprint for many different cars that will follow the same basic type of pattern. Your car class should have 4 fields that describe characteristics of a car including model, make, year, color, speed, velocity.

Possible values for each field:
Model: Wrangler, Grand Cherokee, Camry, Corolla, Corvette, Bolt
Make: Jeep, Toyota, Chevrolet
Year: 1946, 2022
Color: red, blue, silver
Speed: 25, 25, 55, 75,100

Task 2: Your car class should also have several methods - assuming it has a rider to do them, the car can have certain behaviors or actions that it can take. Add the methods to accomplish the following:

Set a speed (could take an integer in mph)
Calculate a speed (could take a distance in miles and a time in hours)
Get a speed (in mph)

Task 3: Create a constructor that takes four parameters for your car class and initializes speed to 0.

Write a main method and inside it, invoke a new car object for every person at your table. Print a complete ‘description’ of each car to the console using the System.out.println and toString methods. Each car should be unique, so be creative with the color choice.

Task 4: Agree on the value of and create a speedLimit field for your car class and create two public methods to get and change the value of the speed limit.

Task 5: Draw the UML representation of the class that you have created.

IndividualTask 6: Create a class method that is named isSpeeding that takes as arguments a distance in miles, a time in hours and a Car to determine whether the car is speeding. Ask your colleges how fast they want to go to the beach and determine whether they would be speeding. Assume the beach is 330 miles away.

IndividualTask 7: Draw the UML Diagram for your class.

Please respond ASAP

Answers

Using the knowledge in computational language in python it is possible to write a code that write a car class - this is a prototype or blueprint for many different cars that will follow the same basic type of pattern.

Writting the code:

public class Car {

     private String model, make, color;

   private int year, speed, speedLimit;

     public void setSpeed(int speed) { this.speed = speed; }

   public int calculateSpeed(int miles, int hours) {

            return (int)(Double.valueOf(miles) / hours);

   }

    public int getSpeed() { return speed; }

   public Car(String model, String make, String color, int year) {

          this.model = model;

       this.make = make;

       this.color = color;

       this.year = year;

            this.speed = 0;

              this.speedLimit = 35;

   }

   // method that returns a string representation of the object

   public String toString() {

       return "Model: " + model + ", Make: " + make + ", Color: " + color +

           ", Year: " + year + ", Speed: " + speed + " mph";

   }

   // method to get the value of speed limit

   public int getSpeedLimit() {  return speedLimit; }

   // method to change the value of speed limit

   public void setSpeedLimit(int limit) { speedLimit = limit; }

     public boolean isSpeeding(int miles, int hours) {

              int carSpeed = calculateSpeed(miles, hours);

           if(carSpeed > speedLimit)

           return true;

       else

           return false;

   }

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

This is to be done in javaTask 1: Write a car class - this is a prototype or blueprint for many different

describe source code escrow​

Answers

Answer:

Source code escrow is the deposit of the source code of software with a third-party escrow agent.

what are demographics

Answers

Answer:

What Is Demographics? Demographic analysis is the study of a population based on factors such as age, race, and sex. Demographic data refers to socio-economic information expressed statistically including employment, education, income, marriage rates, birth and death rates and more

Explanation:

Yea

Answer:

The Characteristics of a population of people

Explanation:

learned it in class

A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events: Date and time Source Event ID 12/26/2019 11:37:21 PM Microsoft Windows security auditing 14771 Keywords Kerberos pre- authentication failed. Kerberos pre- authentication failed. Kerberos pre- authentication failed. 12/26/2019 11:37:21 PM Microsoft Windows security auditing 4771 12/26/2019 11:37:22 PM Microsoft Windows security auditing 4771 To better understand what is going on, the analyst runs a command and receives the following output: name lastbadpasswordattempt badpwdcount John. Smith 12/26/2019 11:37:21 PM 7 Joe. Jones 12/26/2019 11:37:21 PM 13 Michael. Johnson 12/26/2019 11:37:22 PM 8 Mary.Wilson 12/26/2019 11:37:22 PM 8 Jane. Brown 12/26/2019 11:37:23 PM 12 Based on the analyst's findings, which of the following attacks is being executed? A. Credential harvesting B. Keylogger C. Brute-force D. Spraying

Answers

Attacks involving credential stuffing are being carried out. on the results of the analyst.

What makes credential stuffing different from brute force?

In other words, brute forcing is the process of guessing a password by trying various passwords on one or more accounts. When referring to utilising known (breached) login and password pairs against other websites, this is known as credential stuffing.

Is credential stuffing a common occurrence?

Because 65% of users reuse the same password across multiple (and occasionally all) accounts, credential stuffing assaults are one of the most frequent sources of data breaches. In fact, attempts at credential stuffing account for approximately half of all login requests we receive daily on the Auth0 platform alone.

To know more about credential stuffing visit :-

https://brainly.com/question/14880501

#SPJ4

What are the primary differences between information systems and technology?
Information systems collect, store, and process
whereas technology enables
to improve efficiency.

Answers

Answer:

The difference between information systems and information technology is that information systems incorporates the technology, people and processes involved with information. Information technology is the design and implementation of information, or data, within the information system.

Explanation:

You just figured out the root cause of an application error. You changed some configurations on the affected machines and verified that the users have full functionality. What should you do next?

Answers

After resolving the application error and verifying that users have full functionality,the next step   is to document the changes made and the steps taken to resolve the issue.

How is this so?

This documentation   is crucial for future reference, troubleshooting, and knowledge sharing within the team.

Also, it is important tocommunicate the resolution to the relevant stakeholders,such as users or supervisors, to ensure they are aware of the resolution and can provide f  eedback if necessary.

Learn more about application error at:

https://brainly.com/question/30062195

#SPJ1

What are not acceptable notes?

Answers

Answer:

err

Explanation:

Write notes in your own words instead of copying down information from the book. Avoid over-highlighting. Highlighting doesn't do much to actively engage the brain, so it's not the most useful strategy. Also, highlighting too much can keep you from focusing on the main ideas.

Let's play Silly Sentences!

Enter a name: Grace
Enter an adjective: stinky
Enter an adjective: blue
Enter an adverb: quietly
Enter a food: soup
Enter another food: bananas
Enter a noun: button
Enter a place: Paris
Enter a verb: jump

Grace was planning a dream vacation to Paris.
Grace was especially looking forward to trying the local
cuisine, including stinky soup and bananas.

Grace will have to practice the language quietly to
make it easier to jump with people.

Grace has a long list of sights to see, including the
button museum and the blue park.

Answers

Answer:

Grace sat quietly in a stinky stadium with her blue jacket

Grace jumped on a plane to Paris.

Grace ate bananas, apples, and guavas quietly while she listened to the news.

Grace is the name of a major character in my favorite novel

Grace was looking so beautiful as she walked to the podium majestically.

Grace looked on angrily at the blue-faced policeman who blocked her way.

Sir Tim Berners-Lee wrote the three fundamentals for the Web. What are these three fundamentals? Choose the answer. OO HTMT, IP, URL (or URI) HTML, HTTP, URR HTTP, HTML, IP HTML, HTTP, URL (or URI)​

Answers

Answer:

HTML, HTTP, and URI/URI

Explanation:

In 1990, Berners-Lee developed three fundamental technologies: HTML, HTTP, and URI/URL; which remain the core of the web as we know it today.

Hope it helped! :)

And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase

Answers

There were 5 staff members in the office before the increase.

To find the number of staff members in the office before the increase, we can work backward from the given information.

Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.

Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.

Moving on to the information about the year prior, it states that there was a 500% increase in staff.

To calculate this, we need to find the original number of employees and then determine what 500% of that number is.

Let's assume the original number of employees before the increase was x.

If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:

5 * x = 24

Dividing both sides of the equation by 5, we find:

x = 24 / 5 = 4.8

However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.

Thus, before the increase, there were 5 employees in the office.

For more questions on staff members

https://brainly.com/question/30298095

#SPJ8

PLEASE SOMEONE ANSWER THIS

If the old code to a passcode was 1147, and someone changed it, what would the new code be?


(It’s no version of 1147, I already tried that. There are numbers at the bottom of the pictur, it just wouldn’t show.)




[I forgot my screen time passcode please someone help I literally can’t do anything on my phone.]

PLEASE SOMEONE ANSWER THISIf the old code to a passcode was 1147, and someone changed it, what would

Answers

Answer:

There's no way for anyone but you to know the password. Consider this a lesson to be learned - keep track of your passwords (and do it securely). If you can't remember your password for this, the only alternative is to factory reset your device.

I don't know exactly if this passcode instance is tied to your Icloud account.. if it is, factory resetting will have been a waste of time if you sign back into your Icloud account. In this case, you would need to make a new Icloud account to use.

which short cut command will remove selected text from a document?

Answers

To delete all text in a text file, you can use the shortcut key to select all text which is Ctrl + A . Once all text is highlighted, press the Del or Backspace key to delete all highlighted text.

What is weather today in new york

Answers

Answer:

Explanation:

Today May, 5 Friday 2023 the weather today in New York is around:

Other Questions
What mass of iron (III) oxideis produced when3. 88 X 1025 molecules of oxygenreacts with excess iron?4Fe + 3O2 2Fe2O3 The skeleton of a shark is made of cartilage interspersed with granules of calcium carbonate. Relative to other types of skeletons, this particular composition results in a skeleton which is particularly and . who declared brazils independence from portugal A. Dom JoaoB. Emperor Pedro |C. Emperor Pedro ||D. Getulio Vargas Contrast can be created by using Which best describes the figure ASAP! GIVING BRAINLIEST! Please read the question THEN answer correctly! No guessing. Show your work or give an explaination. PLEASE HELP ASAP!!!!Tyra made 8 fewer jackets than zack they made 48 jackets altogether how many jackets did zac make individual who rejects both traditional goals and traditional means and wants to alter or destroy the social institutions from which he or she is alienated. (page 219) the number one mistake officers make in processing fingerprints with powders is Can someone please help me with the first question? And if its possible can you help me with the other questions after that. pa Find all points on the graph of f(x) = 12x? - 50x + 48 where the slope of the tangent line is 0. The point(s) on the graph of f(x) = 12x2 - 50x + 48 where the slope of the tangent line is 0 is/are Two examples of how you can apply humanity in you life skills 2. A(an) ______________of a prism is a perpendicular segment that joins the planes of the bases. (The height h is the length of one.) Which order of molecular conversions is correct for the calvin cycle?. Which sentence from paragraph 15 best describes the priest's point of view regarding the raccoon dog? 9. If Yi Hao gives $3 to Vani, Vani will have twice asmuch as Yi Hao. If Vani gives $5 to Yi Hao, Yi Haowill have twice as much as Vani. How much doeseach of them have? Consider the 3 x 3 matrix 1 0 0 0 2 -3 1 -10 15 and let TA: R3 R3 be the linear transformation defined by A= -> C In () - 1 y = a (a) Find a basis for the kernel of TA. (b) Find a basis for the image of TA. (c) Compute the dimension of the kernel of TA (also known as the nullity of TA) and the dimension of the image of TA (also known as the rank of TA). A casual worker is entitled to sick benefit for the period of his illness during the qualifying worked for not less than 110 days for his employer. The entitlement is a. on 10 days b. 22 days OC. 14 days d. 21 days A typical collective agreement incorporates O a. Grievance procedure and terms and conditions of service O b. Procedural rules, working conditions and benefits O c. Flexible arrangemens and finincial terms O d. Substantive terms and conditions of employment and procedural rules Time left 2 Trade unions are organizations based on membership of employees in various trades. Their major focus is O a.rulemaking through collective bargaining O b. Increased rationalization O c. Representation of their members O d. Elimination of victimization Time left 2:5 nstances where separation of an employee in the public sector is due to abolition of post the individual is "retired b. deployed c. summarily dismissed d. made redundant There are 4 quarters in a Football gameQuestion 1 options:TrueFalse which of the following lines from sir gawain and the green knifht is an example of alliterative verse