How are html pages different from style sheet

Answers

Answer 1

Answer:

HypeTextMarkupLanguage aka HTML is a Markup Language (as in the name) and is used for making websites and functions that you would add variables using Javascript. CSS aka Cascading Style Sheets, is a style sheet. The purpose of CSS is to make the site/game or whatever your making too look nice.

Example:

<!DOCTYPE html>

<html>

<head>

<meta charset="utf-8">

<title>Example</title>

<!-- Add Style Sheets Below -->

<style>

body {

 background-color: yellow;

}

</style>

</head>

<body>

<!-- In HTML you can make buttons or links -->

<center>

<button>You can add style using CSS</button>

</center>

<!-- You can add Javascript to the button to make it play a sound or open a new window -->

</body>

</html>


Related Questions

In the lesson, you were introduced to the difference between data, information, and knowledge. Think of an example in your life where a number could be described as data, information, and knowledge.
A file won’t open on your friend’s computer, which leads to the inevitable question: “Why do there even need to be different file types, anyway?” How would you respond?
Think about the last business that you purchased a product or a service from. What three types of software might they need? Why would they need them?
If virtual reality becomes commonly used, what are some problems and concerns that might arise?
A family member who hasn’t worked with computers before has decided to change jobs. You’ve been asked to explain some of the basics. You begin by explaining the basic idea of word processing software, spreadsheets, databases, and presentation software. You sense that the following question is coming: “Why so many different things? Why can’t there just be one software that you could use for everything?” How would you answer?

Answers

Answer:

subject  

Computers and Technology, 26.08.2021 15:30 laiba012305

A family member who hasn’t worked with computers before has decided to change jobs. You’ve been asked to explain some of the basics. You begin by explaining the basic idea of word processing software, spreadsheets, databases, and presentation software. You sense that the following question is coming: “Why so many different things? Why can’t there just be one software that you could use for everything?” How would you answer? {This is not for a quiz, test, exam so dont report me. I would ask my dad but he's at work.}

Explanation:

Answer:

information technology​ (it) pertains to the​ hardware, software, and data components. an information system​ (is) is an assembly of​ data, procedures, and people that produces information.Explanation:

What is the output?

a = []
a.append([2, 4, 6, 8, 10])
a.append(['A', 'B' , 'C', 'D', 'E'])
a.append([111, 222, 333, 444, 555])
a.append(['roses', 'daisies', 'tulips', 'clover', 'zinnias'])
print(a [2] [4])
555
E
D
444

Answers

Note that the output of the code is: 555

What is the explanation for the above response?

The list a has four elements, each of which is a list itself. The expression a[2] accesses the third element of a, which is the list [111, 222, 333, 444, 555].

The expression a[2][4] accesses the fifth element of that list, which is 555. Therefore, the output of the code is 555.

A computer code is a set of instructions written in a specific programming language that can be executed by a computer to perform a particular task or achieve a specific goal.

Learn more about code at:

https://brainly.com/question/28848004

#SPJ1

Which of the following is Microsoft Windows 10 virtualization technology?

Guest OS
Hyper-V
Hyper-10
Network utilities

Answers

Answer:

Hyper-V

Explanation:

lets you run a software version of a computer, called a virtual machine. Each virtual machine acts like a complete computer, running an operating system and programs

example:

you can run a virtual Linux computer on your windows

microsoftdocs

Karl wants to change the page orientation of the printed worksheet. which group on the page layout tab contains the command to complete this action?

Answers

The Page Setup tab can be used to adjust the page orientation of the printed worksheet for Karl. Word has a number of formatting and page layout choices that modify how the material looks on the page.

Books, posters, and newsletters may all be designed with a more distinctive look by using page layout. A page layout document functions similarly to a canvas in that you may add text boxes, images, and other objects before arranging them as you like on the page.

There is no body text section when you open a page layout document (or template); you must build a text box and type in it to add content. New pages must be manually added.

Pages templates can be used for word processing or page layout. You can add or remove pages, work with objects, and more depending on the type of template you choose. You can change a document to another kind if you start with one type of template. If, for example, you like the text styles, colors, and layout of the School Newsletter template but prefer the design flexibility of a page layout document, you can convert the document to a page layout.

To learn more about Page orientation click here:

brainly.com/question/17853338

#SPJ4

The part (or statement) of a recursive function that decides whether the recursive loop is terminated is called: (Select all that apply)

Answers

Answer:

The base case

Explanation:

Required

The part that determines the termination of a recursion

This part of a recursion is referred to as the base case.

Take for instance, the following:

factorial(int n) {

   if (n < = 1) {         return 1; }

   else {             return n*factorial(n-1);    }  }

The base case of the above is     if (n < = 1) {         return 1; }

Because the recursion will continue to be executed until the condition is true i.e. n less than or equals 1

if i don't convert type to outlines in illustrator, does the viewer need to have the fonts installed? Yes/No

Answers

Yes, if you don't convert the type to outlines in Illustrator and the viewer does not have the fonts installed on their computer, the text will not display correctly.

This is because when you create text in Illustrator, it uses the fonts installed on your computer to display the characters. If you send the file to someone who does not have those fonts installed, their computer will substitute a different font, which may not match the original design.

However, if you convert the text to outlines, the font is no longer required and the text will be displayed as a graphic, which can be viewed correctly regardless of the viewer's installed fonts. It's important to note that converting text to outlines can make it more difficult to make edits later, so it's recommended to keep a copy of the original file with the live text intact.

Learn more about fonts here:

https://brainly.com/question/14934409

#SPJ11

Which of the following statements is true of hackers? Check all of the boxes that apply.
They are sometimes differentiated into two types, called “gold hats” and “silver hats.”
Some hackers are criminals.
Some hackers do it as a form of protest.
Some hackers are network security professionals who want to improve the security of a network by identifying flaws.

Answers

Answer:

B. Some hackers are criminals

C. Some hackers do it as a form of protest

D. Some hackers are network security professionals who want to improve the security of a network by identifying flaws.

Explanation:

Edge 2022

The following statements are true of hackers: Some hackers are criminals, some hackers do it as a form of protest, and some hackers are network security professionals who want to improve the security of a network by identifying flaws. Thus, the answer would be options (B), (C), and (D).

What is hacking?

Hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system. Hacking is not always a harmful act, however, it is most usually linked with illicit activities and data theft by cyber-criminals.

Hacking is the exploitation of technology such as computers, smartphones, tablets, and networks to cause harm or corruption to systems, acquire information on users, steal data and documents, or disrupt data-related activity.

Hackers commit crimes and some hackers use it to express their protest. Some hackers are network security specialists who seek to enhance network security by uncovering flaws.

Therefore, the answer would be options (B), (C), and (D).

Learn more about the hacking here:

https://brainly.com/question/14835601

#SPJ5

what does If you’re not paying for the product, you are the product.” mean

Answers

Answer:

it means your free

Explanation:

if you find an article on the internet that you want to use is behind a paywall, what should you do?

Answers

If you find an article on the internet that is behind a paywall, there are several options to consider. First, you can see if the article is available in your college's library database, as many libraries have subscriptions to academic journals.

You can also try contacting your librarian at your university library, as they may be able to use inter-library loans to get the article for you . Additionally, if the article is from a publication that requires a subscription, you may be able to purchase a subscription or use a subscription from your university to access the article.

Lastly, you can try searching for the article on websites such as Sci-Hub or Library Genesis, which offer free access to research articles.

Learn more about paywall:

https://brainly.com/question/1198649

#SPJ4

Social media marketers need the ability to do what?
Code in JavaScript
Collaborate across teams
Communicate with customers
Make a website useful

Answers

Communication with customers
I believe the answer is communicate with customers

How to call a function in react component on load.

Answers

The use effect runs by default after every render of the component. When placing use effect in our component we tell React that we want to run the callback as an effect. React will run the effect after rendering and after performing the DOM update

in ____ orientation, a page is taller than it is wide.

Answers

Answer:

portrait

Explanation:

PLEASE can someone give me some examples of activities I can put on a resume presentation?

I'm a freshman and I didn't really play any sports other than 8th grade volleyball. I really need some examples​

Answers

Answer:

list down extracurriculars (e.x. maybe you attend piano lessons, or you attend an art class during the weekend, or you play football outside of school, etc.)

you can also list any volunteering you do on the side (e.x. maybe you volunteer at your local church or at the local animal shelter), whatever you think counts.

how to watch the cowboys game on my phone for free

Answers

One way to watch the Dallas Cowboys game on your phone for free is by using the NFL App or the Yahoo Sports App, which will live stream all NFL games for free during the season.

Is there a free Dallas Cowboys app?

Use the free Dallas Cowboys app to make the most of your event visit to AT&T Stadium. The Cowboys schedule, radio, podcasts, live events, Free to Play games with cash rewards, and more are all more easily accessible to fans with the help of this app.

Additionally, if you have a cable or satellite TV subscription, you can use the provider's streaming app to watch the game on your phone. However, you will need to sign in with your cable or satellite provider's account information to access the stream.

Can I use the CBS app to watch the Cowboys game?

Every Sunday afternoon, CBS All Access streams NFL games that are broadcast on local television in the app user's location. Therefore, CBS All Access is unable to watch every NFL game. Additionally, viewers won't be able to access out-of-market shows that aren't carried by their regional CBS affiliate network.

To know more about cowboys visit:

https://brainly.com/question/11765196

#SPJ4

Which office setup would be difficult to host on a LAN?
hardware.

RAM.

storage.

software.

Answers

The office setup would be difficult to host on a LAN  is option C: storage.

What is the office LAN setup like?

A local area network (LAN) is a network made up of a number of computers that are connected in a certain area. TCP/IP ethernet or Wi-Fi is used in a LAN to link the computers to one another. A LAN is typically only used by one particular establishment, like a school, office, group, or church.

Therefore, LANs are frequently used in offices to give internal staff members shared access to servers or printers that are linked to the network.

Learn more about LAN   from

https://brainly.com/question/8118353
#SPJ1

Your organization has an Active Directory domain. One of the users, Bill, should not have read access to a folder named Accounting. The Accounting folder is shared on a network server, on a partition formatted as NTFS. Which of the following statements best describes how to stop Bill from having read access to the folder without impacting any other users on the network?


A. Remove Bill from all domain groups that have access to the Accounting folder.
B. Deny read access to the Accounting folder for Bill through local access security.
C. Deny read access to the Accounting folder for any group that Bill is a member of.
D. Deny read access to the Accounting folder for Bill through shared access security.

Answers

The statement that best describes how to stop Bill from having read access to the folder is option D: Deny read access to the Accounting folder for Bill through shared access security.

What is read access permission?

Owners and administrators are known to be the people that can alter the read access permissions for streams and others.

Hence, based on the above scenario, The statement that best describes how to stop Bill from having read access to the folder is option D: Deny read access to the Accounting folder for Bill through shared access security.

Learn more about read access from

https://brainly.com/question/27175118

#SPJ1

45 points!

What is the full form of PNG and GIF?
The full form of PNG is
and GIF is ______

45 points!What is the full form of PNG and GIF?The full form of PNG isand GIF is ______

Answers

Full form of PNG is Portable Network Graphics

Full form of GIF is Graphics Interchange Format

Hope it helps

Answer:

\(png = > portable \: network \: graphic(a \: file \: format) \\ gif = > graphics \: interchange \: format(bitmap \: image \: format) \\ thank \: you\)

five internal peripheral devices pls help​

Answers

Answer:

TV card, CD-R drive, Floppy Disk, Sound Card, and CD-ROM drive are examples of internal peripheral devices!(Basically hard drives and something like that)

Explanation:

here you go

1 ssd

2 CD-ROM drive

3 wifi extender or  antenna

4  CD-R drive

5 hhd

Hope this helped

-scav

write a method with flow control and arrays write a public method named minplusmax that takes one argument and returns an integer. the argument must be an array of integers. the method must return the sum of the minimum and the maximum of the values in the array. your method must include at least one loop and at least one decision. you do not need to write any class, or any other code besides the required method.

Answers

Here is a two-line main answer that demonstrates the implementation of the requested method:

```java

public static void main(String[] args) {

   int result = minplusmax(new int[]{4, 2, 9, 7, 5});

   System.out.println(result);

}

```

Can the minplusmax method calculate the sum of the smallest and largest values in an integer array?

The `minplusmax` method is a public method that takes an array of integers as its argument. It utilizes flow control and arrays to calculate the sum of the minimum and maximum values in the given array. The implementation involves using a loop and a decision-making statement.

Within the method, we initialize two variables: `min` and `max`. The `min` variable is assigned the maximum possible integer value, while the `max` variable is set to the minimum possible integer value. This ensures that any value in the array will be smaller than `min` and larger than `max` during the iteration.

Next, a loop iterates over each element in the array. For each element, the method compares it with the current values of `min` and `max`. If the element is smaller than the current `min` value, it becomes the new `min`. If it is larger than the current `max` value, it becomes the new `max`.

After iterating through all the elements in the array, the method returns the sum of `min` and `max`, which represents the sum of the smallest and largest values in the array.

Learn more about minplusmax

brainly.com/question/32014894

#SPJ11

The working of the computer on the input according to the program is called_______.​

Answers

Answer:

input program

Explanation:

Click this link to view O*NET's Work Activities section for Actors. Note that common activities are listed toward the top, and less common activities are listed toward the bottom. According to O*NET, what are common work activities performed by Actors? Check all that apply. repairing and maintaining electronic equipment performing administrative activities thinking creatively controlling machines and processes performing for or working directly with the public establishing and maintaining interpersonal relationships​

Answers

Based on  O*NET, the common work activities performed by Actors are:

Scheduling work and activities. Getting information. Making decisions and solving problems. Coordinating the work and activities of others.

What is activity in the workplace?

An activity in the workplace is one that connote the way to promote strong work relationships and boast morale.

Note that Getting all actors to be involved in a team workplace activity is one that help develop a kind of personal bonds and also enhance the professional relationship of all actors.

Learn more about  Work Activities from

https://brainly.com/question/25530656

what is a way to find a peaceful and agreeable solution when there's a disagreement. A. conflict resolution
B. active listening
C. leadership
D. non-verbal communication​

Answers

Answer:

A.) Conflict Resolution

Explanation:

Conflict resolution is when two or more parties work out a peaceful solution to a problem. Therefore the answer is A. I hope I helped! ^-^

1. Read the following scenario. What type of business letter do you think is required in this situation? (1 point)
Melissa and Melrose are both first-year students at a local community college. They both have interest in volunteering with a nonprofit organization. They decided to reach out to nonprofit organizations to ask about the steps they need to take in order to volunteer.

Answers

Answer:

It requires a formal letter.

Answer:

This would require a formal business letter, the type being a cover letter or inquiry.

Explanation: yes

a virtual function is a member function that expects to be _ in a derived class.

Answers

The virtual function is a member function that expects to be overridden in a derived class.

What is virtual function?

Virtual function is a function in C++ program language or any object-oriented programming. This function is to redefined in derived classes.

The overridden or redefined in derived classes it mean the function in derived class will be executed than in the base class for every time the user refer the derived class to the base class.

For example with the code is,

class Base {

 public:

  void print() {

            cout << "Base" << endl;

  }

};

class Derived : public Base {

 public:

  void print() {

             cout << "Derived" << endl;

  }

};

So, when user pointer the base to object of derived class the result is "Base" than "Derived". So, this is the role of the virtual function it will make the result to "Derived" than "Base".

Learn more about derived class here:

brainly.com/question/27791611

#SPJ4

Given any Cartesian coordinates, (x,y), there are polar coordinates (r,theta) with -pi/2 < theta < pi/2 Find polar coordinates with -pi/2 < theta < pi/2 for the following Cartesian coordinates: a-If (x,y)=(20,-10) then (r,theta)= ? b-If (x,y)=(4,0) then (r,theta)= ? c- If (x,y)=(-8,5) then (r,theta)= ? d- If (x,y)=(6,4) then (r,theta)= ? e- If (x,y)=(-1,6) then (r,theta)= ? f- If (x,y)=(0,-7) then (r,theta)= ?

Answers

The polar coordinates for the Cartesian coordinates are:

a) (22.36, -0.464)b) (4, 0)c) (9.43, -0.588)d) (7.21, 0.588)e) (6.08, -1.405)f) (7, undefined)

How to determine Cartesian coordinates?

To find the polar coordinates (r, θ) with -π/2 < θ < π/2 for the given Cartesian coordinates, you can use the following formulas:

r = √(x² + y²)

θ = arctan(y/x)

Calculate the polar coordinates for each Cartesian coordinate:

a) If (x, y) = (20, -10):

r = √(20² + (-10)²) = √(400 + 100) = √500 ≈ 22.36

θ = arctan((-10)/20) = arctan(-0.5) ≈ -0.464

Therefore, (r, θ) ≈ (22.36, -0.464)

b) If (x, y) = (4, 0):

r = √(4² + 0²) = √16 = 4

θ = arctan(0/4) = arctan(0) = 0

Therefore, (r, θ) = (4, 0)

c) If (x, y) = (-8, 5):

r = √((-8)² + 5²) = √(64 + 25) = √89 ≈ 9.43

θ = arctan(5/(-8)) ≈ -0.588

Therefore, (r, θ) ≈ (9.43, -0.588)

d) If (x, y) = (6, 4):

r = √(6² + 4²) = √(36 + 16) = √52 ≈ 7.21

θ = arctan(4/6) ≈ 0.588

Therefore, (r, θ) ≈ (7.21, 0.588)

e) If (x, y) = (-1, 6):

r = √((-1)² + 6²) = √(1 + 36) = √37 ≈ 6.08

θ = arctan(6/(-1)) ≈ -1.405

Therefore, (r, θ) ≈ (6.08, -1.405)

f) If (x, y) = (0, -7):

r = √(0² + (-7)²) = √49 = 7

θ = arctan((-7)/0) (Division by zero is undefined, but θ can be assigned a value of -π/2 or π/2 depending on the convention used.)

Therefore, (r, θ) = (7, undefined)

The value of θ is undefined for the point (0, -7) as it lies on the negative y-axis, and the arctan function approaches -π/2 as x approaches 0 from the left and π/2 as x approaches 0 from the right.

Find out more on Cartesian coordinates here: https://brainly.com/question/31309799

#SPJ1

which of the following specifications replaces wep with a stronger security standard that features changing encryption keys? group of answer choices O vpn O utm O aup O wpa2 O tlsAnswer: WPA2

Answers

The specifications that replaces wep with a stronger security standard that features changing encryption keys is option C: WPA2.

What is WPA2 (Wi-Fi Protected Access 2)?

The encrypted security technology known as WPA2 (Wi-Fi Protected Access 2) guards internet traffic on wireless networks. The Wi-Fi Protected Access security protocol's second iteration, WPA2, fixes earlier issues and provides stronger encryption.

Note that the purpose of security standards is to increase the security of information technology.  Hence, one can say that a security standard is "a published specification that establishes a common language, contains a technical specification or other precise criteria and is designed to be used consistently, as a rule, a guideline, or a definition."

Learn more about security standard fromhttps://brainly.com/question/14559510
#SPJ1

Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line ___________.

Answers

Answer:

Forever

Explanation:

If I was writing a program which had classes for Vegetable, Fruit, Tomato, Watermelon, Carrot, which type of classes would make sense? Choice 1 of 4:Vegetable is a superclass of the subclass Carrot. Choice 2 of 4:No inheritance makes sense since there are no "IS A" relationships. Choice 3 of 4:Fruit is a superclass of the subclass Vegetable. Choice 4 of 4:Carrot is a superclass of the subclass Vegetable.

Answers

If I was writing a program which had classes for Vegetable, Fruit, Tomato, Watermelon, Carrot, the type of classes that would make sense is "No inheritance makes sense since there are no "IS A" relationships" . Option B is the correct answer.

In the given scenario, it doesn't make sense to establish inheritance relationships between the classes based on the "IS A" relationship. Inheritance is typically used when there is a hierarchical relationship between classes, where a subclass "IS A" type of the superclass. However, in this case, the relationships between the classes (Vegetable, Fruit, Tomato, Watermelon, Carrot) do not follow the "IS A" relationship.

Each class represents a distinct type of object, and they are not inherently related through inheritance. Each class can have its own properties, methods, and behaviors specific to its type. Instead of inheritance, other concepts like composition or interfaces can be considered if there are shared behaviors or characteristics among the classes.

Option B is the correct answer.

You can learn more about Inheritance at

https://brainly.com/question/15078897

#SPJ11

Son los inventarios en proceso que hacen parte de la operación en curso y que se deben tener en cuenta antes de empezar a transformar el material directo.

Answers

Answer:

When an inventory is purchased the goods are accounted in the raw material but when this raw material is to be converted in finished goods it is transferred from raw material to processing of raw material into finished goods and when the process is completed when the raw material turns into finished goods the goods are then accounted for as finished goods.

Explanation:

When an inventory is purchased the goods are accounted in the raw material but when this raw material is to be converted in finished goods it is transferred from raw material to processing of raw material into finished goods and when the process is completed when the raw material turns into finished goods the goods are then accounted for as finished goods.

Does anyone do scratch? (Its a coding website)

Answers

Answer:

heck yeah i do

Explanation:

Other Questions
ali is training for her first 5k race so she decides to increase her duration on the treadmill from 20 minutes a day to 30 minutes. what training principle is she applying? Bruce made 6 pans of brownies. He cut each pan into 9 brownies. How many brownies did Bruce end up with? I need help with this geometry question guyss!! 6. if the reserve ratio is 20 percent, then $100 of new reserves can generate a. $60 of new money in the economy. b. $250 of new money in the economy. c. $500 of new money in the economy. d. $2,000 of new money in the economy. Can someone help me with questions 5 and 6? explain why cyanobacteria are so important to other types of freshwater and marine organisms that rely on oxygen, nitrogen, and organic compounds for their survival. 16^2x-5 > 64 ^2x-3 solve for x Exponential equation and inequalities When it gets cold out, you shiver and your blood vessels constrict to increase and preserve your body temperature. This is an example of your bodymaintaining homeostasis by doing.Plz help asap I have less than 3 minutes Solve the equation for x:6 - x = 18 Determine an equation for the line B containing the point (-1,-3) that is perpendicular to the line A that passes between (-1,-3) and (5,10). Write you answer in slope -intercept form." Please help asap! thank youFind the quotient. Round to the hundredths' place when necessary. which professional uses practical knowledge of science to design and manufacture machines? engineer experimental scientist technician theoretical scientist I would REALLY appreciate some help... :( Evaluate the expressions 7-9 Which of the following protein hormones produces a decrease in blood glucose by causing glucose to enter cells for energy production?a.Insulinb.Aldosteronec.Thyroid hormoned.Cortisol the amount of time it takes jake to complete one homework problem from his statistics class is continuous and uniformly distributed between 3 minutes and 13 minutes. what is the probability that it takes jake greater than 11 minutes given that it takes greater than 9 minutes for him to complete one homework problem? provide the final answer as a fraction. Stacy and Melissa work as waitresses. They both earn $7.75 per hour, plus tips. Last weekend, Stacy worked x number of hours and earned $153.95 in tips. Melissa worked y number of hours and earned $129.02 in tips. Stacy determined that using the expression 7.75x + 153.95 + 7.75y + 129.02 will calculate the amount the girls earned together last weekend. Select another expression the girls could also use.A 7.75x+y+282.97B 7.75(x+y)+282.97C 7.75(xy)+282.97D 7.75x+7.75y282.97 ________ remain the prominent plants in dry and cold weather. Near the middle of the speech from the line Sir, we have done everything that could be done to avert the storm.. through line there is no longer any room for hope, what persuasive appeal is Patrick Henry going after? Explain. Observation Aqueoussodium hydroxidewas added dropwise and then inexcess. Round intermediate calculations and final answer to four decimal places. Find the point on the parabola y = 16 - x2 closest to the point (8, 21). Closest point is (,) with the distance of __