Answer:
Modern browsers use CSS to style all their markup.
How would they render a <table> element if CSS had nothing that could express the appearance of one?
(That, and you might have non-tabular data that you want to render like a table, there are enough people using tables for layout to see a demand for it).
They can be used to format content in a tabular manner when the markup does not use the table element, e.g. because the markup was written by someone who was told not use tables or because the markup is generic XML and not HTML.
You can also design a page using e.g. div elements so that some stylesheet formats them as a table, some other stylesheet lets them be block elements or turns them to inline elements. This may depend e.g. on the device width
A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used
Question options:
State Machine
Flowchart
Sequence
Global Exception Handler
Answer:
Sequence
Explanation:
Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.
The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.
Answer:
Compactness
Explanation:
Have a nice day!
which is known as accurate processing of computer gigo E mail MHz bug
GIGO is the considered as the accurate processing in computers.
In the field of computer science, the word GIGO stands for " garbage in, garbage out".
It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.
It is the inability of the program to any bad data providing incorrect results.
Thus GIGO is the most accurate processing in a computer programs.
Learn more :
https://brainly.in/question/23091232
when files on storage are scattered throughout different disks or different parts of a disk, what is it called
Answer:
File Fragmentation or Fragmented Files
You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.Which solution should you use?
Answer:
Explanation:
In this scenario, the best option is to first create a DMZ. This stands for Demiliatirized Zone and basically allows anything connected to it to access networks that have not been completely verified (which in this case would be the internet). Once the DMZ is created you are going to want to add the web server to the DMZ. This will allow the web server to access the internet and be publicly available to its users. At the same time you are going to want to add the company network behind the DMZ so that it is not allowed to publicly access the internet without the data going through the firewall first. Therefore, protecting the company network users.
Which is the most viewed vdo in YT ever?
can I play the game the last of us with this spec:
What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation
Answer:
The most effective temparature used in autoclave is 121°C
Cuando se introduce una fórmula en una celda primero que hay que introducir es
Answer:
El signo =.
Explanation:
La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.
Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.
You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?
Answer:
Vulnerability scanner
You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.
What is a vulnerability scanner?Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.
A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.
If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.
To learn more about vulnerability scanners click here:
https://brainly.com/question/10097616
#SPJ12
Write a basic notation for
[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]
Answer:
[tex]a = (b + c)/(2 * c)[/tex]
[tex]z = x/(y + c)[/tex]
[tex]c = (9 * c + 32)/5[/tex]
Explanation:
Required
The expression in basic
To do this, we use () to group items, / as divide and * to combine factors
So, we have:
[tex](a)\ a = \frac{(b + d)}{2c}[/tex]
In basic, it is:
[tex]a = (b + c)/(2 * c)[/tex]
[tex](b)\ z = \frac{x}{y + c}[/tex]
In basic, it is:
[tex]z = x/(y + c)[/tex]
[tex](c)\ c = \frac{9c + 32}{5}[/tex]
[tex]c = (9 * c + 32)/5[/tex]
If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.
Answer:
Normal
Explanation:
If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.
What is presentation?Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.
Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.
It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.
Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.
To learn more about the presentation, refer to the below link:
https://brainly.com/question/17087249
#SPJ2
In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
Answer:
case-based.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Maintenance.
A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.
In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.
A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.
Answer:
tictactoe[1][1]
Explanation:
To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::
Given a 2 - dimensional 3×3 array of integers :
Creating a dummy array assigned to the variable tictactoe :
[1 2 3]
[4 5 6]
[7 8 9]
We have a 3×3 array, that is 3 rows and 3 columns.
The middle element in the middle row is located in the second row ;second colum
Row and column Indexes starts from 0
Middle element in the middle row is the value 5 and it corresponds to :
tictactoe[1][1]
We call the variable name and the we use one square box each to house the row and column position.
Why does a computer need programs?
Communication media that use an antenna for transmitting data through air or water are called _____.
Answer:
Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.
Explanation:
douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html
copy and paste that it might help!
The part (or statement) of a recursive function that decides whether the recursive loop is terminated is called: (Select all that apply)
Answer:
The base case
Explanation:
Required
The part that determines the termination of a recursion
This part of a recursion is referred to as the base case.
Take for instance, the following:
factorial(int n) {
if (n < = 1) { return 1; }
else { return n*factorial(n-1); } }
The base case of the above is if (n < = 1) { return 1; }
Because the recursion will continue to be executed until the condition is true i.e. n less than or equals 1
People think that they can send email messages from their personal computers and that it cannot be traced. This is called the _____.
Message Trace
Essentially it's a method used by administrators to monitor and trace emails
Convert to different number system as mentioned.(17)10=(?)2
What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files
Answer:
National Software Reference Library (NSRL).
Explanation:
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.
write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit
Answer:
total = 0
for i = 1 to 7
input temp
temp = temp * 1.8 + 32
total + = temp
average = total/7
print average
Explanation:
[Initialize total to 0]
total = 0
[Iterate from 1 to 7]
for i = 1 to 7
[Get input for temperature]
input temp
[Convert to degree Fahrenheit]
temp = temp * 1.8 + 32
[Calculate total]
total + = temp
[Calculate average]
average = total/7
[Print average]
print average
1.printer is an example of......... device.
Printer is an example of output devise.It gives hard copy output on paper .
1. Printer is an example of output device.
I hope it's help you...
You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?
Answer: Static
Explanation:
Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.
Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.