You must apply descriptors (css rule) to the following selectors (any tags you do not currently have need to be added): body h1,h2,h3,h4,h5,h6,h7 (use at least 2) p ul li img
Q: Why is it so important for web designers to ensure that their websites are both legally and…
A: Web Designers: A web designer produces a website's layout and design. A website designer, to put it…
Q: rocess of building a website? Explain the rationale for each step.
A: A website (likewise composed as site) is an assortment of pages and related content that is…
Q: What is tha main function of router?
A: Introduction: Routers are computer networking devices used to transport data packets from one…
Q: What is mean by digital envelope.Explain its working.
A: To be determine: Describe about digital envelope
Q: How may data profiling be utilized in a data modeling effort, particularly if the data model is…
A: Data profiling: Data-Profiling is responsible for the data modelling project's data analysis, data…
Q: I need help adding a thank you for playing and what kind of feedback do you have for us as a…
A: Here, we need to accept the input from user if play_again is n This is where we are printing Thanks…
Q: Q1: Write a Python program that prompt user to enter at least five entries: 1. Each entry requires…
A: #program1 f = open("name_Scores.txt","a+")#opening file in reading and writing mode, if there is no…
Q: web designer has t
A: A website (likewise composed as site) is an assortment of pages and related content that is…
Q: Is there a use for databases in a three-tier application
A: Given: A three-tier application is the most common client-server design in DBMS, in which the…
Q: A user is executing a tracert to a remote device. At what point would a router, which s in the path…
A: When a traceroute packet is received, the TTL field value is decremented by 1. The receiving router…
Q: An ieee754 double precision exponent has a value of 1028 what is the non-biased base 2 exponent…
A: Here in this question we have given IEEE 754 double precision where exponent has value 1028.and we…
Q: The hfb parameter is almost equal to __________. a.infinity b.0 c.1 d.-1
A: Answer to the given question One parameter is hfb (alpha, the normal base ac cut off current…
Q: ntegrity?
A: Data integrity is the general precision, fulfillment, and consistency of data. Data integrity…
Q: QI) Do as required. a) Express decimal number (-123) in binary as an 8-bit sign-magnitude form. b)…
A: I have answered both the parts and have uploaded image for the solution . We will first express…
Q: temming from a particular ID. (T/F) The preprocessing phase of compilation is the phase which…
A: 1. PID is a command to print all jobs stemming from a particular ID. (T/F) 2. The preprocessing…
Q: How can forensic investigators extract volatile and non-volatile data from PCs running Windows?
A: According to the question both are used for makes secure the data at the organization in which they…
Q: 2. Load the data 10A10H into DS and ES registers. a. MOV AX,10A10H MOV DS,AX MOV ES,AX b. MOV AX,…
A: Your solution is ready please check the step 2 for it.
Q: Use any system or piece of software, such as a program from Microsoft Office, to access the Help…
A: Microsoft Office is a fantastic tool that helps you express your greatest ideas, complete tasks, and…
Q: What are some of the disadvantages of using a database?
A: Disadvantages: Database systems are difficult, time-consuming, and complex to create. Personnel who…
Q: How crucial is software development? Four more characteristics, in your opinion, should be…
A: Introduction: Software development's ability to create and provide value to its users cannot be…
Q: USE PYTHON PROGRAMMING. The expected output per respective input must be achieved (check…
A: The python code is implemented below:
Q: Which applications are included in the purview of the contextual computing domain?
A: Introduction: Which applications are included in the purview of the contextual computing domain?
Q: This is owing to the fact that computers are now very powerful. What causes have led to computers…
A: -Computers help the students to learn about the world and know what is happening in it. -It helps…
Q: As a computer maker, you confront the difficulty of creating high-quality computers with fast…
A: Computers: A computer stores and processes data. For example, most computers employ a binary system…
Q: Write a python function count_matches that, given two strings, counts the number of positions at…
A: Algorithm to count number of matching character in in two string Take two string as input. For…
Q: ee-tier applica
A: In three-level, the application logic or process lives in the center level, it is isolated from the…
Q: Describe the purpose of having both main memory and auxiliary storage in a computer.
A: What characteristics make incursion prevention more effective: A network intrusion prevention system…
Q: When moving data/instructions from memory to cache, one of the current blocks must be modified to…
A: Introduction In a computer and other electrical devices, a processor is a tiny chip. Its basic job…
Q: ML code segments
A: (XML) is a markup language and record format for putting away, transmitting, and recreating…
Q: • If you insert 42, 62 and 82 respectively into the following binary search tree what tree do you…
A: A binary tree is a non-linear data structure of the tree type that has a maximum of two offspring…
Q: List and discuss four vulnerability intelligence sources. Which seems to be the most efficient? Why?
A: Introduction: Vendors provide either direct or indirect support, as well as methods that allow user…
Q: d by operating syst
A: In computing, a firewall is a network security system that screens and controls approaching and…
Q: Binary codes. Determine the decimal values of the following 2 complement signed binary numbers, X1…
A: Determine the decimal values of the following 2 complement signed binary numbers, X1 and X2 then add…
Q: Given the data to be transmitted is 10101, briefly explain how the hamming code method is used to…
A: The hamming code method is used to detect and correct errors in data transmission. The method uses a…
Q: Can you explain how XML data is displayed
A: Introduction Extensible Markup Language stands for XML. It is a dynamic language of combination. It…
Q: What is meant by the term "software as a service"?
A: Software As Service: Apps are delivered as a service through the Internet using Software as a…
Q: What exactly do you mean when you talk about a "intrusion prevention system"?
A: Launch: "Network security" refers to a wide range of technology, equipment, and processes. In its…
Q: What improves the effectiveness of intrusion detection?
A: Intrusion Detection: A network intrusion prevention system (IPS) analyses network traffic patterns…
Q: In a computer with a 32-bit data-bus, how many 4-bit wide memory components are used? the answer to…
A: Given: 32/4 = 8 components (2-bit wide) If the size of each 4-bit memory component is 4 x n…
Q: For an intrusion detection system, false positives and false negatives are the worst possible…
A: An Intrusion Detection System (IDS) is a network security device that was designed to detect…
Q: Implement programs involving the use of while, do..while and for loop statement. Objectives: Topics…
A: Step-1: Start Step-2: Declare variables n, i, j, k Step-3: Take input number of rows n Step-4: Start…
Q: What kind of labeling can you use to increase the usability of a table or list?
A: In order to make a list or table more intelligible, contemporary and simple to use, labeling is…
Q: Arrange, by steps, and in ascending order, with the number of comparisons and substitutions for each…
A: The complete C++ code is given below with screenshots Also, the number of combinations in each step…
Q: What is blockchain, exactly? What role does it play
A: A blockchain is a developing rundown of records, called blocks, that are safely connected together…
Q: NW_Q3) IP addressing operates at the network layer (Layer 3) of OSI, IF must be able to identify…
A: The answer is
Q: Using opt-out links is the safest and most reliable technique to decrease the quantity of spam you…
A: Reliable: Dependable or capable of being trusted is the definition of reliable. A prompt postal…
Q: Intrusion detection software is referred to as IDS.
A: Intrusion Detection Software: Intrusion detection software may monitor network traffic for…
Q: How can I reduce number of items in stock (in database) when an item added to the cart, online…
A: The solution to your problem is given below The SQL query to reduce number of items in stock is…
Q: Explain why you would wish to use simple graphics on certain pages and complex visuals on others.
A: Introduction: Explain why you would wish to use simple graphics on certain pages and complex visuals…
Q: You're using a computer that takes a long time to boot up. What tools and methods will you use to…
A: Using a slow-starting computer. tools and methods for cleaning up the starting process
HTML
Last lab, you created a webpage about someone you admire. Now we are going to add some styling to the webpage.
- You must apply descriptors (css rule) to the following selectors (any tags you do not currently have need to be added):
- body
- h1,h2,h3,h4,h5,h6,h7 (use at least 2)
- p
- ul
- li
- img
- You must use all of the following descriptors below in your page. Although you are not being graded on your design ability, do your best to make the style your own.
- Text Descriptors
- color
- font-size
- font-weight
- text-align
- Background
- background-color
- border
- Size
- width
- height
- margin
- You may add any additional styling or layout descriptors you like.
- Layout is a complicated topic in CSS and the lab does not require any specific layout, but here is a good explanation if you want to alter the layout anyway:
- https://learnlayout.com/
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 1 images
- Hands-On Project 1-3In this project, you will explore how to write text to a specific element in your web page in response to theonclick event handler. To complete the exercise, you will apply the following JavaScript expression:document.getElementById('id').innerHTML = 'text';where id is the value of the id attribute for the page element and text is the text of the content to be writteninto the element. You will use this expression to enhance a web form by displaying the message “Thank you foryour order” when the user clicks the Submit button. Figure 1-25 shows the completed web page.Do the following:1. Use your code editor to open project01-03_txt.html from the HandsOnProject_01 folder. Enter your name and the date in the comment section of the document and save it as project01-03.html.2. Scroll down to the bottom of the file and locate the input element for the Submit button.3. Add an onclick event handler to the <input> tag that changes the innerHTML value of the page element…While examining a web form and the JavaScript source code for it, you notice that a function that changes the text displayed in one part of the page is being executed every time you type or delete a letter or number in a text entry field labeled “Message,” instead of when you press the Tab key to move to the next form field. You correctly guess that _____. a. the function is being triggered when the form element labeled “Message” loses the focus b. the function must be triggered by a change event because input events do not apply to text entry boxes c. anonchangeevent handler has been applied to the form element labeled “Message” d. an event listener for theinputevent is attached to the form element labeled “Message”HTML: Write a jQuery code to format a phone number as the following example below when you enter them to an online input field. You need also to add a paragraph about the purpose of this code. (xxx) xxx-xxxx
- Web development: Create a simple one page HTML newsletter using HTML and CSS for a fictitious club or a real organization if you so wish. This must be a single page project. As a member you are commissioned to build a one page newsletter. The basic structure should follow the following specifications: Header and footer. A three column main content layout. The columns should be 20%, 60%, 20%. The maximum width of the newsletter must be 1200px. All styling must be included in a single CSS file. Your newsletter must use HTML5 semantic layout convention. You must provide usage of at least two block level elements, three font style elements, and two list elements, at least two images in the documentYou are going to add some javascript to your webpage to greet the user. All the below instructions can be found with further explanations in the Javascript lectures. Don not only give me the html code, i need javascript If you do not already have them, add two <h1> title tags so they display at the top of your webpage The first tag should have the contents: “Welcome” The second tag should have an id='username' and contents: “Placeholder” All Javascript must go in a file with the extension “.js”, such as “main.js” or “script.js”. Create a file to hold your javascript if one is not already there. Add a script tag at the end of your body tag that includes your javascript file. In your script tag, use the javascript prompt command to save input from the user into a variable Ask the user their name in the prompt command You can name the variable whatever you like Change the second <h1 id=’username’> contents to the name entered by the user it should be stored in the…HTML and CSS! Exercise: Create a web page that displays a hyperlink for each subject in your current semester. When the user clicks on a link, he should open the respective topic page.Note: Subject pages can be empty. Use CSS pseudo-classes on hyperlinks.
- Question: Tumbling Dice Program - PHP/HTML/CSS Question: Roll two dice 1,000 times. Create a program that simulates the rolling of dice 500 times. Record the result of each roll that equals 7 (e.g. 1+6=7, 2+5=7, 3+4=7) and display totals for the total number of rolls that equal 7. This needs to have an html page, php page, and css page The result, after executing the program, should look similar to: "The number of sevens (7) that occured in 500 dice rolls was: 165"1 What types of argument does the jQuery factory method accept? 2. With which jQuery method can you get or set a CSS property value? 3. What statement would you use to attach a method to the click event of an element with the ID of elem, to make it slowly hide? 4. How can you retrieve an element node object from a jQuery selection object? 5. What statement would set the sibling element immediately preceding one with the ID of news to display in bold? 6. What are the key advantages and disadvantages of using a software framework when constructing web applications? 7. What are the advantages of React's component-based approach to constructing user interfaces? 8. Describe the differences between props and state in React.A Read aloud Draw F Highlight Create a web page which contains four links. These links are NOT underlined when user opens it. When user moves the mouse to hover on the link, its background color will be changed to yellow. When user clicks on the link it will go to the corresponding web site. In the example below The following is when hover on Google. Note its background color changed to Yellow. Here are my favorite sites Click on a name to go to that page. Facebook Twitter Yahoo Google
- Part 4: Build a html form with the following elements. The form must be within a table structure. Name: a text box where the content contains no special character (i.e. !, @, #, $, %, &, *). Number is allowed. The text box must not be empty. • Module code: a text box where the content must start with 3 lower case alphabets and follows by 4 digits. This textbox can be empty. • Current date: a non-editable textbox and should be in the format as shown (e.g. 12 October 2020 Monday 3:35 PM). The content is the current date or today's date which will change every day. • Message: a text area with 3 rows and 20 columns. The default text is "Hello 202204". The text area cannot be empty. • Find: a text box for the user to key in text he/she wants to find. Replace: a text box for the user to key in the replacement text. If the find text is empty, this element should be disable (i.e. user cannot key in anything here). • Find and Replace: This is a button, when click, it will go to the "Message"…Create an HTML5 web page about one of your favorite hobbies. Choose a hobby and either take a relevant photo or select a relevant royalty-free photo from the Web (refer to Chapter 4). Decide on a heading for your page. Write one or two brief paragraphs about the hobby. The page must use valid HTML5 syntax and include the following elements: header, article, and footer. Use the figure, figcaption, and img elements to display the photo you have chosen. Include a hyperlink to a website that is relevant to the hobby. Include your name in an e-mail address in the page footer area. Configure the text, color, and layout with embedded CSS. Save the file as myhobby.html.Write a sample code for The CSS id Selector