Identify the link element that accesses a style sheet file named output. Css only when the device is a printer or a projection device.

Answers

Answer 1

There are different types of link element. The link element that accesses a style sheet file named output is:

<link href="output.css" media="print, projection" />

Style sheets often shows a key growth for Web page designers, widening their ability to boast the appearance of their pages.

In the web environments, people are very concerned with the content of their documents than the way it was presented.

There are techniques that often work for some of the people but not for all of the people and there is need therefore to make new techniques.

Learn more about link element from

https://brainly.com/question/25608430


Related Questions

i will give brainliest to the best answer. what is a good screen recorder

Answers

Answer:

If your on windows there is an x-box screen recorder installed on it. thats a new windows 11 update. If not, i used to use x-split broadcaster

Explanation:

If your on windows there is an x-box screen recorder installed on it. thats a new windows 11 update. If not, i used to use x-split broadcaster

mark me Brainliest

________________ is access to the internet through your tv connection.

Answers

Answer:

Cable Modem

Explanation:

write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'

Answers

Answer:

//check which string is greater

if(strcmp(name1,name2)>0)

//assign name1 to first, if the

    //name1 is greater than name2

    first=name1;

else

    //assign name2 to first, if the

    //name2 is greater than name1

    first=name2;

5)

//compare name1 and name2

    if(strcmp(name1,name2)>0)

   

         //compare name1 and name3

         if(strcmp(name1,name3)>0)

       

             //assign name1 to max, becuase

             //name1 is greater than name2 and name3

             max=name1;

       

Explanation:

a ________ uses electronic memory and has no motors or moving parts.

Answers

Answer:

a to uses electronic memory and has no motors or moving parts.

Explanation:

brainliest me and follow ty

we are unable to process your request at this time. if you continue to receive this error, please contact cardholder services by calling the number on the back of your card.

Answers

Answer:

is this a sim chip card replacement card for Electronics ?

Explanation:

Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .

Answers

Answer:

oxigen

Explanation:

Which tools exist on the 3-D Map Layer pane? Check all that apply. filter options layer options time visualization category visualization Udata layer visualization data value visualization​

Answers

Answer:

filter options

layer options

category visualization

data value visualization

Explanation:

Which is a function of an operating system?.

Answers

Answer:

An operating system is known as the interface between the computer hardware and the user itself. It is one of the most essential parts of a computer, and is the most integral software. It's responsible for executing programs, handling other inputs i.e an additional mouse, keyboard, etc. as well as handling storage for data and other files. In addition to this, it manages the computer's resources as well as executes and enables services.

What access-point feature allows a network administrator to define what type of data can enter the wireless network?

Answers

Traffic filtering. It’s name is self-explanatory!

it is possible to be logged into a wi-fi network that does not have internet access.

Answers

Answer:

yes it is possible. it'll take some work tho

Explanation:

you would have to bypass the security and disable the proxy and go through the firewall and do some other things to access it

In Java, a reference variable is ________ because it can reference objects of types different from its own, as long as those types are related to its type through inheritance.

Answers

Answer:

polymorphic

Explanation:

An example of polymorphic reference, suppose you have 3 classes: Main, Product and SpecificProduct. If SpecificProduct extends Product this means it is a product class but with something else to complement.

Say you want to reference an object of product in the main class, you can do it the classic way:

Product pd = new Product();

Or you can do it polymorphic, like this:

Product pd = new SpecificProduct();

The program will accept just fine because SpecificProduct is extending Product. When you do it like this, we say the reference you made was a polymorphic reference

In older languages, you could leave a selection or loop before it was complete by using a ____ statement

Answers

Answer:

D) go to

Explanation:

A) next

B) go next

C) loop

D) go to

D) go to is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors.

Answers

Answer:

D. The method for retrieval is dependent on the specific app or device’s operating system.

Need help with 3.2 lesson practice questions (edhesive)​

Answers

Answer:

Doesn't have a question

Explanation:

THANK YOUU

1. Which software is used mostly for typing text? a) Word b) Excel O c) PowerPoint o d) Paint​

Answers

Answer:

a. Word

Explanation:

Microsoft Word is the most widely used word processing software according to a user tracking system built into the software.

Answer: a) Word

Explanation: Microsoft Word is the most widely used word processing software.

Until 2016, the popular song _____ was covered by copyright law, unusually long after it was written in 1893.

A.
Happy Birthday

B.
Merry Christmas, Everyone

C.
Hava Nagila

D.
Auld Lang Syne

Answers

Answer: Happy Birthday

Explanation:

Answer is A. Happy Birthday

ok so I have two accounts and like, the other account has -20 points??? what happened​

Answers

You need to do the questions to get more points

the correct banner marking for a commingled document

Answers

Answer:

The correct banner marking for a commingled document is Headers and footers are mandatory and must be identical All sections or portions must be marked or portion marked CUI markings and Limited Dissemination Control markings appear after all classified marking in both Banner Lines and Portion Markings

Hope this helps :D

Please Mark Brainliest :D

Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare the results of that to each other. What kinds of operators does Tamara need to use for each step?
Tamara needs to use
operators to organize the students' grades, then
operators to compare the results.

Answers

Answer:   you said "Tamara needs to use

operators to organize the students' grades, then

operators to compare the results."

i think your right

Explanation:

sounds right.

What is the quickest option for adding internet images to a PowerPoint presentation?

*it's b. use the online pictures option....

Answers

Answer:

b. Use the Online Pictures option to perform a search of web-based images to insert.

Explanation:is correct. post protected

text to appear
Name the highlighted part as a whole. What are the segments- bgcolor and “SKYBLUE” called?
What is the output going to be due to the highlighted part?

Answers

Answer:

bg color stands for background color while SKYBLUE is the color assigned to it.

Explanation:

It is setting the background color of the body tag to sky blue.

What is the largest integer that can be represented with 4 bits?.

Answers

Answer:

15

Explanation:

You can calculate the maximum number using a simple formula:

2^N (Where N is the number of bits) - 1

So 2^4 - 1 = 16 - 1 = 15

from which Menu option you can change page setup in MS Word​

Answers

page layout tab or the page setup dialog box

How to turn robot voice like real human voice.

Answers

Go in front of the mirror and act like robot and talk ,there you have a robot voice like real human voice

When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides or bottom of an image?

B will resize but not maint aspect ratio was correct

Answers

Answer:

b. It will resize the image but not maintain aspect ratio

Explanation: is correct. post protected

Answer:

b

Explanation:

PLEASE HELP ME FASTTTTTT Input statements allow the user to enter data that a program uses to perform necessary computations. Users enter the data when they the program.

Answers

Answer:

The scanf() is the function that is used to take inputs from the user with the help of the standard input device,i.e, the keyboard.

scanf() function is capable of taking any data type as an input, though it has to be specified first like %d for integers, %s for strings and %f for floating-point type. The gets() function can only take a string as an input.

Explanation:

Answer:

ur

Explanation:

ur mom

When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server.

Answers

A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.

A virtual private network (VPN) is used to connect a private network to a public network. It enables users have access to the private network thereby enabling them to send and receive data across public networks.

A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.

Find out more at: https://brainly.com/question/25234505

the pathway through which an electric signal moved between devices is known as what?

Answers

The answer would be electric Circuit or just circuit!

Which component of a DC motor ensures electrical connectivity to the rotor?



What is the value of the current in x?

Answers

Answer:

ketchup?

Explanation:

The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.

Answers

The CNSS model of information security evolved from a concept developed by the computer security industry known as the CIA triad .
Other Questions
Yo soy Paco, tengo 16 anos.Y tu Maria ? ___________ anos tienes?Cuanto CualCuantosQueDondeYo soy Paco, tengo 16 anos.Y tu Maria ? ___________ anos tienes?Cuanto CualCuantosQueDonde Productivity gains are an important factor in the expenditure model because A. companies can squeeze workers more than normal B. it shifts the AD curve to the left C. the investments made are cheaper and allows companies to D. it shifts the AS curve to the right An endothermic process may be spontaneous if ______. Multiple choice question. the endothermic process results in a precipitation of a crystalline solid from a liquid solution the endothermic process converts a gas reactant into a liquid or solid product the product particles have more freedom of motion than the reactant particles the product particles have less freedom of motion than the reactant particles A 12-in. steel cable weighs 0.428 lb. How much does 12.8 ft. weigh? Pls help i am so lost Imagine that in 2019 the economy is in long-run equilibrium. Then stock prices rise more than expected and stay high for some time. Refer to Scenario 33-2. In the short run what happens to the price level and real GDP what does SOAPST mean in english What is da evidence from the text explaining why a sound of thunder is science fiction help me plz Two electrons are separated by one cm. What is the ratio of the electric force to the gravitational force between them? (me = 9. 11 10-31 kg, ke = 8. 99 109 Nm2 /C2 , G = 6. 67 10-11 Nm2 /kg2 , and e = 1. 6 10-19 C) a. 2. 3 102 b. 1. 3 1020 c. 3. 1 1022 d. 4. 2 1042. i need help with all on these In Harryette Mullens Elliptical she writes, Of course their perspectives have been limited In this instance, is perspectives referring to the art of drawing solid objects? Explain. PLEASE HELP QUICK!!!! Which characteristic of the poem suggests that it is a lyric poem?OA.the natural setting and complete narrative qualityOB.the emotional response the daffodils evoke in the speaker.the personification of the clouds, waves, and daffodilsthe time gap between the speaker's experience and his narrationOD.ResetNextentum. All rights reserved. Could a circle have both a diameter of 7.2 inches and a circumference of 28 inches? 50 POINTS What is the greatest common factor of 4k, 18k4, and 12?A) 2B) 4C) 2kD) 4k Ten less than the product of a number and 45. What was the result when President John Adams sent Elbridge Gerry, John Marshall, and Charles Pinckney to France in an attempt to resolve differences between the United States and France?a. Foreign minister Tallyrand's agents attempted to bribe the American diplomats to get them to urge Adams to assist the French in their revolution.b. An extension on repayment of loans to the United States from France during the American Revolution.c. An indiscretion involving the wife of France's foreign minister.d. The XYZ Affair. Which excerpt of dialogue from The Treasure of Lemon Brown best reveals the shift that occurs in the relationship between Lemon Brown and Greg? What you doing here? The figure shuffled forward again, and Greg took a small step backward.You aint one of them bad boys looking for my treasure, is you? Lemon Brown cocked his head to one side and squinted one eye.You guess so? Lemon Browns voice rose an octave as he started to put his treasure back into the plastic. Well, you got to guess cause you sure dont know nothing.You O.K. for a youngster, the old man said as he tied the strings around his leg, better than those scalawags what come here looking for my treasure. Thats for sure. The clinical signs of __________________ is microcitic anemia, depression, dermatitis and confusion. Please take a look at the picture