What is the purpose of "display:table"?

Answers

Answer 1

Answer:

Modern browsers use CSS to style all their markup.

How would they render a <table> element if CSS had nothing that could express the appearance of one?

(That, and you might have non-tabular data that you want to render like a table, there are enough people using tables for layout to see a demand for it).

They can be used to format content in a tabular manner when the markup does not use the table element, e.g. because the markup was written by someone who was told not use tables or because the markup is generic XML and not HTML.

You can also design a page using e.g. div elements so that some stylesheet formats them as a table, some other stylesheet lets them be block elements or turns them to inline elements. This may depend e.g. on the device width


Related Questions

MyProgramming Lab

It needs to be as simple as possible. Each question is slightly different.

1. An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers is the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.

Given the positive integer distance and the non-negative integer n, create a list consisting of the arithmetic progression between (and including) 1 and n with a distance of distance. For example, if distance is 2 and n is 8, the list would be [1, 3, 5, 7].

Associate the list with the variable arith_prog.

2.

An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers if the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.

Given the positive integer distance and the integers m and n, create a list consisting of the arithmetic progression between (and including) m and n with a distance of distance (if m > n, the list should be empty.) For example, if distance is 2, m is 5, and n is 12, the list would be [5, 7, 9, 11].

Associate the list with the variable arith_prog.

3.

A geometric progression is a sequence of numbers in which each value (after the first) is obtained by multiplying the previous value in the sequence by a fixed value called the common ratio. For example the sequence 3, 12, 48, 192, ... is a geometric progression in which the common ratio is 4.

Given the positive integer ratio greater than 1, and the non-negative integer n, create a list consisting of the geometric progression of numbers between (and including) 1 and n with a common ratio of ratio. For example, if ratio is 2 and n is 8, the list would be [1, 2, 4, 8].

Associate the list with the variable geom_prog.

Answers

Answer:

The program in Python is as follows:

#1

d = int(input("distance: "))

n = int(input("n: "))

arith_prog = []

for i in range(1,n+1,d):

   arith_prog.append(i)

print(arith_prog)

#2

d = int(input("distance: "))

m = int(input("m: "))

n = int(input("n: "))

arith_prog = []

for i in range(m,n+1,d):

   arith_prog.append(i)

print(arith_prog)

#3

r = int(input("ratio: "))

n = int(input("n: "))

geom_prog = []

m = 1

count = 0

while(m<n):

   m = r**count

   geom_prog.append(m)

   count+=1

print(geom_prog)

Explanation:

#Program 1 begins here

This gets input for distance

d = int(input("distance: "))

This gets input for n

n = int(input("n: "))

This initializes the list, arith_prog

arith_prog = []

This iterates from 1 to n (inclusive) with an increment of d

for i in range(1,n+1,d):

This appends the elements of the progression to the list

   arith_prog.append(i)

This prints the list

print(arith_prog)

#Program 2 begins here

This gets input for distance

d = int(input("distance: "))

This gets input for m

m = int(input("m: "))

This gets input for n

n = int(input("n: "))

This initializes the list, arith_prog

arith_prog = []

This iterates from m to n (inclusive) with an increment of d

for i in range(m,n+1,d):

This appends the elements of the progression to the list

   arith_prog.append(i)

This prints the list

print(arith_prog)

#Program 3 begins here

This gets input for ratio

r = int(input("ratio: "))

This gets input for n

n = int(input("n: "))

This initializes the list, geom_prog

geom_prog = []

This initializes the element of the progression to 1

m = 1

Initialize count to 0

count = 0

This is repeated until the progression element is n

while(m<n):

Generate progression element

   m = r**count

Append element to list

   geom_prog.append(m)

Increase count by 1

   count+=1

This prints the list

print(geom_prog)

write history of computer virus. I will mark as brainliest answer ​

Answers

Answer:

The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.

Mark Brainliest please

Computer viruses have been around for quite a bit and nearly all of them have been spread through the Internet or its predecessors. Most viruses have been designed to steal users' information, processing power and/or disable the system all together.

The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US.

The first computer virus for MS-DOS was "Brain" and was released in 1986. It would overwrite the boot sector on the floppy disk and prevent the computer from booting. It was written by two brothers from Pakistan and was originally designed as a copy protection.

"The Morris" was the first Computer virus which spread extensively in the wild in 1988. It was written by Robert Morris, a graduate student from Cornell University who wanted to use it to determine the size of the internet. His approach used security holes in sendmail and other Unix applications as well as weak passwords, but due to a programming mistake it spread too fast and started to interfere with the normal operation of the computers. It infected around 15,000 computers in 15 hours, which back then was most of the internet.

Since then, many new viruses have been introduced and the trend is growing exponentially every year.

Infamous viruses of the digital age
Following are some of the most well-known or significant viruses that have grown in step with the role of information technology in society:

In 1991, the "Michelangelo" virus was first discovered in Australia. It would lay dormant until 6th March every year and then overwrite the first one hundred sectors on the storage devices with zeros, preventing the computer from booting. Only 20,000 computers were reported infected.

In 1998, CIH was released. It infected around 60 million computers and caused significant damages by overwriting important system files. It was written by a Taiwanese student.

In 1999, "Melissa" was released. This one, was the first wide spread Word Macro Virus. It was distributed via email and would automatically send itself to the first 50 people in the Outlook address book. It did not harm the computer as it was sending out passwords for some erotic websites which required membership. It caused so much email traffic resulting in email servers to crash.

2000 was the year of "iloveyou". Again, it came via email however it sent itself to all contacts. It also overwrote office, image, and audio files. The virus came from the Philippines and infected over 50 million computers in less than 10 days. Most companies back then decided to turn off their email servers to stop spreading the virus.

Since 2000, so many new viruses have been unleashed to wreak havoc on the world at large that it is difficult to list the most infamous. "Anna Kournikova", Code Red, Nimba, Beast, SQL Slammer, Blaster, Sobig, Sober, MyDoom, Netsky, Zeus, Conficker, Stuxnet, CryptoLocker, Locky, Mirai and WannaCry, are a few examples that come to mind.

If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops

Answers

Answer:

RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.

Explanation:

Routing Information Protocol (RIP) is a type of dynamic routing protocol which finds the best path between the source and the destination network through the use of hop count as a routing metric. The path with the lowest hop count from source to destination is considered as the best route. Routing Information Protocol (RIP) is a distance-vector routing protocol.

RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.

This sentence is an example of which type of narrative point of view? I did not know what the future held of marvel or surprise for me.​

Answers

Answer: First person

Explanation:

First-person narrative point of view is the mode of storytelling whereby the storyteller recounts the events that occured based on their own point of view. In this case, pronouns such as I, we, our, us and ourselves are used in telling the story.

In the sentence given " I did not know what the future held of marvel or surprise for me" shows that the person is recounting the event based on his or her own point of view. This is therefore, a first person narrative.

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Answers

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.

In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.

Answers

Answer:

"Private" is the right solution.

Explanation:

Application servers supplied sometimes over the World wide web or through a personal corporate network as well as to chosen customers rather than the community benefit of the entire, is termed as the private cloud.It provides companies with the advantages of a cloud environment that include self-checkout, adaptability as well as flexibility.

While in high school, you need to complete a specific number of ___ to be accepted into a four-year college

Answers

Answer:

credits

Explanation:

I'm still in highschool

Answer:

If these are your options:

A: electives

B: Advanced Placement courses

C: course requirements

D: dual enrollment courses

It's C, course requirements

Explanation:

Which software system is used to store appointments, scheduling, registration, and billing and receivables

Answers

Answer:

"Practice Management System (PMS)" is the appropriate answer.

Explanation:

It's the kind of technology that has been discovered in healthcare professionals, developed to handle the day-to-day activities utilizing the desktop application.Is therefore typically utilized assurance and consulting tasks, but can also be connected to medical digital records dependent on multiple treatment practices requirements.

Thus the above is the correct answer.

What accesses organizational databases that track similar issues or questions and automatically generate the details to the representative who can then relay them to the customer

Answers

Answer: Call scripting

Explanation:

A script refers to the computer language that has different commands in a file and can be executed without them being compiled.

Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling.You want to protect the laptop from Internet-based attacks.Which solution should you use?

Answers

You can get a antivirus subscription that will kill malwaresAlso, you can avoid going on websites you don't trustI hope this helps you.

Realiza un algoritmo que calcule la edad de una persona y si es mayor = a 18 que imprima mayor de edad de lo contrario que imprima menor de edad

Answers

Answer:

Explanation:

El siguiente codigo esta escrito en Java. Le pide al usario que marque la edad. Despues el programa analiza la edad y imprime a la pantalla si el usario es mayor de edad o menor de edad. El programa fue probado y el output se puede ver en la imagen abajo.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Cual es tu edad?");

       int age = in.nextInt();

       if (age > 18) {

           System.out.println("Mayor de Edad");

       } else {

           System.out.println("Menor de Edad");

       }

   }

}

_____ is a feature of electronic meeting systems that combines the advantages of video teleconferencing and real-time computer conferencing.

Answers

Answer:

The answer is desktop conferencing.

Explanation:

Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.

Answers

The good answer is: Sacrificial

You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?

Answers

Answer:

Vulnerability scanner

You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.

What is a vulnerability scanner?

Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.

A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.

If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.

To learn more about vulnerability scanners click here:

https://brainly.com/question/10097616

#SPJ12

Who is the father of computer?​

Answers

Answer:

The first automatic digital computer has been designed by the English mathematician and inventor Charles Babbage. Babbage developed the Analytical Engine Plans for the mid-1830s.

Explanation:

Babbage has developed the concept of a digital, programmable computer and was a mathematician, philosopher, inventor, and mechanical engineer. Some regard Babbage as a "computer father" The inventing of its first mechanical computer, the difference engine, is attributable to Babbage, which eventually resulted in more complex electronic designs, although Babbage's Analytical Engine is the main source of ideas for modern computers. He was described as the "prime" among the numerous polymaths of his century by his varied work in another field.

what is the fullform of ETA in computer term​

Answers

Answer:

Estimated Time of Arrival.

Cuá es la relación entre la tecnología  y la vida?

Answers

Answer:

La innovación tecnológica ha permitido que la humanidad avanzara sobre la base de disponer de unas prótesis más potentes en el divagar por la tierra

Explanation:

Hola! Dicho esto en el mundo en que vivimos hoy en día hemos podido con la tecnología inventar cosas que nos ayudan con nuestras vidas cotidianas como son los medios de comunicación, transporte, entre otros. Y para terminar de contestar la pregunta como tal pues sería algo como:

"La relación entre la tecnología  y la vida es que la tecnología ayuda al ser humano en diferentes áreas tales como el transporte y la comunicación que hoy en día son un punto clave para poder vivir mejor."

¡Espero que te haya ayudado mucho!! ¡Bonito día!

When Maggie attempted to reconcile her company's monthly sales revenue, she used a TOTALS query to sum the sales from the invoice line items for the month. But the sum of the sales produced by the query did not agree with the sum of the monthly sales revenue reported on the company's general ledger. This is best described as a problem with

Answers

Answer:

The correct answer is "Consistency".

Explanation:

It should have been continuous to have the information management service. All information must have been linked, gathered using the same technique as well as measurement but also displayed simultaneously frequencies.Throughout this query, Maggie considers the organization proceeds by a system whereby financial transactions online are not influenced by trade payables or rebates as they are separate accounts that are afterward adjusted for the business model.

Thus, the above is the correct answer.

In order for storage devices to be prepared for use, they must be ____________ Group of answer choices pre-prepared loaded initiated formatted

Answers

Answer:

formatted

Explanation:

In order for storage devices to be prepared for use, they must be formatted.

Answer:

Formatted

Explanation:

In order for storage devices to be prepared for use, they must be Formatted Group of .

Hope it is helpful to you

With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have other words within the search. Group of answer choices exact match phrase match broad match modified broad match

Answers

Answer:

modified broad match.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

At the retrieving stage of a web search, the search engine queries its database using a retrieval algorithm to extract the necessary and related terms to the search. After obtaining the search terms, the stored web addresses that are related to the search is then displayed.

There are different types of matching techniques used in configuring a search engine and these includes;

I. Exact match.

II. Phrase match.

III. Broad match.

IV. Modified broad match

When a modified broad match is used, the search engine shows adverts that have the keyword typed exactly as the searcher used, but may also include other words within the search term.

Hence, the name modified because it avail users other options by including other words within the search.

What type of compression uses an algorithm that allows viewing the graphics file without losing any portion of the data

Answers

Answer: Lossless Compression

Explanation:

The type of compression that uses an algorithm which allows viewing the graphics file without losing any portion of the data is referred to as the lossless compression.

Lossless compression refers to a form of data compression algorithms which enables the reconstruction of the original data from the compressed data.

Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time

Answers

Answer: B. Multi-user, multitasking.

Explanation:

Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.

The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.

In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.

Answers

Answer:

case-based.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.

In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.

An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement. True False

Answers

Answer:

True

Explanation:

An end user license agreement (EULA) is usually designed by a software developer to take the form of an electronic notification that would appear on the screen of the device of an end user when he or she is installing a software.

Furthermore, an end user has a choice to accept or decline the terms of this agreement.

Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.

Answers

Resposta:

44,76 Kwh

Explicació:

1 cavall = 746 watts

Per tant, 30 cavalls es convertiran en:

30 * 746 = 22380 watts

Temps = 2 hores

La quantitat d'energia consumida s'obté mitjançant la relació:

Energia consumida = Potència * temps

Energia consumida = 22380 watts * 2 hores

Energia consumida = 44760 Wh

A quilowatts (Kwh)

44760 Kwh / 1000 = 44,76 Kwh

IN C++ PLEASE!!!! Define a function FilterStr() that takes a string parameter and returns "Good" if the character at index 4 in the string parameter is uppercase. Otherwise, the function returns "Bad".

Ex: FilterStr("sandwich") returns

Bad

Recall isupper() checks if the character passed is uppercase. Ex: isupper('A') returns a non-zero value. isupper('a') returns 0.

string's at() returns a character at the specified position in the string. Ex: myString.at(3)
)
#include
#include
#include
using namespace std;

/* Your code goes here */

int main() {
string input;
string output;

getline(cin, input);
output = FilterStr(input);
cout << output << endl;

return 0;
}

Answers

Answer:

Replace /*Your code goes here */ with

string FilterStr(string str){

   string retStr= "BAD";

   if(isupper(str.at(4)) != 0){

     retStr = "GOOD";

   }

   return retStr;

}

Explanation:

This defines the function

string FilterStr(string str){

This initializes the return string to BAD

   string retStr= "BAD";

This checks if the string at index 4 is uppercase;

   if(isupper(str.at(4)) != 0){

If yes the return string is updated to GOOD

     retStr = "GOOD";

   }

This returns the return string

   return retStr;

}

See attachment for complete program

you press the F9 key to convert an object to a symbol true or false​

Answers

Answer:

False,

Reason

F8 key is used for the coversion of object to symbol

1,list all data from table customer, sale and product. 2,list Name and sex of all customer. 3,list all male customer. 4,list all male and female customer. 5,list the name and age of male customers. 6,list the name, price and color of the product.​

Answers

Answer:

The SQL queries are as follows:

1. select * from customer

select * from sale

select * from product

2. select name, sex from customer

3. select * from customer where sex = 'male'

4. select name, age from customer where sex = 'male'

5. select name, price, color from product

Explanation:

Given

Tables: customer, sale, product

Required

Answer question 1 to 5

(1) All data in the given tables

To do this, we make use of the select clause to retrieve data from each of the table and * to select all data.

So, we have:

select * from customer --> This lists all data from customer table

select * from sale --> This lists all data from sale table

select * from product --> This lists all data from product table

(2) Selected details from customer table

In (1), we have:

select * from customer --> This lists all data from customer table

To retrieve selected details, we replace * with the field names.

So, we have:

select name, sex from customer

(3) Male customers

In (1), we have:

select * from customer --> This lists all data from customer table

To retrieve male customers, we introduce the where clause

So, we have:

select * from customer where sex = 'male'

(4) Name and age of male customers

In (3), we have:

select * from customer where sex = 'male'

To retrieve the name and age, we replace * with name and age. So, we have:

select name, age from customer where sex = 'male'

(5) Name, price and color of products

In (1), we have:

select * from product --> This lists all data from product table

To retrieve selected details, we replace * with the field names.

So, we have:

select name, price, color from product

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____

Answers

Answer:

That would be Bluetooth

Explanation:

As Bluetooth is the most widely used network. It is used to operate many things, such as:

Headphones

Speakers

Remotes

etc.

a passcode is created using 4 digits. how many passcodes can be created where the code has to be 5000 or greater with no digit allowed to repeat

Answers

Answer:

5000 passcodes

Explanation:

5x10x10x10 = 5000

Other Questions
Find an explicit formula for the geometric sequence \dfrac12\,,-4\,,\,32\,,-256,.. 2 1 ,4,32,256,..start fraction, 1, divided by, 2, end fraction, comma, minus, 4, comma, 32, comma, minus, 256, comma, point, point. Note: the first term should be \textit{a(1)}a(1)start text, a, left parenthesis, 1, right parenthesis, end text. a(n)=a(n)=a, left parenthesis, n, right parenthesis, equals Help pls I am very confused While organizing the magazines at the doctor's office, Camille put 12 magazines in the first pile, 15 magazines in the second pile, 18 magazines in the third pile, 21 magazines in the fourth pile, and 24 magazines in the fifth pile. If this pattern continues, how many magazines will Camille put in the sixth pile? How did industrialization help Europe colonize the rest of the world 33 POINTS! PLS ANSWER ASAP PLS!How might a political cartoonist show a struggle between politicians of the two major political parties? PLEASE simplfy 8^158^3 Outline in detail the first 15 chapters of the Book of Exodus. We're enjoying the course very much. we're learning a lot. (true or false?) an example of a passive electronic monitoring system is which of the following 1. A telephone call to the offender's home2. GPS3. Ankle monitor 4. All of the above Can someone help me on this please Given that cos 75 = X, show that cos 105 = X Is IBM 1041, Minicomputer? Yes or no A motorbike is for sale at $13000. Finance is available at $3000 deposit and monthlyrepayments of $520 for 4 years. What is the interest paid? Which scenario provides the best example of someone whose healthy meal planning is impacted by time?A. Hernando was diagnosed with celiac disease as a teenager, so he cannot eat anything with gluten. He has to seek out other options to meet his daily fiber intake.B. Owen has been a very picky eater since he was a small child. Now a teenager, he helps his parents prepare dinners to make sure that the ingredients are ones he enjoys eating.C. Meghan is saving for graduate school, so she has a limited budget to spend on her food. Since fresh fruits and vegetables are expensive, she sometimes has to opt for frozen or canned.D. Shayna lives with her parents, and everyone in the family has a hectic school or work schedule. By the time they all get home, it's late and there's little time to prepare a healthy meal. come help me!! rack up those points!! needing lots of help with geometry today :) Which of the following is NOT a belief accepted by Creators? If you were given the opportunity to choose the members of your rular municipality, what type of candidate would you choose? 8 x (5 - 2) = ( _ x 5) - ( _ x 2) All texts are divided into what?A. Special sectionsB. ShapesC. ParagraphsD. 5 Indentations Anna _______ homework every day. A. doB. will be doingC. doesD. had done