What is the modern method for separating style

Assignment Help Basic Computer Science
Reference no: EM13808543

1. Internet Explorer and Firefox are examples of a type of computer application. Any computer application transforms one form of information (input) to another form (output). Describe the input to a browser. What is the source of this input? Describe the output of a browser.

2. What is the modern method for separating style and structure when constructing a web page?

3. How can you get a graphic image on the web stored on the hard disk of your PC?

4. What is a mark-up tag in HTML? What is its purpose? Give a specific example.

5. What is a text file?

6. Windows NotePad is a simple text editor. What is the difference between a text editor and a word processor?"

7. What is an HTML Text Editor? What is it used for and how does it compare to a regular text editor?

8. Why are text files so vital to modern methods of storing information?

9. Provide an example of a single CSS style that can be applied to an entire paragraph. Briefly explain the effect of the style on the display of the paragraph.

10. Distinguish between CSS formats for appearance and CSS formats for positioning. Give an example of each.

11. List 4 different HTML tags that define the structure of a document and briefly define the function of each.

12. Provide two examples of an HTML tag for linking to a web page, both on the same web site and to a different web site. Have the text "Hi There" be the link for both examples."

13. What is the general structure of an HTML file and how is this structure related to the display of the web page?

14. What is the distinction between a font-size: 12px and font-size: 1em (or 100%) ?

15. How many windows, at least, should be open on your computer when developing a web page using a text editor? Describe.

16. Most digital cameras, including those in smart phones, provide the photograph in JPEG format. Explain the process of how this happens and how the process could be altered to provide more refined results.

17. What is the purpose of the CSS float style? (not explained well in class, will post a brief handout with a better explanation)

18. What is accomplished by the a:hover CSS style? Provide an example of a complete a:hover style definition and describe the effect on the browser display.

19. What is the function of the <div> tag in HTML?

20. What are the three types of files that are typically referenced from an HTML file as it is being processed by a browser? Provide the HTML tag used to reference each type of file.

21. What type of file reference is: C:\mypics\fun.gif ? Why is this type of file reference not used in .html files for web sites? What type of file reference is used?

22. Briefly describe how to create a styled menu of links using HTML and CSS.

23. Define networking protocol and give an example.

24. What is it and what role does the HTTP protocol perform in the use of the World Wide Web? How does HTML fit into this scenario?

25. What is a web server? When do you access a web server? What is the most widely used web server and what does it cost? How do you explain the cost? What is the second most widely used web server?

26. What is it and how does the FTP protocol relate to the Internet and the client-server model of computer interaction?

27. When using an FTP application, what are the two primary information displays (like sub-windows) that appear on the computer screen?

28. What is meant by the term Enterprise Software? Provide and briefly describe one example.

29. What is ERP? Why is its implementation usually so ambitious? Why does it fail so often?

30. What is CRM? Give an example of its use.

31. What is SCM? Give an example of its use.

32. What is a fulfillment operation? What are some key characteristics of Amazon.com's fulfillment operations? What is AWS and how is it related to Amazon.com? What is the advantage of AWS for its buyers?

Reference no: EM13808543

Questions Cloud

Portable internet access and mobile internet access : xplain the difference between portable Internet access and mobile Internet access. Explain what VoIP is and how it works
Birth through adolescence scenarios : Birth through Adolescence Scenarios
Calculate the expected dividend yield : You buy a share of The Ludwig Corporation stock for $18.30. You expect it to pay dividends of $1.02, $1.14, and $1.2741 in Years 1, 2, and 3, respectively, and you expect to sell it at a price of $28.80 at the end of 3 years. Calculate the growth rat..
About the preferred stock valuation : Several years ago, Rolen Riders issued preferred stock with a stated annual dividend of 12% of its $100 par value. Preferred stock of this type currently yields 10%. Assume dividends are paid annually. What is the value of Rolen's preferred stock?
What is the modern method for separating style : What is the modern method for separating style and structure when constructing a web page? How can you get a graphic image on the web stored on the hard disk of your PC
Constant growth rate and g : A stock is trading at $80 per share. The stock is expected to have a year-end dividend of $3 per share (D1 = $3), and it is expected to grow at some constant rate g throughout time. The stock's required rate of return is 10% (assume the market is in ..
Archaeologists for hauling the huge building blocks : Which method strikes you as most likely to be the correct explanation? Why?
Assignment on ethnographic comparison : Assignment on Ethnographic Comparison
In hidebound militarism and round-robin carnage : In these day in hidebound militarism and round-robin carnage, where even that beloved ambassador of peace , the Dalai Lama says it may be necessary to counter terrorism with violence, it's fair to ask: is humanity doomed? Are we born for the battlefi..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The professional design memo template

Using the Professional Design Memo template in Microsoft Word, create a memo to your employer which provides them with the travelers that have a balance due greater than or equal to $2000. In doing so, be sure to address the following requirements..

  The most common file types imported into excel

Which of the following is one of the most common file types imported into excel

  Write an analytical report describing the impact of breach

The case study focuses on a major IT security breach that occurred in the recent past. Consider yourself as the IT person in charge at TJX. You need to analyze the case and describe the impacts of the breach on TJX.

  Executing critical section in mutual exclusion protocol

In Lamport's mutual exclusion protocol, if process i is implementing critical section.

  Describe findings after conducting internet search for cde

The network administrator mentions that other ".cde" files have been sent through an FTP server to another site. Describe your findings after conducting an Internet search for ".cde" files.

  Smallest exponent that can be stored using this 16 bit stand

storing number in a string of 16 bits, the first bit is used for the sign of the number, and the next 5 bits store the exponent plus the bias, and the remaining 10 bits store the mantissa.  The bias is 15. What is the smallest exponent that can be st..

  Why are file system permissions so important in the linux

Why are file system permissions so important in the Linux DAC model? How they relate or map to the concept of subject "subject-action-object" transactions?

  Flexsim model for a stylist shop

Customers arrive according to a uniform distribution of unif(10,20) minutes. A single stylist works on a customer for unif(15,30) minutes. Run the model for an initial 10 replications.

  Which served as a point-of-sale cash register and terminal

ABC was launched as a retail dive shop with 10 employees in Turkey by Mr Beans. As a small business owner, Beans wanted to offer the e-commerce capabilities of a large firm using a small company's budget. Within a year, he had installed an Ethernet L..

  Write program displays the following pattern on the screen

Write a program that displays the following pattern on the screen

  Demonstrate an ability to communicate ideas

What kind of study does the question suggest (empirical--e.g., ethnography, case study, descriptive study, experimental; historical--oral or archival or both; theoretical; discourse or textual analysis, etc.) -  What data do you need to collect

  Provide injective function from to and explain why injective

Provide an injective function from ? to ? and explain why it's injective

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd