Add CSS rules to articles.css for the given news article webpage that matches the following styling: Both article's images styled with a width of 300px Article's tag styled with: 5px padding all around Font family of Arial Font size of 24px Font color of white Background color of red. Selecting the id of author-name-and-date, style the author name and date with: Font family of Arial Font size of 12px Font color of lightgray Article's text (

and

  1. tags) styled with: Font family of Times New Roman Font size of 16px Font color of gray Article's share links (
  2. tags) styled with: Font family of Arial Font size of 12px Font color of blue Note: Colors, font sizes, padding, etc. must be exact.

Answers

Answer 1
Answer:

Answer:

Answer is provided in the explanation section

Explanation:

articles.css file:

img {

width: 300px;

}

h1 {

color: #FFFFFF;

font-family: arial, sans-serif;

font-size: 24px;

background-color: red;

padding: 5px 5px 5px;

}

#author-name-and-date {

color: lightgray;

font-family: arial, sans-serif;

font-size: 12px;

}

p , ol {

color: gray;

font-family: "Times New Roman", Times, serif;

font-size: 16px;

}

a {

color: blue;

font-family: arial, sans-serif;

font-size: 12px;

}


Related Questions

Hardware Name:Description:Picture:1. Motherboard2. Power Supply3. CPU (Central Processing Unit)4. Random Access Memory (RAM)5. Hard Disk Drive/Solid State Drive6. Video Card7. Optical Drives8. Input and Output Devices
What are the advantages and disadvantages of using the serial console connection compared to the usb console connection to a cisco router or switch?
So, I have strict parents & need help, if u don’t know how to fix this after u read it, leave. I don’t want u getting points for nothing I’m deleting ur answer if u do it for points. Anyways, I want to get Spotify on my phone, but it says “Enter the password for (my email)”. How do I sign back into it if I don’t know the password. My dad has the password, but I don’t want to get in trouble for stealing his phone to fix mine. Please help, I’ll give the brainliest!
Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modification, and fabrication. i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication. ii. How do the first three security concepts relate to these four attacks
Write a C++ program which accepts the quantity of a product purchased and prints the amount to be paid by the customer.​

Blender questions6. In the default 3-D view, which of the following changes depending on what actions are being carried out on the screen, and acts as the roadmap? (1 point)

the pivot point

the toolbar area

the view editor

the info header



7. You cannot use the manipulator widget to translate, define, rotate, or scale an object. (1 point)

true

false

Answers

Blender questions
6. In the default 3-D view, which of the following changes depending on what actions are being carried out on the screen, and acts as the roadmap? (1 point)

the pivot point

the toolbar area

the view editor

the info header

The correct answer is:

the pivot point

7. You cannot use the manipulator widget to translate, define, rotate, or scale an object. (1 point)

true

false

The correct answer is:
false
The Transformation manipulator widgets allow mouse controlled translation, rotation and scaling in the3D View.

. A file allocation table (FAT) is used to keep track of the portions assigned to a file. Select one: True False

Answers

Answer: True

Explanation: File allocation table(FAT) is the part of the file system that helps the hard drives .It is used for the management of the files and data which gets stored in the hard drive  by the operating system. It can also help in the extension or expansion of the hard drive storage.

It also keeps tracing the files and data accordingly. This table works for the  portable devices ,cameras etc. Thus, the statement given is true.

Express 278910 in binary – Use the technique of subtracting powers of 2

Answers

Answer: The decimal number 278910, expressed in binary, is as follows:

               1000100000101111110

Explanation:

Any decimal number can be expressed as a linear combination of powers of 2, as follows:

N = aₙ* 2ⁿ +.....+ a₀*2⁰, where the coefficients aₓ can be 0 or 1.

This means that any number, can be decomposed in powers of 2, so a useful and at the same time simple way to find the binary equivalent of a decimal number, is simply to substract from the number the maximum power of 2 that gives a positive outcome, and put a "1" in the most left position, filling with zeros to the right till finding the following power of two (obtained repeating the process with the result from the first substraction).

For the first substraction, we try different choices, until we get a positive result substracting 2¹⁸ from 278910, as follows:

278,910-262,144= 16,766.

Intuitively, we know that as being 16 a power of 2, it's possible that a number close to the one we have as a result, be a power of 2 indeed.

Trying with 2¹⁴, we find that we are right, because the result is a small number:  

16,766 - 16,384 = 382

Now. it's very easy, as the greatest power of 2 smaller than 382, is 2⁸=256.  

382-256= 126.

126 can be written as 64+32+16+8+4+2, so all that we need now is, going from left to right, put "1", as the coefficient of the powers of 2 18, 14, 8, 6, 5,4,3,2 and 1, filling with zeros the remaining ones.

The final number can be written as follows:

1000100000101111110

In real-world environments, once the domains that are affected by the risks are identified, subsequent next steps would include:______.

Answers

Answer:

Explanation:

In real-world environments, once the domains that are affected by the risks are identified, subsequent next steps would include selecting, implementing, and testing controls to minimize or eliminate those risks.

Choose the missing term
-------time
time.sleep(3)

Answers

Answer:

import

Explanation:

If this is python, you'll have to import the time module.

Why is OS important in every data processing system?
Please Answer Fast! ​

Answers

Answer:

Functions of an operating system. An operating system provides three essential capabilities: It offers a UI through a CLI or GUI; it launches and manages the application execution; and it identifies and exposes system hardware resources to those applications -- typically, through a standardized API.

Explanation: