?Explain the formatting task involved in the creation of style rulesfor Hypertext Markup Language (HTML) 5 structural elements.

What will be an ideal response?


?The header section appears at the top of the webpage so it needs formatting that makes the header contents stand out and attract visitors to the page. To achieve this effect, one can use Cascading Style Sheets (CSS) text properties and box model properties to adjust the margins, add a border and background color, and center the contents of the header section.The nav section should also be prominent and easy to find on the webpage, so one should format it differently from the other structural elements. Because the nav section contains only text, one should use CSS text properties to determine the text's appearance.The CSS box model properties are used to specify the padding, margins, and borders of the nav element.Unlike the other structural sections, the main section should be formatted using the display property. Internet Explorer versions 9 through 11 treat the main element as an inline element rather than a block element. To apply text and box model properties to the main section and have them appear as one intends in Internet Explorer, the display property should be used, which determines how the browser displays an element. Including the display property with a value of "block" in the declaration list of the main selector means that all browsers will display the main section as a block element.Finally, a style rule is created that formats the footer section by defining the font size, text alignment, and top margin of the footer element.

Computer Science & Information Technology

You might also like to view...

Let F be an algorithm with complexity function f(n), and let G be an algorithm with complexity function g(n). If the ratio f(n)/g(n) converges to 2 as n increases to infinity, then

A) the two algorithms are equivalent in efficiency and there is no clear winner B) implementations of F will require twice as much time as implementations of G C) we can deduce that F runs in linear time while G runs in quadratic time D) implementations of F will require twice as much space as implementations of G

Computer Science & Information Technology

What social-engineering technique involves telling an employee that you're calling from the CEO's office and need certain information ASAP? (Choose all that apply.)

a. Urgency b. Status quo c. Position of authority d. Quid pro quo

Computer Science & Information Technology

A variable that is visible to every form in a program is said to have scope.

(A) class (B) module (C) global (D) namespace

Computer Science & Information Technology

During this step of the attacker methodology, the attacker might use rootkits and attempt to extract the passwords from the etc/passwd file or steal other passwords?

a. Scanning and enumeration b. Gaining access c. Escalation of privileges d. Maintaining access

Computer Science & Information Technology