How many rules are contained in the css code?
how many rules are contained in the css code? a.1 - 1


Answer 1
Answer: I strongly agree that B is the answer

Related Questions

List two reasons why “buying a computer is no easy task” ?
Technician A says a 2:1 gear ratio doubles the amount of torque. Technician B says a 2:1 gear ratio reduces the speed by half. Which technician is correct? A. Technician A onlyB. Neither Technician A nor Technician BC. Both Technician A and Technician BD. Technician B only
Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.
Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to another variable call z. Use z for adding 30 into it and print the final result by using variable results.
Most slide layouts include at least one ________ by default.Question 2 options:placeholderaction buttontransitionanimation

What is copyright and what are your thoughts on it?


It’s a type of property marking that gives an owner the right to copy creative pieces/work. I think that it makes life easier


Copyright is a type of intellectual property that gives its owner the exclusive right to make copies of a creative work.


3. Problem 5. A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. a. How many bits are needed for the opcode? b. How many bits are left for the address part of the instruction? c. What is the maximum allowable size for memory? d. What is the largest unsigned binary number that can be accommodated in one word of memory?


The number of bits that are needed for this operation code (opcode) is 8 bits.

What is binary encoding?

Binary encoding can be defined as a standard technique that is designed and developed for converting data in plain text (source alphabets) to a form that is easily used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system.

How to calculate the number of bits.

The number of bits that are needed for this operation code (opcode) is given by this mathematical expression:

2^n > 150\n\n2^8 > 150\n\n256 > 150

n = 8 bits.

b. To determine the number of bits that are left for the address part of the instruction:

  • Opcode, O, I = 8 bits.
  • Instruction size = 24 bits.

Address = I-O\n\nAddress =24-8

Address = 16 bits.

c. To determine the maximum allowable size for memory:

Based on the memory unit, this is given by 2^(16)* 24

d. The largest unsigned binary number that can be accommodated in one word of memory is given by: 2^(24)-1

Read more on binary encoding here:


a) 8 bits b) 16 bits. c) 2¹⁶ * 24 bits d) 2²⁴ -1


a) In order to be able to accommodate 150 different instructions, the number of bits needed must be equal to the minimum power of 2 that satisfies this equation:

2n > 150, i.e. n=8.  

b) If the total number of bits for a word is 24, and 8 are used for the op code, there are 16 bits left for the address part.

c) If the address part has 16 bits, this means that the total addressable space is just 2¹⁶, so the maximum allowable size is 2¹⁶ * 24 bits.

d) As we have 24 bits to be filled, the largest unsigned binary number is just 2²⁴ – 1.

(As we need to leave a position for all zeros).

The program that you create for this exercise will begin by reading the cost of a meal ordered at a restaurant from the user. Then your program will compute the tax and tip for the meal. Use your local tax rate when computing the amount of tax owing. Compute the tip as 18 percent of the meal amount (without the tax). The output from your program should include the tax amount, the tip amount, and the grand total for the meal including both the tax and the tip. Format the output so that all of the values are displayed using two decimal places.


The program is a sequential program; as such, it does not require loops or conditional statements.

The program in Python, where comments are used to explain each line is as follows:

#This gets input for the cost of the meal

cost = float(input("Cost: "))

#This initializes the local rate tax to 7.25%

local_rate_tax = 0.0725

#This initializes the tip to 18%

tip = 0.18

#This calculates the tax amount

taxAmount = cost * local_rate_tax

#This calculates the tip amount

tipAmount = cost * tip

#This calculates the grand total

grand = cost + taxAmount + tipAmount

#This prints the tax amount

print("Tax amount: {:.2f}".format(taxAmount))

#This prints the tip amount

print("Tip: {:.2f}".format(tipAmount))

#This prints the grand total

print("Grand total: {:.2f}".format(grand))

All outputs are formatted to 2 decimal places.

See attachment for sample run

Read more about similar programs at:



If I were calculating a tip at a restaurant using the same syntax, it would have been. meal ... New value of meal is double meal times tax. you're saying: (meal + meal) * tax but meal + meal * tax is calculated in the following order meal + (meal * tax) ... eh? ;) The exercise implied it was just reading the equation from right to left.

An attacker has obtained the user ID and password of a data center's backup operator and has gained access to a production system. Which of the following would be the attacker's NEXT action? A. Perform a passive reconnaissance of the network.
B. Initiate a confidential data exfiltration process
C. Look for known vulnerabilities to escalate privileges
D. Create an alternate user ID to maintain persistent access





Based on the information provided surrounding this scenario, it can be said that the most likely next course of action would be to create an alternate user ID to maintain persistent access. This would allow the attacker to have continuous access into the network in the case that the system administrators detect that the operator's user ID and password have been compromised. Thus also giving the attacker ample time to infiltrate and find vulnerabilities in the network through an alternate hidden user ID.

The energy company in Program 1 now uses different rates for residential and business customers. Residential customers pay $0.12 per kWh for the first 500 kWh. After the first 500 kWh, the rate is $0.15 per kWh. Business customers pay $0.16 per kWh for the first 800 kWh. After the first 800 kWh, the rate is $0.20 per kWh. Write a program to calculate energy charge. You must write and use the following two functions. (a)A main function: Ask the user to enter number of kWh used and customer type (enter R for residential or B for business). Call the bill_calculator function and pass number of kWh used and customer type to it as arguments. You must use positional arguments to pass kWh used and customer type. (b)A bill_calculator function: This function has two parameters to receive number of kWh used and customer type. Calculate and display the energy charge.



The c# program for the scenario is given below.

using System;

public class Program2 {

 double total = 0;

 static void Main() {

     Program2 ob = new Program2();

   Console.WriteLine("Enter total energy used in kilo watts ");

   int p;

   p = Convert.ToInt32(Console.ReadLine());

   Console.WriteLine("Enter type of customer ");

   char t;

   t = Convert.ToChar(Console.ReadLine());

   ob.bill_calculator(p, t);

   Console.WriteLine("Total charge for " + p + " kilo watts electricity for " + t + " customers is " +;


 public void bill_calculator(int e, char c)


     int first=500, second = 800;

     double chg_one = 0.12, chg_two=0.15, chg_three = 0.16, chg_four = 0.20;

     if(c == 'R')


        if(e <= 500)


            total = (e * chg_one);


        else if(e > 500)


           total = ( first * chg_one);

           total = total + ((e-first) * chg_two);



     if(c == 'B')


        if(e <= 800)


          total = (e * chg_three);


        else if(e > 800)


          total = ( first * chg_three);

          total = total + ((e-second) * chg_four);






Enter total energy used in kilo watts                                                                                                            


Enter type of customer                                                                                                                          


Total charge for 1111 kilo watts electricity for B customers is 142.2


The program takes user input for the type of customer and the amount of electric current used by that customer.

The two input values decide the rate at which total charge is calculated.

For residential customers, charges are divided into slabs of 500 or less and more than 500.

Alternatively, for business customers, charges are divided into slabs of 800 or less and more than 800.

User input is taken in main function.

Charges are calculated in the bill_calculator method which takes both user input as parameters.

If else block is used to calculate the charges.

No input validation is implemented as it is not mentioned in the question.

All code is written inside the class. An object is created of the class.

The methods outside main() are called using the object of the class.

________ is a hybrid version of Ethernet that uses either 10Base-T, 100Base-T, or 1000Base-T. a. Mullion Ethernet
b. Base-T Ethernet
c. 10/100/1000 Ethernet
d. Token ring Ethernet
e. FDDI Ethernet


Answer: ANSWER is B I'm pretty sure

Explanation: hope this help

s :)

Other Questions