You can create a good design even if you don't know much about the target audience.
Agree or disagree?

Answers

Answer 1

Answer:

agree

Explanation:


Related Questions

Which type of software can be used without paying a license fee and can be modified to add capabilities not realized by its originators? *
10 points
Application software
System software
Open-source software
Proprietary software

Answers

Answer:

Open Source software.

Answer:

open source software

Explanation:

Can anyone help me
I will make you a brainalist

Answers

Answer:

Explanation:

Exercise A:

1. A table.

2. Categorical.

3. Access.

4.Queries.

5.ACCDB extension.

Exercise B:

1. Insert Tab.

2. DoCmd.Quit method.

3.Navigation Pane.

4. Modify table data.

5.The top pane and the bottom pane.

Hope this helped you!

JavaScript is very complex scripting ________________​

Answers

Answer:

yes it is was this a questipn

Answer:

Java script is very complex scripting language.

Explanation:

Java script is most commonly used in a client side scripting language, user request an html page with java script is sent to the browser.

Java script code is written into an the html page, java script can be used to the in other contexts  a web browser.Java script could not be used to write real complex programs, and site is used to the deals of java script in web browser.Java script is the primarily a scripting language for they use of html pages,java script is client side scripting language.Java script was the developed by the Brendan, and it can be used in a server side environment.Java script they descend to the both C and C++ languages gone in quite different directions.Java script is a lightweight interpreted programming language and java script source code compiled into a faster to the binary format.Java script is to contain the applied to your html page in a similar manner to CSS.Java script is the object oriented nature to understand to go further knowledge of that language and write more efficient code.Java script is developed by the Netscape, java script to run the designed Netscape navigator.

This contains lists of commands that you can use to tell the computer what to do. o command prompt Finder folder Menu bar​

Answers

Answer:

Menu Bar

Explanation:

its right

adding transition slides to a presentation

Answers

Answer:

1. Select the slide you want to add a transition to.

2. Select the Transitions tab and choose a transition. Select a transition to see a preview.

3. Select Preview to see what the transition looks like.

To remove a transition, select Transitions > None.

What is output?
C = 1
sum 0
while (c < 10):
c = c + 3
sum
sum + C
print (sum)

Answers

Answer:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

Explanation:The French and Dutch settlements differed from the Spanish colonies in that they were created mainly to trade and develop industries, while the Spanish were primarily concerned with gold and silver excavation, and then later with sugar exportation.

Programming environment is

Answers

Answer:

environments containing language specific editors and source level debugging facilities or all of the hardware and software in the environment used by the programmer.

Explanation:

quick google search.

Two fingers are assigned to six letters each. What fingers are they?

Answers

Answer:

The left and right index finger

Explanation:

Left index finger: R, T, F, G, C, V

Right index finger: Y, U, H, J, B, N

Different types of names given to explicit convertion in java

Answers

Answer:

Different types of name given to explicit conversation in java are

1. Automatic

2. Explicit

where can I watch all harry potter movies for free?
and I know this isn’t exactly the question I should be asking here but pls help me and don’t give me virus

Answers

Answer:

Ive streamed them before on DailyMotion

What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?

Answers

Answer:

extranet

Explanation:

An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet.

Match the following
image editing software
Web browsers
Computer Aided Design, or the use of software to aid in
1,
technical drawings and models
2. Information processed or stored by the computer
3. software that organizes a collection of data
also known as graphics software, this software enables a
4.
person to change or create visual images on a computer
fields on a screen used to search for specific information in a
5.
database
CAD
query
Web page
dota
6. Software used to browse the World Wide Web
a page on the World Wide Web that may contain text,
7
Images, audio, or video
database

Answers

Answer:

4

Explanation:

because your wanting something that's well edit an image

Robert’s computer is not working properly. It has become too slow to respond to programs. What can he do to maintain his computer and help it function properly?

Answers

Answer: Utility Software

Explanation:

Utility software is software designed to help to analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.

Answer:

Utility software

Explanation:

evolution of new technology also increased the crime in our society explain​

Answers

Answer:

yes ,for sure evolution of new technologies also increased the crime in our society. Many cyber crime are occurring due to the use of new technologies. People can hack the data , transfer money from others account and so on . People are using new technology to harm others ,steal others data and information . It has given an opportunity to many people to do various crime easily .

What does it mean to say RAM is volatile? *

Answers

It means that it’s computer memory that needs power to keep the stored information. You can easily lose your data when the power is interrupted.

The questions are from HTML. State whether the following statements are true or false. 1. HTML is the programming language. 2. Web page is the collection of website. 3. <marquee> tag is used to link the Hyper text. 4. Heading tag supports different levels from H1 to H6. 5. Attributes provide additional information to the HTML tags. 6. Empty tags must be closed with ending tag </>. ​

Answers

Answer:

true

Explanation:

hope this helps

Technologies are having a negative impact on businesses.

Answers

Answer: False

Explanation: I think its false because technologie has had a good impact on businesses.

Answer:

False

Explanation:

Technology has increased the capacity of businesses.

On a webpage, a _____ provides supplemental material such as social networking feeds and ads. Group of answer choices footer sidebar header navigation bar

Answers

Answer:

sidebar

Explanation:

The part of the webpage that is being described in this question is known as a sidebar. These are the far left/right sides of the webpage and are usually used for networking feeds, ads, related information, major points of the main page, biographical info, as well as persuasive information. This section of the webpage serves two main purposes to provide the viewer with advertisements and to encourage the reader to read the more detailed main article.

Which of the following is not a method for opening Word software? right clicking on the desktop and selecting "view" selecting the Start button and navigating through all programs selecting the Start button and navigating to the most recently used programs using an icon on the desktop

Answers

Answer:

right clicking on the desktop and selecting "view"

Explanation:

A word software enables us to create, edit  two or more documents at the same time and print documents, to write text, store it electronically, display it on a screen and modify it by entering commands, and then print it.

It enables you to draw graphs, and possibly even convert videos into a document.

Word software cannot be opened by right-clicking on the desktop and selecting "view".

Answer:

right clicking on the desktop and selecting "view" selecting the Start button

Explanation:

Word pad is a word processing software included with all versions of MS- Windows starting from Windows 95 to Windows 10. It is more better compared to Notepad and much simpler than Microsoft Word. Microsoft replaced the Microsoft write.

You cannot access word pad by clicking on the desktop and selecting "view", the simplest way to access Word pad is by clicking on the start button and then clicking on the word pad.

Which of the following is the best definition of the
word aptitude?
personal interest
potential skill level

success factor
actual skill level

Answers

Answer: For the definition of aptitude the answer is B-potential skill level . For the definition of ability the answer is D -actual skill level

Explanation: I did the assessment:)!

The best definition of the word aptitude will be actual skill level. Then the correct option is D.

What do you mean by the word aptitude?

A component of the ability to perform a certain sort of task at a specific level is aptitude. Exceptional aptitude may be deemed to possess the skill. The capacity to carry out particular tasks, whether physical or cerebral but rather whether developed or underdeveloped, is referred to as aptitude. When compared to talents and abilities, which are acquired via training, the ability is frequently contrasted.

Both capability and IQ are terms that refer to a person's mental capacity. Unlike the basic concept of intelligence (IQ), aptitude frequently refers to any of a variety of diverse traits that can exist independently of one another, such as the ability for programming language, military flying, or air traffic control.

The term "aptitude" is best defined as real skill level. Then the correct option is D.

More about the word aptitude link is given below.

https://brainly.com/question/20372641

#SPJ2

A technician is troubleshooting an expansion card in a computer that allows the computer to receive faxes over a VoIP line. The line connected to the expansion card is MOST likely which of the following cable types?A. CoaxialB. CAT3C. CAT6D. Multi-mode fiberE. Single-mode fiber

Answers

Answer:

C. CAT6

Explanation:

CAT6 cable is the standard twisted pair cable for Ethernet and other network physical layers, lagging behind with category 5 / 5e The cat 6 cable can be detected by printing on the side of the cable sheath. TIA / EIA-568 defines cable type, connector type and cabling topology. Cat 6 cable has a maximum length of 55 m (180 ft) when used for 10GBASE-T and is rated at 500 MHz At a frequency frequency of 500 MHz, the ISO / IEC CAT 6A connector performs 3 dB better than the Cat 6A connector, which is EIA / TIA specified.

When did the silent movie era end?
A.1919
B.1929
C.1939
D.1949

Answers

Answer:

The answer is 1929.

Pretty sure your answer is B. 1929

Using the drop-down menus, correctly match the name of the person with the computer-programming
innovation
In 1975,
founded Microsoft, which released Altair BASIC, the first
programming language for personal computers.
found the first computer bug in 1947, and invented the concept of a compiler in
1952
v led a team at IBM that developed FORTRAN and its compiler in 1957
developed C++ programming language, and published the reference guide
in 1987
released the Python programming language.

Answers

Answer:

1. Bill Gates and Paul Allen

2. Grace Murray Hopper

3. John Backus

4. Bjarne Stroustrup

5. Guido van Rossum

If the 5th term of an A.P is 7 and the first term is 2.Find the common difference.​

Answers

Answer:

5/4

Explanation:

a=2

a5=7

a+(5-1)d=7

2+4d=7

4d=5

d=5/4

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

identity theft

corporate espionage

software piracy

sale of trade secrets

Answers

Answer:Sale of trade secrets

Explanation:

Just took it

Answer:

sale of trade secrets

Explanation:

Just took it edgen 2020 is correct

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

trade

/trād/

the action of buying and selling goods and services.

If something is copyrighted,
how can it be used?
A. Only with credit
B. Only with permission
C. With credit or in certain "fair use" cases
D. With permission or in certain
air use" cases

Answers

D
Because you need permission

Given an "out" string length 4, such as "<<>>", and a word, return a new string where the word is in the middle of the out string, e.g. "<>". Note: use str.substring(i, j) to extract the String starting at index i and going up to but not including index j.
makeOutWord("<<>>", "Yay") → "<>"
makeOutWord("<<>>", "WooHoo") → "<>"
makeOutWord("[[]]", "word") → "[[word]]"

Answers

Answer:

The following are the answer to this question.

Explanation:

In the given code, a "makeOutWord and word" is already used to hold some value. In this code, we define a string method "makeOutWord" that accepts two string variables "out and the word" in its parameter.

Inside the method, a return keyword is used that uses the string variable "out and the word" with the "substring" method, this method is used to returns a new string from an old string value, and it also uses the "word" string variable for the return value.  

please find the attached file for code:

By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information. A) identity thieves B) keyloggers C) hackers D) cyberstalkers

Answers

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

The flowchart that show the sequence of logical operations executed by a computer is called a: A. Systems flowchart B. Operations flowchart C. Program flowchart D. Decision flowchart

Answers

Answer:

It is called a Program Flowchart.

Explanation:

It is implied in the AMS Climate Paradigm that components of Earth’s climate system (e.g., atmosphere, hydrosphere, cryosphere, geosphere, and biosphere) interact in a(n) ________ way as described by natural laws.

Answers

Answer:

orderly

Explanation:

The American Meteorological Society presents information, development, and an interdisciplinary approach towards the researches of atmosphere and hydrosphere. The goal of the society is intended towards developing a research-based idea covering the topics of atmosphere and science. The atmosphere, hydrosphere, cryosphere, geosphere, and biosphere are the components of the environment that helps in determining and analyzing the climatic condition of the Earth.

Other Questions
Represent the following expression using an exponent. 11 11 11 11 A.4 11 B.11 4 C.11 11 D.1 4 Btw these are exponents Total contribution margin is an important assumption in multiproduct CVP analysis.A. TrueB. False both questions pls !! Which point of view would be best if an author wants to develop a characters inner thoughts who make up the whole story? A. first personB. third person limitedc. third person omniscient d. second person HELP What is the sum of 1000x and 2000x french army officer that came to help the americans defeat the british Why did the French Revolution become so violent? The Spanish alphabet has some letters that are not part of the English alphabet. True Or False 1. Which statement best describes the main conflict in the story? A Maya needs permission to go to a school dance. B Maya's brother is being bullied at school. C Maya's family is struggling to earn enough money to live. D Maya has to do her mother's job when her mother is injured. Read the sentences from Barrio Boy by Ernesto Galarza. I was left alone in the room for M-E-N. I examined it with great carethe smooth enamel bowl with water in the bottom, the wooden lid with a large hole that looked like a horse collar, the small brown box up near the ceiling, the chain hanging from it. Pressed for time, I finally decided it was safe enough to try. How does Ernesto feel? worried that he is in the wrong room unsure about the new experience confused about the use of the chain troubled by the size of the hole The company reported net sales of $6,250 million. Assume that there were no noncash sales. Operating costs (excluding depreciation and amortization) were 65% of the companys total revenues. Depreciation and amortization charges were 5% of total sales. Interest charges were 15% of earnings before interest and taxes (EBIT) with a tax rate of 40%.Net income is the money that the business is left with after paying operating expenses, interest expense, and taxes. However, because some revenues and expense are not cash transactions, net cash flow indicates the true cash flow situation of the company. The company's current cash flow is:_________ a. $573 million b. $379 million c. $761 million d. $955 million what is 2/4 as a % plz hurry important If 5y + 2 = 8/3, what is the value of 5y - 6? PLEASE HELP, THANK YOU! :) There are nine justices in the Supreme Court, including a chief justice. Totry and keep the Supreme Court out of party politics, justices arenominated by the president and confirmed by the Senate. In addition,justices do not serve limited terms of two, four, or six years like themembers of the legislative and executive branches do. They get to serveuntil they retire or die. And if justices do something illegal, the Senate hasthe power to impeach them. It's all about the checks and balances. Thefederal judges that serve in district courts are also appointed instead ofelectedBased on this passage, Supreme Court JusticesAare not elected.Bserve for 5 years.are allowed to seek reelection.Dmust campaign every 7 years. In marketing terms, we say that the number of intermediary levels indicates the ________ of a channel. Factor 20x2 + 35x plz help 3. All the water found on Earth's surface, below ground, and as a liquid in theatmosphere makes up the_________ A 4-cup bottle of shampoo costs $18.36. What is the price per pint? someone took the last cookie jar last night the last person to leave the scene is the culprit. Who was it? clues:the butler walks to work the handyman rides a bike the cook rides a motorcycle the maid drives a car the nephew has a seeing-eye dog