Which of the following falls under the role of a web designer?
I. Creating the look and feel of a website
II. Writing the HTML and CSS that bring a site to life
III. Figuring out the best way to display information
IV. Thinking about the user experience
V. Building a website based on a given design
or
all of the above

Answers

Answer 1

Answer:

all of the above is the answer


Related Questions

pls helppp <3 In the following nested loop structure, which loop does the program EXIT first?
for (initialization 1; condition 1; loop variable 1 increment;)
for (initialization 2; condition 2; loop variable 2 increment;)
for (initialization 3; condition 3; loop variable 3 increment;)
for (initialization 4; condition 4; loop variable 4 increment;)
{ statement block;}


A.
for (initialization 1; condition 1; loop variable 1 increment;)
B.
for (initialization 2; condition 2; loop variable 2 increment;)
C.
for (initialization 3; condition 3; loop variable 3 increment;)
D.
for (initialization 4; condition 4; loop variable 4 increment;)

Answers

Answer:

D. The 4th one

Explanation:

The loops are nested, and the program ends when loop 1 is completed. Since loop 4 is the innermost one, that one is completed first.

A cyberbully is someone who invades another person’s privacy by posting mean-spirited messages. repeatedly sending text messages. visiting questionable websites. stealing original work.

Answers

Answer:

Its A.

Explanation:

Took the exam review

Answer:

A

Explanation:

on edge

g A peer-to-peer PLC network: has no master PLC. uses the token passing access control scheme. each device is identified by an address. all of these.

Answers

Answer:

All of these

Explanation:

A peer-to-peer network is a type of computer network that computer devices directly to each other, sharing information and other resources on the network.

It does not have a centralized database, there are no master or slave as each device in the network is a master on its own, and the devices all have unique addresses assigned statically for identification.

SEMMA is a proprietary model? True or Flase

Answers

Answer:

true

Explanation:

SEMMA is a proprietary model is a true statement

Proprietal model in this context is a product or services that is exclusive to a company. SEMMA, is a property of SAS institute.

SEMMA simply means Sample, Explore, Modify, Model, and Assess. It is simply a list of sequential steps which was a product of SAS Institute. This institute is among the largest producers of statistics and business intelligence software. This product or property was made for passing or implementation of data mining applications.

Conclusively, we can say that SEMMA is a proprietary model is a true statement

Learn more from:

https://brainly.com/question/12719360?section=newest_q

How to start the ms excel​

Answers

Answer:

The answer is below

Explanation:

To start Microsoft Excel, a user can click on the start menu and look for the Microsoft Excel icon in the list of programs available.

If this is not found, a user can either search it from the start menu or click on the All program menu, from there the user can look for Microsoft Excel then click on it to launch the application.

If Microsoft Excel can't be found, a user is recommended to click on Microsoft Office, from there Microsoft Excel will be found, then the user can click on it to launch the application.

After clicking, the Excel Starter startup screen shows, and an empty page called the spreadsheet is shown.

Your organization uses a federated identity provider to login to your Oracle Cloud Infrastructure (OCI) environment. As a developer, you are writing a script to automate some operation and want to use OCI CLI to do that. Your security team doesn't allow storing private keys on local machines. How can you authenticate with OCI CLI?

Answers

Answer:

Run OCI session authenticate and provide your credentials

Explanation:

The OCI CLI when in combination with a shell script can be fastly used in the creation of shareable scripts. It uses API keys, private and public scheme as it's default authentication. The command to use is the oci set up keys, to create these keys. Since you cannot store private keys, you run OCI authentication and then you give your credentials

The method definition, or declaration, is defined as the method __________ followed by the method ________.

a. name, parameters
b. name, return
c. header, body
d. header, signature
e. signature, body

Answers

Answer:

The answer is option C "header, body"

Explanation:

Like a class, a method definition has two significant parts: the method revelation and the method body. The method declaration characterizes all the method's attributes, for example, access level, return type, name, and contentions. The method body is the place where all the activity happens. It contains the guidelines that actualize the method.

The lone required element of a method declaration are the method's name, return type, and a couple of brackets: ( and ). A method declaration can give more data about the method, including the return type of the method, the number and sort of the contentions needed by the method, and which different classes and objects can call the method.

In spite of the fact that a method name can be any legitimate identifier, code shows limit method names. By and large, method names should be action words  (verbs) and should be in upper case, with the principal letter in lowercase and the primary letter of each inside word in capitalized.

The SQL WHERE clause:___________.a) Limits the row data that are returned. b) Limits the column data that are returned. c) ALL Limits the column and row data that are returned.d) All of the above

Answers

Answer:

D. All of the above.

Explanation:

• To limit the number of rows use the WHERE clause.

• The WHERE clause filters for rows that meet certain criteria.

• WHERE is followed by a condition that returns either true or false.

• WHERE is used with SELECT, UPDATE, and DELETE.

Python - write a program that lets the user enter a string and displays the character that appears most frequently in the string.

This is my attempt so far, I know it needs a lot of changes:

# This program has the user enter a string and displays the
# character that appears most frequently in the string.

def main():
# Create a variable to use to hold the count.
# Start the variable with 0.
count = 0

# Have the user enter a string.
my_string = input('Enter a sentence: ')

# Count the character that appears most frequently in the string.
for ch in my_string:
if ch == 'A' or ch == 'a':
count+=1
if ch == 'B' or ch == 'b':
count+=1
if ch == 'C' or ch == 'c':
count+=1
if ch == 'D' or ch == 'd':
count+=1
if ch == 'E' or ch == 'e':
count+=1
if ch == 'F' or ch == 'f':
count+=1
if ch == 'G' or ch == 'g':
count+=1
if ch == 'H' or ch == 'h':
count+=1
if ch == 'I' or ch == 'i':
count+=1
if ch == 'J' or ch == 'j':
count+=1
if ch == 'K' or ch == 'k':
count+=1
if ch == 'L' or ch == 'l':
count+=1
if ch == 'M' or ch == 'm':
count+=1
if ch == 'N' or ch == 'n':
count+=1
if ch == 'O' or ch == 'o':
count+=1
if ch == 'P' or ch == 'p':
count+=1
if ch == 'Q' or ch == 'q':
count+=1
if ch == 'R' or ch == 'r':
count+=1
if ch == 'S' or ch == 's':
count+=1
if ch == 'T' or ch == 't':
count+=1
if ch == 'U' or ch == 'u':
count+=1
if ch == 'V' or ch == 'v':
count+=1
if ch == 'W' or ch == 'w':
count+=1
if ch == 'X' or ch == 'x':
count+=1
if ch == 'Y' or ch == 'y':
count+=1
if ch == 'Z' or ch == 'z':
count+=1
#Print the result.
print('The most popular character appears ', count, 'times.')

# Call the main function.
main()

Answers

def main():

   my_string = input("Enter a sentence: ").lower()

   character = ""

   count = 0

   for x in my_string:

       if x.isalpha():

           if my_string.count(x)>count:

               count = my_string.count(x)

               character = x

   print("The most popular character,",character,"appears",count,"time(s)")

main()

I wrote my code in python 3.8. I hope this helps

The program which will let the user enter a string and displays the character will be written in computer language.

What is programming?

The process of producing a set of instructions that tells a computer how to complete a task is known as programming. Computer programming languages such as JavaScript, Python, and C++ can be used to create programs. Programming is widely regarded as one of the most difficult disciplines to master.

def main():

my_string = input("Enter a sentence: ").lower()

character = ""

count = 0

for x in my_string:

if x.isalpha():

if my_string.count(x)>count:

count = my_string.count(x)

character = x

print("The most popular character,", character,"appears",count,"time(s)")

main()

Therefore, the coding for the given program is written above.

To learn more about programming, refer to the link:

https://brainly.com/question/11023419

#SPJ5

Sound technology has been influenced the most by the ___.
microphone
phonograph
record player
cassette recorder

Answers

I think its the phonograph i hope this helps!
The phonograph because it helped with hearing and seeing things

Tips for staying safe using social media. Using in your own words.

Answers

Whatever you post on social media, it's now public. Yes there are ways to make posts private and such, but glitches do happen. Not only that, but hackers may be able to turn privacy features off. Also, sometimes the social media company changes policy on some aspects, which may turn some private features into public ones. That means you should be careful not to post anything too personal and also don't post anything such as addresses, bank account numbers, passwords, etc. This is probably common sense to you, but it's a good thing to keep in mind regardless.

Also, if there are people who verbally threaten or harass you, then you should either report them or block them. Preferably both, but blocking is probably more effective. If someone friend requests you, then it's ideal to only accept their request if you know who they are. Though you can relax this if you aren't worried about who sees your profile page.

In addition, you should be careful as to what you read on social media. Not everything is true. This is because practically anyone can post a news story even if it's completely made up. Lately there have been some efforts to do fact checking, but there's still a lot of fictional stuff out there. Be sure to avoid clicking on any links you may not recognized as they could be phishing links, or may lead to harmful malware. It's probably just best to get an antivirus of some kind.

One of the keys on my keyboard doesn’t work but It’s used to login to windows. I’m trapped outside. What should i do :(

Answers

uhm- sorry, could explain this in a simpler way?

The Bike and EBike classes are implemented as shown by the code below.public class Bike
{
private String make;
private int numGears;
private double tirePressure;
public Bike(String m, int g, double t)
{
make = m;
numGears = g;
tirePressure = t;
}
public void pumpTire()
{
tirePressure += 5.0;
}
}
public class EBike extends Bike
{
private int batteryLevel;
public EBike(String m, int g, double t, int b)
{
super(m, g, t);
batteryLevel = b;
}
public void chargeBattery()
{
batteryLevel++;
}
}
Suppose that the following declarations are made in a separate class.
Bike bike1 = new Bike("Clasic Cycle", 16, 65.0);
Bike bike2 = new EBike("Big EZ", 8, 72.0, 96);
EBike bike3 = new Bike("E-xtreme", 12, 80.0, 44);
Assuming the above three lines compile without error, which of the following statements will cause an error when compiled?
bike3.pumpTire();
bike2.pumpTire();
bike2.chargeBattery();
bike1.pumpTire();
bike3.chargeBattery();

Answers

Answer:

bike3.chargeBattery();

Explanation:

The Bite class is the super or parent class of the Java program while the Ebike class is the subclass or child class inheriting from the super-class. The Bike class defined methods can be used by the object instance of the Ebike class, but the method in the Ebike class cannot be used by the parent class "Bike".

what is command is used to improve the vocabulary and in which tab is it found​

Answers

Answer:

Writers Talk About Writing

Ctrl+Shift+Return: Keys to Your Computer

By Mike PopeOctober 15, 2012

Your computer's keyboard has around 110 keys by which you can make your wishes known to the machine. Most of these have obvious labels: if you press the A key, the letter A appears on the screen. Some are less obvious, though — the Shift key and the mysterious Ctrl key — and in this article I'll explore why they're named what they're named.

Long before computers, many practical issues about using a machine to write had already been worked out for the typewriter. If you've never used a typewriter, you might be interested in this video that shows one in action.

The appropriate semaphore in C to give one more turn to writer so it can clean up IPC objects is WRITE_SEM. Is it true or false

Answers

Answer:

True

Explanation:

Semaphores are variables of abstract data types in programming used to control or restrict access to resources by multiple concurrent processes to avoid system failure like race conditions, by evaluating the available resources. There are various types of semaphores like the binary and counting semaphores which is used to lock and count resources respectively.

In C, the semaphore used to clean up the IPU objects is the WRITE_SEM.

g Write a general-purpose program with a loop and indexed addressing that calculates sum of the values of elements of a DWORD array that are located at multiple of 4 location. For example for the array 1,2,3,4,5,6,7,8,9,10,11,12,13,14

Answers

Answer:

def sumD4th(dword):

   select = dword[3::4]

   print(sum(select))

mylist = [1,2,3,4,5,6,7,8,9,10,11,12,13,14]

sumD4th(mylist)

Explanation:

The python program above defines a function called "sumD4th" that accepts a list as its argument. The variable "select" is created which is the subset of the list argument "mylist" containing the index items that is a sum of four. The output of the function is the sum of the items in the "select" list.

What do you do to think positive and maintain discipline to play
with your friends ? write in four points.
)
no
S s.)​

Answers

Answer:

to make peaceful mind.to develop our character..

The I/O modules take care of data movement between main memory and a particular device interface.A. TrueB. False

Answers

Answer:

A: True

Explanation: hiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

write a program that creates a dictionry containing course numbers and the room numbers of the rooms whhere the courses meet

Answers

Answer:

course_class = {'CS101' : '3004', 'CS102' : '4501', 'CS103' : '6755',  'NT110' : '1244', 'CM241' : '1411'}

Explanation:

A dictionary is a data structure in python that is unordered and unindexed. It stores data in key-values pairs with each pair separated by a comma and all the items enclosed with curly braces. It is also assigned to a variable name.

The dict() function can also be used to create a dictionary variable.

Cryptography is the process of transforming data from cleartext into ciphertext.

a. True
b. False

Answers

Answer:

B) false

Explanation:

Encryption can be regarded as

the process involving encoding of information. It brings about convertion of of original information ( plaintext) to another alternative form (ciphertext). While While cryptography can be regarded as the science that deals with encrypting as well as decrypting of information. plaintext is unencrypted data while ciphertext is encrypted data. It should be noted that encryption is the process of transforming data from cleartext into ciphertext.

Write a function solution that, given an array A consisting of N integers, returns the number of fragements of A whose sum equals 0 (that is, pairs (p,q) such that P

Answers

Answer:

#include <iostream>

using namespace std;

void fragment(int arr[], int n){

   for (int i = 0; i < n; i++){

       for (int x = 0; x < n; x++){

           if (x != i && arr[i] + arr[x] == 0){

               cout<< arr[i] << " , " << arr[x];

           }

       }

   }

}

int main(){

   int n = 7;

   int myArr = {1, 2, -1, -2, 0, 0, 3};

   fragment(myArr, n);

}

Explanation:

The C++ source code defines an array called "myArr" in the main program and its array size n. The void function "fragment" prints out the pairs of the array whose sum equates to zero.

HUURRY
The line after an if statement should begin with what?
#
a print statement
a colon
indentation

Answers

Answer:

colon

Explanation:

The line after an if statement should begin with a colon. Next time please be more specific towards which language you need help with as you didnt specify and all languages are different.

Answer:

Yes it should start with a colon after

have a good day hopefully it helped :)

Explanation:

how we can search someone's name here?​

Answers

you can search someone’s name on here...?

Answer:

Umm

Explanation:

I guess we can only search for answers here!

A software is made from​

Answers

Answer:

Two or more languages are used for making one particular software.

Write down the different types of testing with their definition.

a. Acceptance/Beta testing________
b. Accessibility testing __________
c. Integration testing ___________
d. Usability testing _________
e. Stress Testing __________

Answers

Answer:

The answer is below

Explanation:

a. Acceptance/Beta testing: this is considered as the last test by the real users or a specific number of end-users of an application software before its final release.

b. Accessibility testing: this is a form of application software testing that is targeted to the disables, such as deaf, color blind, or any other disabled group of people

c. Integration testing: this is a form of testing that involves collective eating of different components of software or hardware that makes up a system.

d. Usability testing: this is a form of testing in which a computer product is tested based on users' experience. It seeks to assess the products from the users' experience.

e. Stress Testing: this is a form of testing that seeks to find the limitation of a product or software. By carrying out stress testing, the producer can quickly know the level at which the product can operate under heavy use.

nd
Assume you have already imported the time module.
Which line of code will pause the program for 6 seconds?
time.pause(6)
time sleep()
O time.pause()
O time sleep(6)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Time Module:  

Python's time module has a function to pause a program to the given time in seconds called sleep(). Essentially, as the name implies, it pauses your Python program.

The syntax of the sleep() function is given below:

time.sleep(second)

So, the given options for this question are :

time.pause(6) time.sleep() time.pause() time.sleep(6)

To pause a program for 6 seconds, option 4 is correct:

time.sleep(6)

While the other remaining options are not correct because to pause a program in python for 6 seconds, the correct statement is given in option 4.

1. Write a function called changeLetter that can directly alter the value of a character variable. It takes one argument: a reference to a character. It returns nothing. If the passed in character is alphabetic ('a' to 'z' or 'A' to 'Z'), then make the character become the next higher ASCII value ('a' becomes 'b' etc.). If the passed in character is not a letter, don't alter it.
2. Write a calling statement for the changeLetter function. It takes one argument: a reference to a character and returns nothing. The calling statement should pass the char variable ch so that it is (potentially) altered.
3. Write a calling statement for the changeLetter function. It takes one argument: a reference to a character and returns nothing. The calling statement should pass the 2nd character in a char array called chAr (by second, I mean the sub-oneth) so that it is (potentially) altered.
4. Assume the following function header:

void fn( int &n )

Write an instruction for the function body that will store 10 into the caller's variable referred to by n.
5. Write a calling statement for the fn function. It takes one argument: a reference to an integer and returns nothing. The calling should pass the integer variable num to the function so that it can be altered.
6. The strlen() function returns
A. the number of chars in an array of char, including the null
B. the number of chars in an array of char not including the null
C. the declared number of chars an array can hold
7. What must be true of the arguments to strcat(s1, s2); More than one answer may be correct
A. s1 must be valid strings
B. s2 must be a valid string
C. s1 must have room to contain the result
D. s2 must have room to contain the result
8. How is a structure different from an array?
9. Write a definition for a structure called Part that can hold a part name (an array of characters that can hold 24 characters plus a null terminator), a part weight (int), and a part price (float). Make up appropriate names.
10. Assume the following structure definition:

struct Person

{

char name[50];

int age;

};

Write a declaration for a variable of type Person and initialize it with your name and the age 10. This should be done as part of the variable declaration statement.

11. Assume the following structure definition:

struct Person

{

char name[50];

int age;

};

Write a declaration for a variable of type Person and initialize it with your name and the age 10. This should be done as several executable statements.

12. Declare an array of 10 Person structures named peopleArray.

13. Assume the following structure definition and declaration:

struct Person

{

char name[50];

int age;

};

Person people[265];

Assuming that the people array contains 265 valid structs, write code to print out the age member for each item in the structure.

Answers

Answer:

1. Void changeLetter( char &ref )

{

If( isalpha(ref) )

{

Ref++;

}

}

2. changeLetter( ch );

3. changeLetter( chAr[1] );

4. n = 10;

5. fn( num );

6. (B) the number of chars in an array of char not including the null.

Explanation:

Functions are blocks of codes in any programming language. In C++, a void function is a function that does not return a value, while other types of functions have a return statement. There are three ways to pass an argument to a function in C++, by value, by reference and by pointer.

When a variable argument is passed as a value to a function, the value of that variable cannot be altered by the function, but when it is passed as a reference or a pointer, it can be altered.

To call a function in C++, specific the function name and the opening and closing parenthesis with the required arguments in between. The call must end with a semi-colon.

Adding effects that move your text or pictures in your presentation is called:

Answers

the answer should be it’s a transitionl

Which web browser was created by Microsoft?
Chrome
Edge
Firefox
Safari

Answers

Answer:

firefox

Explanation:

Answer:

Edge was created by Microsoft.

Explanation:

Commercial technical data and commercial software:_________.
a- [ ] Are provided to the Government with additional rights.
b- [ ] Must be marked ?proprietary? to have protection.
c- [ ] Must be available to consumers to qualify as commercial.
d- [ ] Are offered for sale on the commercial market.

Answers

Answer:

Must be available to consumers to qualify as commercial.

Explanation:

According to Defense Federal Acquisition Regulation Supplement and Federal Acquisition Regulation Supplement technical data and software belongs to the authentic developer or the direct beneficient otherwise, if made available to consumers it will then be regarded as the "Commercial technical data and commercial software."

Hence, the right answer to the question is option C "Must be available to consumers to qualify as commercial."

Other Questions
Select all the expressions which are equivalent to 43p 25. 43p + 25 25 43p 43p 25 43p + (25) 25 + 43p Larry MonroeThe Derivative-Equation of tangent lineJan 01, 10:09:06 PM?Given the function f(x) = 324 2,5, determine the derivative of f at x = 1 usingthe limit shown below. You do not have to simplify your answer.Submit AnswerAnswer: limh-0Tattempt 1 out of 2Privacy PolicyTerms of Service What was the main causes of the French Revolution PLEASE ANSWER MY QUESTIONS Which one of the sentences below is NOT grammatically correct?T no te vas a peinar.T te no vas a peinar.T no vas a peinarte.T no te ests peinando. Which of these sets have the integers in orderfrom least to greatest?-42, -32, -39, -10-42, -39, -32,-10-10,-32, -39,-42-10, -39, -32, -42 if the cost of a book is RS.480, find the cost of 4 books write any two preventive measures of malnutrition Writing about nineteenth-century womens travel writing, Lila Harper notes that the four women she discussed used their own names, in contrast with the nineteenth-century female novelists who either published anonymously or used male pseudonyms. The novelists doubtless realized that they were breaking boundaries, whereas three of the four daring, solitary travelers espoused traditional values, eschewing radicalism and womens movements. Whereas the female novelists criticized their society, the female travelers seemed content to leave society as it was while accomplishing their own liberation. In other words, they lived a contradiction. For the subjects of Harpers study, solitude in both the private and public spheres prevaileda solitude that conferred authority, hitherto a male prerogative, but that also precluded any collective action or female solidarity.1. Which of the following best characterizes the "contradiction" that the author refers to?A. The subjects of Harpers study enjoyed solitude, and yet as travelers they were often among people.B. Nineteenth-century travel writers used their own names, but nineteenth-century novelists used pseudonyms.C. Womens movements in the nineteenth-century were not very radical in comparison with those of the twentieth-century.D. Nineteenth-century female novelists thought they were breaking boundaries, but it was the nineteenth-century women who traveled alone who were really doing so.E. While traveling alone in the nineteenth-century was considered a radical act for a woman, the nineteenth-century solitary female travelers generally held conventional views. A horizontal force of 150 N is used to push a 38.0 kg packing crate a distance of 6.85 m on a rough horizontal surface. If the crate moves at constant speed, find each of the following.a) find the work done by the 150N force:b) find the coefficient of kinetic energy between the crate and rough surface Select the verb and pronoun that correctly complete the conversation. Gloria: Debo llamar a un servicio de mudanza? Alex: Claro, ta Gloria, _______. A. llmalo B. llmala C. llmanos D. llmavos Imagine that you were given a piece of land the size of Texas. You have plenty of farming land, plenty of water resources, plenty of oil reserves, and enough forest land to cover over half of your country. You also inherited a population of about one million people. View a world atlas. Notice how countries are drawn and labeled. Create a map of your country and include the capital, rivers, lakes, forestland, and any mountain ranges you would like to have. This should be colored and drawn onto a poster board and large enough that we could read the names of any towns, cities, or parks that you Name this country that you inherited. Place the name at the top of the drawing. Why did you choose this name? What does it stand for? Question 24 (4 points) Which of these rocks can be chemical or biochemical? Evaporites O Coquina Chert Banded iron formation Determine any data values that are missing from the table, assuming that the data represent a linear function.a. Missing x:13 Missing y:20 b. Missing x:13 Missing y:19 c. Missing x:11 Missing y:20 d. Missing x:11 Missing y:19 Answer any of these. Assume a pension fund purchased stock at $53. Call options at a $50 exercise price presently have a $4 premium per share. The pension fund sells a call option on the stock it owns. If the call option is exercised when the price of the stock is $56, what is the gain or loss per share to the pension fund (including its gain from holding the stock as well?a. $4 gainb. $6 lossc. $2 lossd. $1 gaine. $0 Define Anaemia? Write any two symptoms of it 63.7 x 1094.6 x 10^30.365 x 10^4Please, Its due soon! WILL GIVE BRAINLIEST IF CORRECT A case study in the chapter analyzed purchasing-power parity for several countries using the price of Big Macs. Here are data for a few more countries: For each country, select the predicted exchange rate of the local currency per U.S. dollar.Country Price of big Mac Predicted exchange rate Actual exchange rateChile 2640 peso ________________ 679 peso/$Hungry 850 forints ________________ 280 fornits/$Czech Republic 85 korunas ________________ 22.3 korunas/$Brazil 16.8 real ________________ 3.72 real/$Canada 6.77 C$ ________________ 1.33 C$ According to purchasing power parity, the predicted exchange rate between the Hungarian forint and the Canadian dollar is __________. However, the actual exchange rate is _________forints per Canadian dollar. Jayden deposited $7100 in a savings account with simple interest. Three months later, the account held $7,259.75. what was the interest rate? What was the Constitutional issue in the Obergefell case? How did the Court decide? Do you agree with its decision?Why or why not? Steam Workshop Downloader