1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
2 years ago
11

Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in

your area. They may be corporate sites or websites for small businesses. Based on the criteria described for designing effective media, best practices, and what you have learned in this lesson, evaluate the sites. Make sure to list all the criteria and give a detailed description of whether you think the site meets the criteria. Please include examples to support your opinion. Please include the URL for both sites. Your response must be at least 300 words long.
Computers and Technology
1 answer:
serg [7]2 years ago
6 0

Answer:

i do not know xD

Explanation:

You might be interested in
The Save command saves your changes silently without additional prompts, using the same save settings; the Save As command reope
kirza4 [7]

The "Save command" saves your changes <u>silently</u> without additional prompts and it uses the same save settings while the "Save As command" <u>reopens</u> the Save screen: True.

What is the Save command?

A Save command can be defined as a type of command associated with the file menu of a software application and it causes a copy of the current file to be created and stored to a specific location on a computer system.

<h3>What is the Save as command?</h3>

A Save command can be defined as a type of command associated with the file menu of a software application and it causes a copy of the current file to be created and stored to a different location, file name, and/or file type.

In conclusion, the "Save command" saves your changes <u>silently</u> without additional prompts and it uses the same save settings while the "Save As command" <u>reopens</u> the Save screen, so as to enable you make different choices.

Read more on Save command here: brainly.com/question/16852455

5 0
3 years ago
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for
Pavel [41]
In Encryption - ........
7 0
3 years ago
Uses computer resources from multiple locations to solve a common problem.
Lynna [10]

Answer:

Distributed Computing is used to solve common problem from multiple locations at different locations.

Explanation:

It is the architecture of processor, that is used to combine the different resources of computer from different domain to solve the common problem.

It allows us resource sharing such as hardware and software that are connected to the computer.

Examples

Following are the examples of Distributed computing.

  1. Telecommunication Network
  2. sensor network
  3. banking network

8 0
4 years ago
Tips to identify email scams.
malfutka [58]

Answer:

Explanation:

dont open or sign up to anything that seems to good to be true

7 0
3 years ago
En un grupo de estudiantes el 60% son mujeres.Si por todos son 45 ¿cuantos hombres y mujeres son?
enot [183]
27 mujeres
18 hombres

Mira:
60% * 45 = 2,700
2,700/100= 27

Si el 60% son mujeres, entonces
45-27=18 hombres
7 0
3 years ago
Other questions:
  • What does BMP stand for?
    10·2 answers
  • What file may contain data written to it in case of an unexpected error or program shut-down?
    5·1 answer
  • The prepaid tuition plan covers
    9·2 answers
  • How are modern computers different from eniac?
    5·1 answer
  • What is the duty of business to contribute to the well-being of society
    12·1 answer
  • A __________ is typically stored in a JAR file and contains one or more packages that you want to make available to other projec
    15·1 answer
  • Which statements accurately describe the Bookmark feature in the Audio/Video control bar? Check all that apply.
    13·1 answer
  • Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the
    13·1 answer
  • Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the
    8·1 answer
  • Which option allows users to access the handout master to modify it?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!