1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrMuchimi
3 years ago
13

A usability study compares the number of page visits on a web site. Half of the participants saw Version A of the home page. The

other half of the participants saw Version B of the home page. In this study, the version of the home page is considered:a. A dependent variableb. An independent variable c.Ordinal data d.A web analytic
Computers and Technology
1 answer:
USPshnik [31]3 years ago
7 0

Answer:

d. A web analytic

Explanation:

Web analytic measure activity and behavior of a user on a website, for example: how many users visit, how long they stay, how many pages they visit, which pages they visit, and whether they arrive by following a link or not.

Ordinal data is a categorical, statistical data type where the variables have natural, ordered categories and the distances between the categories is not known.

Dependent variable rely on another variable to get a value

Independent variable are variable which can be gotten on their own without relying on another variable.

You might be interested in
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
: Write a function "def countWords(string)" that returns a count of all words in an input string represented by the variable 'st
Zina [86]
We can define a word as a group of characters without a space between them. To find the words of the input string , w can use split(delimiter) which returns a list of strings which had the defined delimiter between them in the input string.

def countWords(string):
words = string.split(" ")
count = len(words)
return count

Here we set the delimiter as the space character, and returned the length of the words list. I split each step into its own line for readability, however the function could be one line:

return len(string.split())

Here, no delimiter is specified. If one isn't given, it will default to split at any whitespace, including space.

3 0
3 years ago
Karlie wants to eat a good breakfast before taking a test
babymother [125]
Yum sounds like a good idea
7 0
3 years ago
Read 2 more answers
Provide all resonance structures of the sigma complex when aniline reacts with an electrophile to yield the para-substituted pro
Nadya [2.5K]

Answer:

See attached picture.

Explanation:

See attached picture for detailed explanation.

3 0
3 years ago
I WILL GIVE THE CROWN IF CORRECT
alisha [4.7K]

Answer:

foundations

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What can use so tha the slides can appear?
    13·1 answer
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • What steps do you need to take to register
    14·1 answer
  • The smallest unit of storage is​
    15·1 answer
  • Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named ga
    12·1 answer
  • Choose the best type of loop for each situation.
    6·1 answer
  • A desktop computer is a type of mobile device.<br><br> a. true<br> b. false
    5·1 answer
  • Does a 21.6v battery work with a 24 volt controller
    6·1 answer
  • Which of the following describe audio-editing software? Choose all that apply.
    5·2 answers
  • Class 10 computer unit 1 all excersise​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!