1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
3 years ago
12

Which strategy are you using when you only read the title, section headings, and captions?

Computers and Technology
2 answers:
Amanda [17]3 years ago
8 0
D skimming
because it not close to reading the article
Anastaziya [24]3 years ago
8 0

From the given description in the question, the strategy that is currently applied is called (C) previewing.

Previewing occurs <em>when you try to get the main idea of the text without actually reading the content</em>. When you only read the title, abstract (if available), and headings, it means that you are using this strategy. Skimming occurs when you try to read the content briefly to get a sense of what it’s trying to convey.

You might be interested in
A review of the sales, costs, and profit projections for anew product to find out whether these factors satisfy the company'sobj
soldier1979 [14.2K]

Answer: Business analysis

Explanation:

Business analysis is the review of the sales, costs, and profit projections for a new product to find out whether these factors satisfy the company's objectives.

Based on the business analysis a company is able to set a marketing strategy for a better promotion of its products. So this step is particularly very important.

7 0
3 years ago
Ryan wants to connect his flash drive to the computer. Which port should he use?
schepotkina [342]
It is the USB port..............................................  
3 0
3 years ago
Read 2 more answers
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
25 POINTS FREE POINTS
RSB [31]

Answer:

1) You wanna say so let me<em> </em><u>check my chest, my breath right quick</u>

2) I'm a savage <u>Classy, bougie, ratchet </u>

3) All the kids are <u>depressed</u>

4) Close your eyes shut your mouth d<u>ream a dream and get us out</u>

5) She's the girl next door, <u>nice, but not in a heart that's pure</u>

Explanation:

8 0
3 years ago
Read 2 more answers
If the income elasticity for computers is 1.2, and incomes increase by 10%, the demand for computers, using one decimal place an
yarga [219]

Answer:

The answer is "12.0%".

Explanation:

Economically, price elasticity makes a clear distinction between a consumer's production and a consumer's earnings.  

  • In this question, income elasticity is given that is "1.2", and incomes increase percentage is given, that is 10%.
  • The total income elasticity is in percentage is 1.2 \times 10 \% \ = 12.0\  \%.
7 0
4 years ago
Other questions:
  • You have just used a command that produced some interesting output on the screen. You would like to save that information into a
    10·1 answer
  • A junior network administrator has used the wrong cable type to connect his/her computer to the administrative port on a router
    7·1 answer
  • What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patte
    9·1 answer
  • What does the opacity effect do
    8·2 answers
  • What does a controller control?
    11·1 answer
  • Adam, a flower shop owner, wants to drive phone calls to his store. Which Adwords tool should he use to track how many calls res
    15·1 answer
  • Which of the following is the largest measurement for the weight of a bag of dog food?
    9·2 answers
  • Tables should be used when (a) the reader need not refer to specific numerical values. (b) the reader need not make precise comp
    14·1 answer
  • Eşhedü en la ilahe illallah ve eşhedü enne Muhammeden abdühü ve resulühü
    11·1 answer
  • Which option is designed by software engineers?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!