1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
8

The first step in developing a successful web site is ____________.

Computers and Technology
1 answer:
PtichkaEL [24]3 years ago
4 0
Answer: A) Planning

In order to come up with a  successful website, you need to plan. You need to plan your first steps. Figure our what you need to do. Then you can consider the latest tech or design considerations. Planning always comes first, so you know your next step, and what your going to do.

-DustinBR
You might be interested in
Who the heck is bts?!?!!!???​
Lana71 [14]

Answer:

they are a k-pop boy band.

6 0
3 years ago
Read 2 more answers
What type of file format is PSD?
Ronch [10]

Answer:

PSD (Photoshop Document)

Explanation:

PSD (Photoshop Document) is an image file format native its one of Adobe's popular Photoshop Application. PSD files are commonly used for containing high quality graphics data.

8 0
2 years ago
Read 2 more answers
In three to five sentences, explain the function of the computer's operating system.
Sati [7]

Answer:

An Operating System (OS) is an interface between a computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

Explanation:

3 0
3 years ago
What is APR?
omeli [17]

Answer:

APR is the Interest rate advertised by lenders.

Explanation:

APR is the annual percentage rate that is different from the interest rate. Interest rate is the rate of borrowing money. While APR is the rate which includes interest rate, processing fee and other cost that are involved in loan approving.

This cost is decided by lender, which may be equal to interest rate or greater than interest rate.

5 0
3 years ago
Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security
Tcecarenko [31]

Answer:

(i) Prevention is more important than detection and recovery.

(ii) Detection is more important than prevention and recovery.

(iii) Recovery is more important than prevention and detection.

Explanation:

(i) Prevention is more important than detection and recovery.

Prevention of attack can be through various applications for example a walk through gates are placed in order to prevent any attacker from entering the premises and causing harm.

(ii) Detection is more important than prevention and recovery.

Detection of an attack can be done through for example a security alarm can detect an attack and inform others.

(iii) Recovery is more important than prevention and detection.

Recovery of an attack can be done by for example an insurance which will recover a portion of loss occurred during the attack.

8 0
3 years ago
Other questions:
  • A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
    14·1 answer
  • You have a large dataset that will print on several pages. You want to ensure that related records print on the same page with c
    11·1 answer
  • When records are in ____ order, they are arranged one after another on the basis of the value in a particular field.?
    9·1 answer
  • What is the single most important component of a computer? Central Processing Unit DIP Motherboard Chipset
    8·1 answer
  • What kind of information B2B SaaS companies wish to know about their competition, apart from information about their competitors
    15·1 answer
  • Technologies have advanced to allow computer chips to be placed in almost anything and to be connected to a network almost anywh
    8·1 answer
  • All of the following are methods to improve the communication of your key messages EXCEPT:
    8·2 answers
  • With Voice over Internet Protocol (VoIP), _____. a. voicemails cannot be received on the computer b. call quality is significant
    6·1 answer
  • What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?
    14·1 answer
  • A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!