1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sever21 [200]
4 years ago
15

You are creating a mobile Web site for your company's polling service. Users will be completing polls and surveys about various

topics. How can you simplify the page layout to increase this site's usability on mobile devices?
Computers and Technology
1 answer:
maksim [4K]4 years ago
5 0

Answer:

The answer to the given question is "Using radio keys, checkboxes, and drop-down lists, whenever possible, instead of text boxes".

Explanation:

To increase the site's usability we use radio keys, checkboxes, and drop-down lists, whenever possible because nowadays peoples have no time to write or type. People like to select from the option or click on buttons. That's why we must use these checkboxes, drop-down lists, etc from the place of the text box.  

That's why the answer to this question is "Using radio keys, checkboxes, and drop-down lists, whenever possible, instead of text boxes".

You might be interested in
In this​ video, Samir describes how business executives use a BI application to drill down and see​ _____ data, the detail in th
Zielflug [23.3K]

Answer and Explanation:

The answer is granular data.

Granular data is detailed data. As granular data is lowest level data, that can refer to the size as Granularity is the level of detail where data are stored in the database. For example, a table contains cost attributes but in both table cost to use for different columns and different purpose.

The other example of granular data is the name field is subdivided. Such as

First name, middle name, and last name.

Data becomes specific and conferred as more granular.

5 0
4 years ago
A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________
seraphim [82]

Answer:

The answer to this question is vulnerability and risk.

Explanation:

Vulnerability is there us misconfiguration in the system  and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.

Risk is when there are chances that a misconfiguration  might happen in our system in future so that hacker could gain unauthorized access to the system.

7 0
3 years ago
What term is defined as private data placed in a packet with a header containing routing information that allows the data to tra
xeze [42]

Answer:

Encapsulation

Explanation:

Encapsulation is referring to the concept that data buding with some approach or method that is applied to that selected data.  it also restricts the use of some internal data of an object. The motive behind restricting the data is to prevent the misuse of the data.

For example- in java, encapsulation is refer to the wrapping of code with the data in one unit.

7 0
4 years ago
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet
Anna35 [415]

Answer:

Following are the steps with actions that are involved in required to perform a packet transfer.

Explanation:

  • Step 1: The host sends a connection request to server which is at IP address 209.165.200.254
  • Step 2: R1 check the configuration of NAT to inquire weather the packet should be translated or not.
  • Step 3: If there is no entry found for translation of given IP address, It is assumed that the IP address 192.168.10.10  will be translated already.
  • Step 4: R1 selects a global address  from the dynamic address pool that is available to it.
  • Step 5: R1 replaces the given IP address 192.168.10.10  with the translated inside global address.

i hope it will help you!

5 0
3 years ago
Open "Wireshark", then use the "File" menu and the "Open" command to open the file "Exercise One.pcap". You should see 26 packet
murzikaleks [220]
Idk idk idk idk idk idk
8 0
3 years ago
Other questions:
  • A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode
    14·1 answer
  • In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
    14·1 answer
  • By default, windows active directory creates __________ user accounts when a new domain is created
    8·1 answer
  • Match the fallacy with its name. Being a speaker of Spanish, I'm also great at speaking Italian.
    10·1 answer
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • A source is:
    15·2 answers
  • What is NOT a built-in function in python?<br> sqrt()<br> string()<br> fabs()<br> O print()
    12·2 answers
  • Many everyday objects (such as amusement park rides, cars, elevators, and ovens) that you might not normally associate with a co
    7·1 answer
  • in an advertisement is made of a wireless keyboard and a mouse.Name two commonly used methods of connecting devices wirelessly​
    11·1 answer
  • Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!