1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
3 years ago
6

What is the advantage of defining a target user?

Computers and Technology
1 answer:
spayn [35]3 years ago
4 0
3) helps the designer develop a website tailored to the desired audience
You might be interested in
Hi guys, Im making a game. I want to make a collision event, but what is the code for making the wall and the box collide. I rea
professor190 [17]

Answer:

i think its 3337

Explanation:

7 0
3 years ago
Explain with examples what is software​
zvonat [6]

Answer:

Software is the data in your computer for example apps

Explanation:

Apps are a form of software

8 0
2 years ago
Jack has a fear of getting up in front of a group of people and giving a presentation. When he gave his last presentation, he ta
dezoksy [38]

Answer:

Jack has to be very calm and try his best to present himself in an outward way and think about the fact that by the end of the night no one will remember that he messed up, I feel like he'll be okay :)

7 0
2 years ago
Read 2 more answers
What is the function of ctrl+Q​
vlabodo [156]

Answer:

Ctrl+Q is used to remove a paragraph's formatting

Explanation:

Hope that's the answer you're looking for!

5 0
2 years ago
What technology has a function of using trusted third-party protocols to issue credentials that are accepted as an authoritative
jarptica [38.1K]

Answer: PKI certificates

Explanation: PKI is known as the public key infrastructure which is commonly used for the encryption of the data and also for the data signing. They have the ability to assign the keys pair.

PKI certificates are in the form of strings of alpha-numeric running for a mathematical functions. They use the third party protocols for the execution and they are widely accepted by the authoritative identity.

5 0
2 years ago
Other questions:
  • WILL DO A BRAINLY! help pls.
    15·1 answer
  • When using the wait and signal operations, ____ sets the process's process control block to the blocked state and links it to th
    12·1 answer
  • An organization's contact information includes its _____.
    9·2 answers
  • A company wants a recruiting app that models candidates and interviews; displays the total number of interviews each candidate r
    6·1 answer
  • Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
    11·2 answers
  • bryce's computer is acting unusually sluggish today he calls you an it techniician to see if you can find out what is going on a
    14·1 answer
  • A folder has been shared with other users and set to read-only. What does this mean for users?
    12·2 answers
  • 9.
    15·1 answer
  • You are writing a program to help compare two sports teams. A sample member of the list scores is [2. 5] where your team scored
    5·2 answers
  • What is the best food to eat before workout? why?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!