1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
3 years ago
6

What is the advantage of defining a target user?

Computers and Technology
1 answer:
spayn [35]3 years ago
4 0
3) helps the designer develop a website tailored to the desired audience
You might be interested in
The top 3 most popular male names of 2017 are Oliver, Declan, and Henry according to babynames.
Naddik [55]

Answer:

#Set of three most popular names in 2007

male_names =  {'Oliver', 'Declan', 'Henry'}

#The male_names set is displayed to the user

print(male_names)

#The name to be removed is accepted from the user as a string

remove_name = str(input("Enter name to remove: "))

#The name to be added is accepted from the user as a string

add_name = str(input("Enter name to add: "))

#The remove method of a set is use to remove the received remove_name

male_names.remove(remove_name)

#The add method of a set is use to add the received add_name

male_names.add(add_name)

#The new set of male_names is displayed to the user

print(male_names)

Explanation:

4 0
3 years ago
PLS ANSWER ASAP!!
cricket20 [7]

Answer:

1. = c

2.= a

3. = b

Explanation:

8 0
4 years ago
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the s
GrogVix [38]
Console Port Method

Connecting a computer to a Cisco device through the console port requires a special console cable.
8 0
3 years ago
Numbering exception conditions, which often uses hierarchical numbering, in a fully developed use case description is helpful to
Vesna [10]

Answer:

a) tie the exception condition to a processing step

Explanation:

Numbering exception conditions, in a fully developed use case description is helpful to tie the exception condition to a processing step

The fully developed use case description is useful for the documentation of the context, purpose, description, conditions, and workflow of each use case. Activity diagrams give a graphical image of the use case workflow and serve the purpose of illustrating the alternative paths through a business process.

7 0
4 years ago
What issues will the Internet of Things present to Cybersecurity?
Rainbow [258]

Answer:

The IoT offers new ways for businesses to create value, however the constant connectivity and data sharing also creates new opportunities for information to be compromised. Explore some of the more notable developments in the battle to combat cyber risks.

Explanation:

I hope this helps you. UwU. P.S. Plz mark me Brainlyest

5 0
3 years ago
Other questions:
  • Which of the following has the responsibility of offering instruction on intrusion detection systems and intrusion prevention sy
    11·1 answer
  • A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's p
    9·1 answer
  • What is the definition of the components that motherboards, ssds, processors, and cases are part of?
    10·1 answer
  • What is the benefit to having the user interface integrated into the operating system? a) Power users prefer the added flexibili
    13·1 answer
  • What was the Messana conflict
    7·1 answer
  • A table is a predesigned database that includes professionally designed database objects.
    12·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • I play Among us :) hbu
    7·2 answers
  • You would like to find the average of cells C2, C3, and C4. What should the formula look like? = C2+C3+C4*3 =C2+C3+C4/3 =(C2+C3+
    15·2 answers
  • What help the ict in your life?and write own idea three or four sentence
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!