1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeTakaya
3 years ago
13

Identify the primary responsibilities associated with each of the following web design roles: content writer/editor, artist/grap

hic designer, UI/UX manager, web designer, web programmer/developer, social media expert, and web administrator.
Computers and Technology
1 answer:
frosja888 [35]3 years ago
5 0

A web designer/developer is responsible for the design, layout and coding of a website. They are involved with the technical and graphical aspects of a website and how the site works and how it looks.

Explanation:

  • A content writer/editor creates and revises the text that visitors read when the visit a website, choose a link, image, video, or other media that enhances your text content.
  • A web artists/graphic designer's responsibility is to create original art, such as logos, stylized typefaces, and avatars, and props for virtual 3-d worlds.
  • A web designer's role is to create webpages that combine, text, images, and links using tools such as markup languages; CCS, HTML, and WYSIWYG editors.
  • Web programmer/database developer's job is to script languages such as, JavaScript, ASP, PHP, and MYSQL and must plan, create, secure, and maintain databases of varying complexity.
  • Web Administrator assumes all roles, including creative, high-tech, and oversight. May oversee a web development team that includes technical and creative roles.
You might be interested in
What is a megavirus in computing
g100num [7]

Answer:

tbh I have no clue.

Explanation:

8 0
3 years ago
Read 2 more answers
Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
Alexandra [31]

Answer:

c it reduces errors

Explanation:

Instead of Mrs.Patel doing it she has an online program made for checks to do it for her.

6 0
3 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
2 years ago
Give the names of two different places you might find a number represented in hexadecimal
Paladinen [302]

Answer:

Monday or Tuesday or Wednesday I am going back to work

Explanation:

8 0
2 years ago
Identify the variables listed below as either quantitative (discrete or continuous) or categorical (nominal or ordinal):
Akimi4 [234]

Answer:

Quantitative: Age, heart rate, number of pets, salary

 <em>discrete</em>: number of pets

 <em>continuous</em>: Age, heart rate, salary

Categorical: Gender, eye color, metal rankings

<em>Nominal:</em> Gender, eye color

<em>Ordinal:</em> metal rankings

Explanation:

Quantitative are those variables which are for quantity or number with units for measurement.

Categorical are qualitative variable which can be categorized or grouped in different groups or it may be ranking scales

5 0
3 years ago
Other questions:
  • In what sense are hardware and software equivalent
    6·1 answer
  • 2. What's the keyboard command that will allow you to "copy" text?
    8·2 answers
  • The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
    8·1 answer
  • Instructions:Drag the tiles to the boxes to form correct pairs.
    11·2 answers
  • Basic rule for java languague
    13·2 answers
  • Write a program that will find the smallest, largest, and average values in a collection of N numbers. Get the value of N before
    13·1 answer
  • The merge sort algorithm sorts using what technique?
    8·1 answer
  • Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi
    6·1 answer
  • Electronic mail is best used to:
    5·2 answers
  • Create a Flowchart and write pseudocode for a program that allows the user to enter two integer values: a and b.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!