1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
3 years ago
11

Which of the following tasks is an interactive media professional most likely to do? Check all of the boxes that apply. 1. decid

e how a website should look 2.install an art-design–oriented software program for other users 3. monitor the network connection 4. test a software program to ensure that the visual elements are working 5. set up a new computer for the president of a company
Computers and Technology
1 answer:
GREYUIT [131]3 years ago
8 0

Answer:

decide how a website should look and  

test a software program to ensure that the visual elements are working

Explanation:

i just did it

You might be interested in
Active directory and 389 directory server are both compatible with which directory access protocol?
bulgar [2K]

Active directory and 389 directory server are both compatible with Lightweight Directory Access Protocol.

<h3>What is Lightweight Directory Access Protocol?</h3>

The Lightweight Directory Access Protocol exists as an open, vendor-neutral, industry standard application protocol for accessing and supporting distributed directory information services over an Internet Protocol network.

LDAP stands used in Microsoft's Active Directory, but can also be utilized in other tools such as Open LDAP, Red Hat Directory Servers, and IBM Tivoli Directory Servers for example. Open LDAP exists as an open source LDAP application. It is a Windows LDAP client and admin tool designed for LDAP database control.

It reserves usernames, passwords, and other core user identities. It utilizes this data to authenticate users when it receives requests or queries and shares the requests with other DSAs.

Hence, Active directory and 389 directory server are both compatible with Lightweight Directory Access Protocol.

To learn more about Lightweight Directory Access Protocol refer to:

brainly.com/question/27960956

#SPJ4

5 0
2 years ago
You can tell that the equals() method takes a ____ argument because parentheses are used in the method call.
melamori03 [73]

Answer:

c. String

Explanation:

The equals method in java String class takes an object reference as a parameter. We can compare two Strings with the help of equals method of the String class. The equals() method of the java String class compares the given strings based on the content of the string.

Use of the String equals method:-

if (stringOne> stringTwo) it will return a positive value.

if both of the strings are equal lexicographically  means

(stringOne == stringTwo) it will return 0.

if (stringOne < stringTwo) it will return a negative value.

4 0
4 years ago
What is the main coding language for netflix?
givi [52]

Answer:Python

Explanation:

3 0
2 years ago
Read 2 more answers
David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted
Arada [10]
David should create a form letter
8 0
3 years ago
Which of the following ""invisible"" marks represents an inserted tab?
Pachacha [2.7K]

Answer:

Easy peasy, if you open Microsoft word and you click up at the top and you click the symbol as shown in A, then you click on inserted tab it will show up as B which is  → symbol

So the answer is B  →.

4 0
3 years ago
Other questions:
  • A job application is a form used to make a job request.<br> True<br> False
    8·2 answers
  • Please help with this
    5·2 answers
  • What US federal agency publishes safety standards for business and industry?
    5·1 answer
  • How to find i with superposition method
    8·1 answer
  • After placing her insertion point after Grandma’s Kitchen, order the steps Danica needs to follow to insert and format the regis
    8·2 answers
  • What is a IT form? any help would be great thnx
    14·2 answers
  • What is data analysing data and give three examples ?​
    9·1 answer
  • Complete the sentence.
    8·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • 23. Convert the following to Megabytes<br> a) 2GB<br> b) 2056 Bytes-
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!