1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
15

What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?

Computers and Technology
1 answer:
snow_tiger [21]3 years ago
6 0

Answer:

The correct answer to the following question will be "Taxonomy ".

Explanation:

A location taxonomy seems to be the direction it helped organize the information into subgroups as well as subsections, often shown in a network map, in comparison to internet sites and access points.

  • Is a very well-planned approach that implies that somehow the navigation features on the website become straightforward to do this and feature-packed
  • The scientific method of categorizing, or classifying, items predicated on a default framework.
You might be interested in
Answer the following questions for Web browser and Web server software: 1. What functions should this software application provi
timurjin [86]

Answer:

Explanation:

Functions should a software application provide to keep a web browser secured

1) The web browser should always be updated, so kindly keep the "automatic update" option enable on your browser settings so that whenever the browser gets an update, it will be updated automatically.

2) Always keep the third party cookies disabled because there are so many unauthorized and phishing sites over the internet they may lead the browser unsafe and cause very higher security risk so block all the third party sites and cookies from the browser

Functions should a software application prohibit to keep a web browser secured

1) Do not store passwords on your web browser, deny the "store password" option on your browser settings. Even if you store passwords on your web browser do set a very strong master password to access all the stored passwords.

2) Do not click on unwanted, unknown hyperlinks. There will be many unsolicited attachments, PDFs, DOCs, files, etc over the internet so do not open or download it unnecessarily.

Functions should a software application provide to keep a web server secured

1) Always use an application scanner. Whenever you install or download any new applications do scan the application before accessing it.

2) Install all the security patches because there are more number of hackers over the internet so do not deny installing the security patcheds on time.  

Functions should a software application prohibit to keep a web server secured

1) When an application is not in use for long time, better uninstall it because they are actually of no use so do uninstall all the unwanted softwares or applications along with extensions.

2) There may be scripts, files, setups, codes stored on the web server unknowingly so do check it and delete all the sample scripts, files and codes from the web server.

5 0
3 years ago
What is output by the following?<br><br>print (type("95"))
statuscvo [17]

Answer:

The output is "<class 'str'> ".

Explanation:

In the given python code a print() function is defined. Inside this function, a type() function will use, in which a numeric value is passed in the double quotes (" ") as a function parameter. Double quotes are normally used for print value as a message but in this code, value is not printed because we use the type() function.

  • The type() function Returns the parameter class type of the argument(object).
  • This function is used for debugging. In this function, we pass a single parameter that will return the type of given object.
6 0
3 years ago
Why is Brainly always deleting either my answers or my questions? I am putting nothing inappropriate in them. Can someone answer
Artist 52 [7]

Answer:

hey i do not know

Explanation:

3 0
3 years ago
Read 2 more answers
What makes an active heat sink different from a passive heat sink?
zimovet [89]
An active heat sync will keep a computer cool and basically cool the CPU and processors. A passive heat sink will only cool the CPU and whatever else it needs to cool when the CPU actually NEEDS to be cooled. I am not sure if this is all correct but I know about basic heat syncs and from my understanding this is right.
8 0
4 years ago
Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
Galina-37 [17]
<span>The statement that IPv6 includes a native information security framework (IPsec) that provides both data and control packets is false.
</span>IPSec is a mandatory component for IPv6, and is used to natively protect IPv6 data <span>as it is sent over the network,. and not control packets.
</span>The IPv6 IPSec is a set of Internet standards that uses cryptographic security services to provide confidentiality ,data origin authentication and data integrity<span>
</span>

5 0
3 years ago
Other questions:
  • Which cloud computing service model will enable an application developer to develop, manage, and test their applications without
    15·1 answer
  • What is the best operating system
    12·1 answer
  • When the CSS property of position is set to ____ it moves the element relative to its original position and allows other element
    10·1 answer
  • Which of the following is not a hazard a driver might encounter?
    5·1 answer
  • Henry conducted a survey on an ad done by his company. In the survey, he asked people to evaluate the ad and state whether they
    8·1 answer
  • The administrators of Tiny College are so pleased with your design and implementation of their student registra- tion and tracki
    13·1 answer
  • Which statistical measurement tools should be
    8·1 answer
  • Define the term algorithm and describe how programmers use algorithms when designing a program.
    13·1 answer
  • SOMEONE PLEASE HELP ME OUT WITH THIS PLEASE
    13·1 answer
  • ___ is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-t
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!