1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
13

How was the addition of an improvement over early web design?

Computers and Technology
1 answer:
Vinil7 [7]3 years ago
3 0

Answer:

Early web designs were text oriented.

Explanation:

So the beginning is text and now as the technology has drastically grown the web design also incorporated multimedia like text, audio, video, graphics and animation.

As the improvement started the number visitors, creativity in the content creation, competitiveness and all the other aspect made website creation and design a mandatory factor for any business to grow. How the web design is, it decides the number of visitors and the way the user interacts.

You might be interested in
When you save a presentation with a .potx file extension, which type of powerpoint file is created?
Elena L [17]
A file with the POTX file extension is a Microsoft PowerPoint Open XML Template file used to maintain the same layout, text, styles, and formatting across multiple PPTX files.
6 0
2 years ago
Choose all of the items that represent functions of the operating system kernel.
babunello [35]

Answer: its all of them

Explanation: I took Assignment over this

6 0
3 years ago
Read 2 more answers
What technique is used to separate the different cell parts?
Brut [27]
This should be in Science/Biology
5 0
3 years ago
Problem 1 (Authentication): Consider the following authentication protocol, which uses a classical cryptosystem. Alice generates
Elis [28]

Answer:

Check the explanation

Explanation:

Yes, going by the question above, the protocol validates Bob to Alice for the reason that the key is only shared between Bob and Alice as well as the number which is being sent randomly. Therefore the invader won’t be able to predict and response to that number. Because of the authentication protocol, that makes use of a classical cryptosystem thereby resulting into the possibility of an argument such that key finding is attainable via invader.

5 0
3 years ago
Alexis plans to stop trading once she lose 5% of her account balance, her account balance is $215.00. How much money is she will
irina1246 [14]

Answer:

She's willing to lose $10.75.

Explanation:

$215.00 * .05 = answer

         or

$215.00 * .95 = x

$215.00 - x = answer

7 0
2 years ago
Other questions:
  • Torque is defined as _____.
    7·1 answer
  • Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre
    13·1 answer
  • Write a program that reads in the length and the width of a rectangular yard.
    5·1 answer
  • Technician A says that front and rear U-joints on a RWD axle should operate at different angles to prevent vibration. Technician
    10·1 answer
  • Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
    12·1 answer
  • How ssd is better than normal sata and pata HDD​
    11·1 answer
  • PLS I NEED HELP Question 6<br> 1 pts<br> What is NOT a built-in function in python?
    5·1 answer
  • How to stop sharing location without them knowing imessage.
    7·1 answer
  • STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
    14·1 answer
  • Write an algorithm to print the odd number from 100 to 1​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!