1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
4 years ago
12

Which three phrases describe a wireframe

Computers and Technology
1 answer:
liberstina [14]4 years ago
5 0

Answer:

1. Estimates and app architecture draft.

2. Product functionality.

3. Usability and design draft.

You might be interested in
Damage to which portion of the limbic system results in loss of memory of recent events and difficulty committing anything new t
Vera_Pavlovna [14]

Answer:

Hippocampus.

Explanation:

There are two parts of the limbic system. They are the frontal part which is the amygdala and the posterior part which is the hippocampus.

The hippocampus is an extension of the temporal part  of the cerebral cortex which is a plastic-like structure that can be easily damaged by stimuli. It is packed with densed neurons and forms an S-shape at the extension of the temporal part.

It is responsible for learning and memory and damage to it can result to memory loss of recently learnt information.

8 0
3 years ago
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
As more and more computing devices move into the home environment, there's a need for a centralized storage space, called a ____
Ksivusya [100]

Answer: Network attached storage device

Explanation:

Network attached storage(NAS) is the data storage server device that is responsible for serving files to configuration and other components.Through this sever device data can be retrieved by various client and user from central disk capacity .It provides good data access to diverse user and client of data.

  • Other options are incorrect because RAID drive, server station, gigabit NIC are not the devices that centrally store huge amount of data for access.
  • Thus, the correct option is network attached storage(NAS) device

8 0
3 years ago
What are the different options in a page layout feature ? Select three options
Sever21 [200]

Answer:

Half Center Right Left, theres four

Explanation:

5 0
3 years ago
According to the video, what tasks do Carpenters commonly perform? Select four options. supervising Plumbers, Electricians, and
TiliK225 [7]

Answer:

Cutting, shaping, and fastening wood.

Installing rafters, joists, windows, and subflooring.

Setting hardwood floors.

Building kitchen cabinets.

7 0
3 years ago
Read 2 more answers
Other questions:
  • _____ software can help a company manage security, enforce corporate strategies, and control downloads and content streaming fro
    11·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • Create a new program called Time.java. From now on, we won’t remind you to start with a small, working program, but you should.
    13·1 answer
  • How many websites are mobile friendly?
    7·1 answer
  • Implement a function with signature barGraph(w, h, data) which creates and returns a cs1graphics.Canvas instance that has width
    9·1 answer
  • Convert each number into scientific notation.
    6·1 answer
  • Which of the following is the most accurate definition of a botnet? a small text file passed to a Web browser on a user's comput
    15·1 answer
  • A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update
    10·1 answer
  • True or false, the total number of clock cycles (cc) for a delay loop of 10 ms for 2-mhz 8086 clock is 10,000 cc.
    12·1 answer
  • You recently discovered that several key files of your antivirus program have been deleted. you suspect that a virus has deleted
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!