1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
7

You are almost finished updating a Website. As part of the update, you have converted all pages from HTML 4.0 to HTML5. The proj

ect is currently on schedule. However, your project manager has been asked by the accounting team manager to justify a day of time spent validating the site's HTML5 pages. The accounting team manager does not have technical knowledge of the Internet or the Web. Which is the most appropriate explanation to provide to the accounting team manager?a. The team needs to verify that the site will appear as expected in as many browsers as possible.b. We need to verify that the HTML5 in the pages conforms to W3C standards.c. Customers may have problems downloading the page, and one of those problems might involve improperly closed tags.d. Improper declarations will cause problems, and they need to be verified via HTTP.
Computers and Technology
1 answer:
Komok [63]3 years ago
8 0

Answer:

a. The team needs to verify that the site will appear as expected in as many browsers as possible.

Explanation:

Upgrading to HTML5 is a good idea  you get a universal experience across a wide spectrum of devices. With HTML5, you get device ubiquity. You get a chance to build something once and have it work across a wide spectrum of browsers.

However, to a non technical person all these steps and coding you have taken to achieve this don't mean anything. They will only be satisfied with what they can observe physically and confirm there are no issues.

This is why option a is most appropriate as opposed to other options. The account manage will need to see and confirm that the site's HTML5 pages are appearing on many browsers as possible without any issue.

You might be interested in
How many bits must be “flipped” (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase ‘a’ that’s represe
Neporo4naja [7]

<span>To capitalize lowercase “a” which is 0110001 which is “A” you will need to flip the following bites 01000001<span> as represented in ASCII. Since we are only looking at 2bit digit which is 0 and 1 which  has a 256 possible combinations from 0 up to 255. </span></span>


6 0
3 years ago
The term BIOS stands for
iren2701 [21]
Basic Input-Output System
8 0
3 years ago
You defined a book data type.
earnstyle [38]

Answer:

myBook.title('To Kill a Mockingbird')

Explanation:

Correct answer edge 2020

5 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
What does it mean by “Your circles should shrink by half” sorry if this isn’t a clear picture.
damaskus [11]

Answer:

I'm not seeing anything so sorry

5 0
3 years ago
Other questions:
  • What is the difference between First Person Shooters and Construction Simulations?
    12·2 answers
  • Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization’s network. When
    5·1 answer
  • Collaboration, listening, and negotiating are considered __________ skills.
    7·2 answers
  • What is one advantage of top-down programming design?
    13·2 answers
  • The software application associated with a specific file type is called a(n) __________ application.
    12·1 answer
  • List the six external peripheral parts of a computer system
    8·1 answer
  • Why do we need IP Addresses in order for the Internet to function properly?
    7·1 answer
  • Which of the following about Java arrays is true?
    14·1 answer
  • 1. What does a network allow computers to share?
    13·1 answer
  • Manny has drafted an email message and configured a delivery option "Do not deliver before: 5:00 P.M. and today's date." He shut
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!