1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
14

Two Technicians are discussing ShopKey Pro. Technician

Computers and Technology
1 answer:
Vlada [557]3 years ago
3 0

Answer:

Technician A is correct

Explanation:

Contact us is the most common term used in online applications such as in websites, mobile/android application to search contact information. People mostly scanning the “contact us” page to find the contact information, if they want to contact the company or organization.

Why technician A is correct.

Technician A is correct because people always try to find the “Contact us” page to find contact information for asking questions, to provide feedback, or any suggestion if they want to provide. It is hard for people to find contact information to provide feedback or give an idea to improve the ShopKey version in “support” heading under the “help” section. Because people are more inclined to search such information in the “Contact us” page rather than exploring the website to find such contact.

Why technical B is not correct

When people want to provide feedback, ask a question or suggest a new idea, they mostly prefer to search for information in the contact us pages. An ordinary user, who has no knowledge of website management or website hierarchy, search contact information in the “Contact us” page rather than searching in support or in the help section.

You might be interested in
As a prospective student, what is the best reason to request an interview with your college application?
weqwewe [10]

Answer: The correct answer is A. I just answered this question myself!

6 0
3 years ago
A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
mariarad [96]

Answer:

datatable

Explanation:

3 0
3 years ago
Read 2 more answers
____ programs are software programs that are distributed on the honor system.
Nostrana [21]
Shareware program and they are also used free of charge.**
3 0
4 years ago
Read 2 more answers
List three ways you can help someone who is being bullied in of just being a bystander​
nignag [31]

Answer:

1.) Let a teacher, administrator or other safe adult know about what's going on.

2.) If someone is being physically harmed, you can call the police or 911.

3.) If the bullying is mild, (Name calling, insults, etc.) you can attempt to step in.

Explanation:

N/A

8 0
3 years ago
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario,
sladkih [1.3K]

Answer: d) Illegal and unethical

Explanation:  Illegal term is used for the something that is incorrect according to regulation.The legal factor is not present in this type of activity and thus it is judged by the regulations as unauthorized act and can be concluded as act of crime .

Unethical term defines that something is incorrect in a moral way and the person doing the unethical activity lacks the principles in his/her nature.

Jared is also performing illegal act by selling the piracy  antivirus package of software .The act is unethical as well because Jared is lacking the basic morals e.g.-stealing is offensive and incorrect act.Thus the correct option is option(d).

Other options are incorrect because the  act done by Jared is against the conduct which is not legal and ethics are moral features which is not present in Jared's act.

5 0
3 years ago
Other questions:
  • An attempt to exploit a vulnerability of a computer or network component is the definition of ________.
    15·2 answers
  • True or False? In C++, the expression (a + b / c) / 2 is implicitly parenthesized as ((a + b) / c) / 2.
    9·1 answer
  • Dead state is the name of the time delay in a cpu caused by differences between the speed of the cpu and ram.
    15·1 answer
  • In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
    13·2 answers
  • When a CPU executes each instruction in a program, it uses a process known as the __________.
    15·1 answer
  • How do you mark someone brainliest? The person with the best explanation gets brainliest.
    11·2 answers
  • After turning volume all the way up on your computer speaker you still can’t hear any sound. What should be done next
    15·1 answer
  • What is table,form,query and report ?short ans​
    13·1 answer
  • What time is it NOW??
    11·2 answers
  • PLEASE HELP WILLL GIVE BRAINLIESTTTTT!
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!