1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
9

Katy and her associates are approached by an aged tai chi expert to create a website for him. From her participation in an onlin

e
developers, Katy knows that the expert already has rejected several website designs by other designers and is quite a difficult person to please. Katy decides that she won't let the client overpower her. What is the other key thing that Katy should do during the requirements-gathering session, scheduled for next week?
A.
She should keep an open mind and "go with the flow."
B.
She should keep reminding the client about her key skills and talents during the meeting.
C.
She should present her design ideas with examples and statistics.
She should generally keep quiet during the meeting and speak only when asked a question.
D.
She should generally keep quiet during the meeting and speak only when speak when asked a question.​
Computers and Technology
1 answer:
Helen [10]3 years ago
6 0
She should present her design ideas with examples and statistics she should generally keep quiet during the meeting and speak only when asked a question
You might be interested in
Why do computers need system software?
Marina86 [1]
<span>Computers don't need system software. System software is used to automate many tasks so the user can achieve more. Actually, one of the ideas of computer programming is to avoid needless repetition. The system software will prepare the computer for the user.</span>
5 0
3 years ago
The width to height proportion of a monitor is known as the
JulijaS [17]
The width-to-height proportion of a monitor is known as the aspect ratio.
6 0
3 years ago
What command is used to generate an RSA key pair?
Leokris [45]

Answer:

D) crypto key generate rsa

Explanation:

In cryptography, the RSA refers to Rivest–Shamir–Adleman. This is an algorithm used for encrypting and decrypting messages in computers thereby ensuring secured transmission of data. In order to generate an RSA key pair, you will use the command crypto key generate rsa while in the global configuration mode. This command has the following syntax:

crypto key generate rsa [general-keys| usage-keys| signature| encryption] [<em>labelkey-label</em>] [exportable] [modulus <em>modulus-size</em>] [storage <em>name of device</em>:][redundancy][on <em>name of device</em>:],

with each parameter having its description

5 0
3 years ago
Applications on the Android OS are mostly written in what programming language?
DochEvi [55]

<span>Applications on the Android OS are written in JAVA programming language. JAVA Programming language is considered one of the most popular and used programming language by mostly developers. JAVA was developed in the year 1995. In order to make an Android app, the programmer should know the programming language by heart.</span>

5 0
4 years ago
If you see someone harassing someone else online you should ​
Sever21 [200]

Try to say something yourself, but if you are too scared, get an adult involved. The one bad thing you could do is ignore it.

4 0
4 years ago
Read 2 more answers
Other questions:
  • Considers the assets of all things in an environment, and refers to the layering of security tools and methods often varying num
    13·1 answer
  • what happens when you double-click on a file with an extension that represents an executable program?
    5·1 answer
  • Betty took her friends bowling. they rented 4 lane. 10 people need rent shoes and
    12·1 answer
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • The best presentations try to include as much text as possible on each slide. True False
    6·2 answers
  • The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software c
    14·1 answer
  • What are the similarities and differences between the sample résumés, in terms of content and formatting?
    10·1 answer
  • Discuss the 21 st century competencies or skills required in the information society and 4 ways you can apply it during supporte
    6·1 answer
  • In many programming environments today, one language translates the programmers' code into a different language before the compu
    6·1 answer
  • The author mentions several challenges facing the world, including poverty and climate change. How might big data help us solve
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!