1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
8

PLZ HELP!!!

Computers and Technology
1 answer:
mariarad [96]3 years ago
8 0
Answer: A. Usability testing
Explanation:
Usability testing would be the correct answer because if the user interface isn't "frendly" then people won't be able to use it properly. Or if you are refering to the word friendly as looking safe, then even more so would be usability testing. Because if people don't like the fonts and styles of the user interface, they might not use it at all.
You might be interested in
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
Aleksandr-060686 [28]

Answer:

PING

Explanation:

To check if there's still connectivity between the computer and server, I would use the ping command.

The ping command is primarily a TCP/IP command. What this command does is to troubleshoot shoot. It troubleshoots connection and reachability. This command also does the work of testing the name of the computer and also its IP address.

4 0
3 years ago
An argument does not always have to be made in words. A piece of music
mixas84 [53]

Answer:

B. emotional

Explanation:

An emotional argument. An argument does not always have to be made in words.

4 0
3 years ago
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
3 years ago
Volume of a cuboid is 14400 ​
Yanka [14]

Answer:

WHAT?

Explanation:

8 0
3 years ago
What should a good interface delight incorporate?
antoniya [11.8K]

<u>Answer:</u>  

A) a very long but detailed menu system

<u>Explanation:</u>

A <em>detailed menu will never attract or support the user in any form</em>. It might be difficult to use the application for longer time due to the <em>un supportive menu format.</em>

Option B: This option might look closer to the answer but it might not attract if many users are unaware of the latest changes.

Option C: The application should support and should not challenge the user. It is not a quiz or game show to challenge people.

Option D: Any GUI should be attractive so that the user tend to use it frequently.

8 0
3 years ago
Other questions:
  • When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihoo
    5·1 answer
  • The Internet may best be compared to a/an
    8·1 answer
  • __________ has become a widely accepted evaluation standard for training and education related to the security of information sy
    5·1 answer
  • (Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds
    12·1 answer
  • Which of the following is an accurate definition of a computer system? A computer system consists of the operating system that t
    6·1 answer
  • How can you tell the value of a purchase?
    7·1 answer
  • Compare Fibonacci (recursion vs. bottom up)
    12·1 answer
  • You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used.
    15·2 answers
  • When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comp
    10·1 answer
  • What is a simple definition for electricity?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!