1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gavmur [86]
2 years ago
11

All of the following are design elements of a landing page that instill trust in site visitors, except Group of answer choices s

ecure payment methods social media presence large, clear, colorful action buttons visible contact information
Computers and Technology
1 answer:
Gelneren [198K]2 years ago
7 0

Answer:

large, clear, colorful action buttons.

Explanation:

A website refers to the collective name used to describe series of web pages linked together with the same domain name while a webpage is the individual HTML document (single page) that makes up a website with a unique uniform resource locator (URL).

When users (people) visit a particular website (homepage, index page or landing page) for the first time, there are certain design elements that when seen would give them a sense of security, instill trust and guarantees confidentiality of all user data (informations).

Generally, secure payment methods, social media presence, and visible contact information are design elements of a landing page that instill trust in site visitors.

However, large, clear, and colorful action buttons wouldn't do or cause any of the aforementioned actions.

You might be interested in
Identify and explain the three tiers of web-based applications.
prisoha [69]

In the case of three-tier architecture, the tiers are as follows: Presentation tier (also known as the user interface or the client application) Business logic tier (also known as the application server) Data storage tier (also known as the database server)

This was on google i take no credit for this work

Btw I don´t know if this is what u want

7 0
3 years ago
doubleIt is a function that takes one argument and returns no value . The argument is a pointer to int . The function doubles th
Mama L [17]

Answer:

void doublelt(int *number)

{

*number=*number*2;

}

Explanation:

This exercise is for you to learn and understand the PASS BY POINTER syntax. The importance of this is that if you didnt use a pointer you would have to RETURN an int from the function. in that case the code would be:

int doublelt(int number)

{

number=number*2;

       return number;

}

Passing by pointer manipulates the value by going inside the memory and where it resides. Without the pointer, the function would create COPIES of the argument you pass and delete them once the function ends. And you would have to use the RETURNED value only.

8 0
3 years ago
A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, pl
Phantasy [73]

Answer:

The correct option is C. The user does not have a valid product license key. Both the OS installed on the bare metal (that the host) and the client OS must have a valid license key.

Explanation:

There is a powerful virtualization tool is built into every copy of Microsoft Windows 8.x Pro and Windows 8.x Enterprise, Client Hyper-V.

This is the very same Type-1 hypervisor that runs virtualized enterprise workloads and comes with Microsoft Windows Server 2012 R2. The virtual machines you create on your desktop with Client Hyper-V are fully compatible with those server systems as well.

If you need to do testing as a software developer, or simply want an additional operating system(s) running on your computer, such as Linux, Hyper-V can be a great feature to have enabled on your PC.

To have the Hyper-V feature on your PC, you'll need to meet some basic requirements like your computer will need 4GB of RAM with a 64-bit processor that has Second Level Address Translation (SLAT).

Many PCs on the market have this feature, while many PC BIOSes have virtualization features turned on by default, your PC might not.

As BIOS menu layouts are not universal, you'll want to consult your PC BIOS documentation as to where the feature is located in your firmware setup and what it is called.

a.   Windows 8.1 does not support Type 2 hypervisors.

 This option is wrong. All 64-bit Windows 8.1 OS except for the Home version supports hypervisors type 2 as well as type 1

b.   The motherboard does not support hardware-assisted virtualization.

Most of the PC that can run Windows 8.1 has visualization, all that is needed is to have it enabled if it was it enabled by default in the BIOS

c.   The user does not have a valid product license key.

This is the correct answer. For you to successfully install visualization software on Windows 8.1, both the host OS and the client OS must have a valid product key

d. The system is incompatible with Type 1 hypervisors.

This option is wrong. The Windows 8.1 OS does not only support the installation of visualization software, it came with its hypervisor called Hyper-V.

7 0
3 years ago
Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a
vagabundo [1.1K]

Answer:

G m a i l

Explanation:

G m a i l by Google is the main commercial email provider to Android Phones. This is because it offers so many features that other email provider do not. One of this is the ability to backup your data, including contacts, messages, and others. This features along with other features makes Google g m a i l account the best option for Android users.

8 0
3 years ago
Which technology is predominately used for contactless payment systems?
kompoz [17]
The correct answer for this question is this one: "a. wireless local area network (WLAN)."

<span>The technology that is predominately used for contactless payment systems is called the </span><u>wireless local area network (WLAN)</u><u />. It is even used now a days.
Hope this helps answer your question and have a nice day ahead.
7 0
2 years ago
Other questions:
  • Consider that a large online company that provides a widely used search engine, social network, and/or news service is consideri
    12·1 answer
  • The ________ multiple-selection PHP statement is used to handle decision making and can be used to replace multiple if and if...
    12·1 answer
  • What is the order of arrangement of files and folders on a computer?
    15·1 answer
  • Your company is instituting a new security awareness program. You are responsible for educating end users on a variety of threat
    10·1 answer
  • Which of the following statements are true about quick sort
    12·1 answer
  • What tool is provided in Windows to facilitate sharing data objects between applications and computers?
    8·1 answer
  • Which command allows d1 to configure an ip address on one of its physical interfaces?
    9·1 answer
  • Your task is to implement a function replace_once(t, d), that takes a text t and a replacement dictionary d, and returns the res
    10·1 answer
  • Which of the following is input devices? (a)Scanner (b) Keyboard (c) Both a and b (d) Plotter​
    5·1 answer
  • Hilarious error messages
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!