1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
docker41 [41]
3 years ago
9

The purpose of a good web page design is to make it

Computers and Technology
2 answers:
kirza4 [7]3 years ago
7 0

Answer: helpful for everyone

Explanation:

some student need help  so then he can't find the answer in the other websites so it is department about communication

meriva3 years ago
5 0

Answer:

Hi , so your answer is that a good web page design is to make it easy to use and meaningful and able to help people .

Explanation:

Really hope i helped , have a nice day :)

You might be interested in
.حدد/ي الكيانات في النظام
olasank [31]

Answer:

what

Explanation:

6 0
3 years ago
Read 2 more answers
Which of the following is least likely to be a scientific experiment?
enot [183]
It would be the last one, because she isn't recording any type of data over what she is doing and she isn't observing it at all. She simply trimmed the stems of a bouquet of flowers. However, the other options insist that they are recording data and observing, like you would do when performing an experiment. I hope this helps! :)
8 0
3 years ago
Read 2 more answers
gven an IP address and mask of 192.168.12.0/24, design an IP addressing scheme that satisfies the following requirements. Subnet
Reika [66]
Uh 69 +23= 92
Hope this helps :)
8 0
3 years ago
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
Which is not a characteristic of system testing?
alexandr1967 [171]

Answer:

Characteristics of system testing include;

1. It is the first full assessment of a complete software package.

2. It evaluates the functional, non-functional, and business requirements of a software package.

3. It is similar to black-box testing.

4. It is done by a team of specialized software testers.

5. It helps to ensure the optimal performance of the software after it is deployed.

Explanation:

System testing is a form of software testing that is done to evaluate the full software package before deployment. The testing is done on the basis of some standards and specifications that had been previously established. It is the first testing that is done in a series of software ware testing. This system testing ensures that the functional, business, and non-functional requirements of a software package are met.

It minimizes the problems that are likely to be experienced by a software program that goes unchecked. One such problem is troubleshooting. It is a very important test that should be performed on any developed software.

3 0
3 years ago
Other questions:
  • Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
    14·1 answer
  • How do the following improve security <br> User Id <br> Password<br> Encryption
    10·2 answers
  • _______ computing refers to applications and services that run on a distributed network using virtualized resources.
    14·1 answer
  • Mr. Mathis asked his students to add a comment to a cell the students recorded the steps they followed in a chart. Which student
    12·2 answers
  • Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
    6·1 answer
  • If a computer reboots itself on its own the computer might have a(n)
    10·1 answer
  • Which of the following substances increases in quantity during repititive muscle contraction during oxygen deficti ?
    11·1 answer
  • Can someone help me calculate this Multimedia math:
    11·1 answer
  • A. All methods in an interface must be _________________ _________________________.
    5·1 answer
  • Electrical data suitable for transmission is called a(n)
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!