1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
2 years ago
8

Chantelle wants to change the color scheme for her company's web app, and she needs to get the logos updated. What kind of devel

oper should she talk to
Computers and Technology
1 answer:
scoundrel [369]2 years ago
8 0

Incomplete question. The options;

a. Back-end

b. DBA

c. Front-end

d. Mobile

Answer:

<u>c. Front-end</u>

Explanation:

A Front-end developer is skilled at designing the external features of a web application or web browser. In other words, the user interfaces such as the color and logos of an app are designed by the Front-end developer.

Hence, Chantelle should talk to an experienced Front-end developer.

You might be interested in
is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
Rina8888 [55]

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

3 0
2 years ago
Write a function SwapArrayEnds() that swaps the first and last elements of the function's array parameter.
Artyom0805 [142]

Answer:

Explanation:

The function was written in Java. It takes in an int array returns the same array but with the first and last elements swapped. A test array was used in the image below to demonstrate the output which can be seen in the bottom of the image in red.

   public static int[] SwapArrayEnds(int[] myArr) {

       int temp = myArr[myArr.length-1];

       myArr[myArr.length-1] = myArr[0];

       myArr[0] = temp;

       return myArr;

   }

3 0
3 years ago
In a Microsoft® Word® document, if a user wanted to organize information in rows in columns, they should select a
SVETLANKA909090 [29]

Answer:

first you would click home

then go to paragraph look for the lines

the click on the ones that say justify and that is how you get it

or just hold Ctrl and J to do it as well  

Explanation:

6 0
3 years ago
What was revolutionary about Web 2.0?
CaHeK987 [17]

Answer:

social media and sites allow people to communicate with others

Explanation:

Hope this helps <3

8 0
2 years ago
write a script to check command arguments. Display the argument one by one (use a for loop). If there is no argument provided, r
algol13

Answer and Explanation:

Using Javascript programming language, to write this script we define a function that checks for empty variables with if...else statements and then uses a for loop to loop through all arguments passed to the function's parameters and print them out to the console.

function Check_Arguments(a,b,c){

var ourArguments= [];

if(a){

ourArguments.push(a);}

else( console.log("no argument for a"); )

if(b){

ourArguments.push(b);}

else( console.log("no argument for b"); )

if(c){

ourArguments.push(c);}

else( console.log("no argument for c"); )

for(var i=0; i<ourArguments.length; i++){

Console.log(ourArguments[i]);

}

}

4 0
2 years ago
Other questions:
  • List and define the types of System Software. How does System Software differ from Applications Software?
    12·1 answer
  • Casting is one of the oldest known manufacturing processes. <br> True or false
    6·2 answers
  • AYUDAAA..... DARÉ TODOS LOS PUNTOS QUE PUEDA.
    15·1 answer
  • Jana keeps receiving friend requests from strangers on a social media site. This is making her uncomfortable.
    15·2 answers
  • Write a program that gets a single character from the user. If the character is not a capital letter (between 'A' and 'Z'), then
    15·1 answer
  • What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another
    9·2 answers
  • What are the classifications of computer
    9·1 answer
  • Find the basic period and basic frequency of the function g(t)=8cos(10πt)+sin(15πt)
    9·1 answer
  • What is an infrastructure dedicated to one organization
    13·1 answer
  • In what situations might you need to use a function that calls another function?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!