1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
14

Brainliest forrrrrrr frrrrrew right herrreeee

Computers and Technology
1 answer:
nikdorinn [45]3 years ago
5 0

Answer:

Hi!

Explanation:

Thank You So Much For The Points.

You might be interested in
Which of the following definition below describes a wall opening?
My name is Ann [436]
A. An opening at least 30 inches high and 18 inches wide in any wall or partition. 
5 0
3 years ago
Read 2 more answers
Identify the primary responsibilities associated with each of the following web design roles: content writer/editor, artist/grap
frosja888 [35]

A web designer/developer is responsible for the design, layout and coding of a website. They are involved with the technical and graphical aspects of a website and how the site works and how it looks.

Explanation:

  • A content writer/editor creates and revises the text that visitors read when the visit a website, choose a link, image, video, or other media that enhances your text content.
  • A web artists/graphic designer's responsibility is to create original art, such as logos, stylized typefaces, and avatars, and props for virtual 3-d worlds.
  • A web designer's role is to create webpages that combine, text, images, and links using tools such as markup languages; CCS, HTML, and WYSIWYG editors.
  • Web programmer/database developer's job is to script languages such as, JavaScript, ASP, PHP, and MYSQL and must plan, create, secure, and maintain databases of varying complexity.
  • Web Administrator assumes all roles, including creative, high-tech, and oversight. May oversee a web development team that includes technical and creative roles.
5 0
3 years ago
Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can c
Misha Larkins [42]

Answer:

maybe threat?

Explanation:

4 0
3 years ago
Hello can you please help with this if you want to thank you!
nikklg [1K]

Answer:

hardware and software is the answer

8 0
3 years ago
Read 2 more answers
Authenticating information can be something a user knows, like a password; something a user has, like a smart card; or something
xenn [34]

Answer:. True

Explanation:

yes it is true in my opinion

8 0
2 years ago
Other questions:
  • What is used for World Wide Web?
    7·1 answer
  • Martha wants to invite her coworkers to her birthday party. She uses the mail merge feature to compose and send the invitations.
    6·1 answer
  • Your marketing director at ABC Marketing Agency would like to set up an email campaign that will use personalization to referenc
    5·1 answer
  • Thank you very much for your email. ...... was very interesting​
    15·1 answer
  • A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s
    7·1 answer
  • Why is dark supereffective against ghost?
    5·2 answers
  • Cual
    5·1 answer
  • Consider the following correct implementation of the selection sort algorithm.
    5·1 answer
  • Five plus six is equal to?​
    10·2 answers
  • There are many ways you can improve the performance of a website from an SEO perspective. When it comes to link building, which
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!