1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
6

A web designer finds out after the launch that one of the external links did not have "http://' and therefore the link appeared

broken to the user.
Which phase of QA could have corrected this issue?
OA wireframing
OB.
need testing
OC. design testing
OD. usability testing
Computers and Technology
1 answer:
Bumek [7]3 years ago
3 0
Answer is oc design testing
You might be interested in
Write down a program in SNOBOL thatcalculates the factorial of 7.
Sati [7]

Answer:

         n = f = 7

loop  f = gt(n,1) f * (n = n - 1) :s(loop)

         output =  f

end

Explanation:

3 0
3 years ago
Which is a requirement for searching for a template
Lina20 [59]

Answer:

umm... you did not discribe the anwsers, i cannot help you

8 0
3 years ago
According to the video, which of the following is communication between two individuals? Intrapersonal Communication Public Spea
DedPeter [7]

Answer:

The Last option: Dyadic Communication AND Interpersonal Communication

is the correct one.

Explanation:

Communication can be defined as the process in which one may convey his thoughts or inquires about things.

There are many types of communications as listed above.

  • Intrapersonal Communication
  • Interpersonal Communication
  • Dyadic Communication
  • Small Group Communication
  • Public Communication
  • Mass Communication
  • Organizational Communication
  • Intercultural Communication.

Under all these, Interpersonal communication and Dyadic communication are the ones that are between two people.

Dyadic communication is the one in which two people relate to exchange thoughts and ideas face-to-face. It is sometimes referred as dialogic relation.

Interpersonal relation can be between two or more than  two persons that may know each other. It is clearly specified in this communication that who listener and speaker are.

<h3>I hope it will help you!</h3>
3 0
3 years ago
Read 2 more answers
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
Answer quick plzzz I only have 2 hours
Nana76 [90]

Answer:

option 2

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • A factory has a dedicated room just for computers. They are generally kept locked in the room and are never directly used by use
    5·2 answers
  • Your friends know that you understand a lot about computers, both the technical details of how they operate as well as informati
    12·1 answer
  • Create a view named product_summary. This view should return summary information about each product. Each row should include pro
    13·1 answer
  • Effective presentations vary the color scheme on each slide.<br><br> True<br> False
    5·2 answers
  • Which file type is typically used for videos? GIF MPEG MP3 PDF
    8·1 answer
  • T F The exit function can only be called from main .
    10·1 answer
  • What was the original motivation for developing the internet?
    7·1 answer
  • If a function doesn’t return a value, the word _________ will appear as its return type.
    6·1 answer
  • So I tried asking for help with my code on stackoverflow but the people there were very condescending and mean plus my questions
    7·1 answer
  • your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!