1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
5

While designing web pages for mobiles, the page content should be extensive such that the readers get the opportunity to explore

all facets of the topic.​ O True O False
Computers and Technology
2 answers:
Flura [38]3 years ago
8 0

Answer:

The correct answer is: "False".

Explanation:

It is false to state that web pages for mobiles should have extensive content because web pages are actually developed to be as much concise as possible and provide links and hyperlinks for solving this problem of content searching and learning. While designing web pages, developers should take care of how the content is available and if all sources are reliable. Readers will rarely get interested in extensive and tiring content which requires a lot of attention and time. Rather, readers will get interested easier in web pages which provide as much online resources and hyperlinks for surfing on the web as possible.

(ps: mark as brainliest, please?!)

mixer [17]3 years ago
3 0

Answer:

True

Explanation:

The readers need to know the aspects of the topic that will broaden their knowledge and idea. So when designing a web page it is very good to provide extensive content such as hyperlinks to related articles on the same topic. To broaden their reading scope.

However this should be done cautiously, not to provide facets that will end up distracting the importance and the core aspect of the main topic.

You might be interested in
What is the square root of 1600 and 36 ?​
liraira [26]

Answer:

1600 - 40

36 - 6

Explanation:

3 0
3 years ago
In many supermarkets customers can pay for their shopping using credit cards. (a) Name two items of information stored on the ma
slamgirl [31]

Answer:

Explanation:

Two items on the magnetic strip are, Credit Card info and Balance

Two ways supermarket may check are the PIN pad you are using to pay or their reciept system.

7 0
3 years ago
In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
Zielflug [23.3K]

Answer:

Option (B) i.e., Hash is the correct option.

Explanation:

A hash value is the number that has the fixed length and the data recognition is uniquely. It is also a type of file that is read by the special type algo, it uses the value of the bits in the following computer files which is used to manipulates the single number. That's why the following option is correct.

7 0
4 years ago
cout << "Part 1" << endl; // Part 1 // Enter the statement to print the numbers in index 4 and index 9 // put a spac
Margarita [4]

Answer and Explanation:

#include <iostream>

using namespace std;

int printEven(int array[],int n)

{

int count=0;

for(int i=0;i<n;i++)

{

if(array[i]%2==0)

{

count++;

cout<<array[i]<<" ";

}

}

return count;

}

void printAll(int array[],int n)

{

for(int i=0;i<n;i++)

{

cout<<array[i]<<" ";

}

}

int computeTotalOdds(int array[],int n)

{

int count=0;

for(int i=0;i<n;i++)

{

if(array[i]%2!=0)

{

count++;

 

}

}

return count;

}

int main()

{

int array1[20] = {3, 18, 1, 25, 4, 7, 30, 9, 80, 16, 17};

int numElements = 11;

cout << "Part 1" << endl;

cout<<array1[4]<<" "<<array1[9];

cout << endl;

cout<<array1[0]<<" "<<array1[8];

cout << endl;

array1[2]=12;

cout << "\nPart 2" << endl;

printAll(array1,numElements);

 

cout << "\nPart 3" << endl;

int evens;

evens=printEven(array1,numElements);

 

 

 

 

// This will print the number of evens in the array.

cout << endl << evens;

 

cout << "\nPart 4" << endl;

 

int total;

 

total=computeTotalOdds(array1,numElements);

cout << endl << total;

 

return 0;

}

3 0
3 years ago
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
Other questions:
  • Write the steps for displaying multiple subtotal functions in excel.
    10·1 answer
  • For a wire with a circular cross section and a diameter = 3.00mm calculate the following: (m means meter. mm means millimeter. c
    5·1 answer
  • How should you handle possible suicides:
    10·1 answer
  • Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 198
    7·1 answer
  • Which IEEE standards define Wi-Fi technology?
    10·1 answer
  • Identify the angle.
    12·1 answer
  • How does Shakespeare immediately introduce Tybalt as a menacing character?
    9·1 answer
  • Ron is creating building blocks in Word. How can he make the building blocks that he created available?
    10·2 answers
  • Which of the following are the most important reasons people in the 1920s were so interested in seeing lifelike stories in audio
    6·1 answer
  • Does anybody have the answer for 2.19.6 checkerboard for codehs??
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!