If you want to excel in the field of web design, what must you be able to make and keep?
price estimates
statement of work
final deadlines
promises

Answers

Answer 1

Answer:

You  need to beable to make final deadlines because maybe if your adding divs or maybe something takes a bit long for you to do you need to give the person your working for an idea of what and why you may take long to get your website polished.

Explanation:

Answer 2

Answer:

B. final deadlines

Explanation:

edg 2021 (got 100%)


Related Questions

Software that enables information to be obtained from a computer without the user's knowledge is ____________

Answers

Answer:

Spyware

Explanation:

__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

Answers

Answer:

bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

A presenter selects multimedia materials primarily based on their ability to organize data. Distract the audience. Introduce information. Emphasize a point.

Answers

Multimedia materials encompass video, audio and pictorial elements of a presentation. These materials are useful extremely useful when emphasizing a point.

In other to establish importance, emphasis has to be laid on the key points of a lesson, teaching or information.

With multimedia tools, the important points could be aired verbally, diagrammatically with annotations or using live visuals to establish the proposed points.

Learn more : https://brainly.com/question/25682762

Question about microscope ​

Answers

Answer:

1.  c. diaphragm

2.  a. ocular lens

3.  b. fine adjustment knob

4.  c. course adjustment knob

5.  d. nosepiece

6.  a. simple light microscope

7.  d. A, B, and C

8.  a. light switch

Explanation:

Hope this helps.

________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. (1pts) Question 5 - ________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing

Answers

Answer:

Hey there!

Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing

Hope this helped! :)

uploaded ads give advertisers access to more inventory than responsive display ads. true or false?

Answers

Answer:

True

Explanation:

This is because of the fact that  it allows the marketing industry rise to higher rates.

Ture but you can do that for now and then when we can get it done today and then we

The frame rate is the result of multiplying the length of the film times its width

True or False

Answers

Answer:

False

Explanation:

frame rate is how many frames are shown per second in a video

the length of the film times the width is the resolution. not frame rate

pretty sure nones gonna do this but please do it would gelp alot of my exams irs gonna bring me like 10 marks :(

Answers

I wanna help so bad but I failed cs

In one to two sentences, describe how you would create a border around a group of cells.

Answers

Answer:

Select the cells you want to format. Click the down arrow beside the Borders button in the Font group on the Home tab. A drop-down menu appears, with all the border options you can apply to the cell selection.

una laptop agarra mas internet que una computadora de escritorio?

Answers

una laptop agarra mas internet que una computadora de escritorio?

Su computadora no puede afectar la velocidad de Internet de sus otros dispositivos. ... La única forma en que su computadora puede reducir la velocidad de Internet de otros dispositivos es si no obtiene suficiente velocidad de su ISP y sus dispositivos luchan por un ancho de banda limitado.

^^

Which command should you enter at the command prompt to display the current user's quota limits and disk usage?

Answers

wmic diskdrive get size

According to the C&M Technology Competitor View, while Accenture leads in Consulting and SI, which are our two major competitors in large deals?

Answers

Even though Accenture leads in Consulting and SI, its major competitors include McKinsey and Bain & Co. Inc.

Accenture is a multinational professional technology service company that provides digital, tactical, strategic, and consulting services for its clients.

Accenture was formerly known as Arthur Anderson LLP. It's regarded as one of the top accounting firms in the world. Some of its major competitors in large deals include McKinsey, Bain & Co. Inc., Boston Consulting Group, Inc.

Read related link on:

https://brainly.com/question/25740331

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

translate ¨friends¨ into spanish

Answers

Friends to Spanish is Amigos

Answer: I hope this is helpful

Explanation:

Friends in Spanish is Amigo- masculine aka male ,noun.
Friend in Spanish is Amiga- feminine aka Female , noun

Friends- trusted and caring person

what command can be used to repair a dual boot system?

Answers

Answer:

bootrec utility

Explanation:

It entirely depends on your version of windows and if you are even on windows, so I have no explanation, but for windows it is possible.

___________________________________ allows many home users, corporations, and organizations around the world to connect far more computers to the Internet than they would otherwise be able to connect.

Answers

Answer:

network address translation

Explanation:

The ____ method constructs a text string from Unicode character codes that are passed as arguments.

Answers

Answer:

The fromCharCode() method constructs a text string from Unicode character codes that are passed as arguments.

PLEASE HELP! WILL MARK AS BRAINLIEST
JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

People who connect one network to another within the company or even across organizations are A. central connectors. B. boundary spanners. C. external specialists. D. peripheral specialists.

Answers

People who connect one network to another within the company or even across organizations are boundary spanners.  

People who serve as ambassadors to linking information and communications on informal networks within different department in an organisation and with other organisations or personnel  far and near for the good of their organisation are called Boundary Spanners.

The importance of Boundary  spanning in organisation includes

Exchange of expertise informationNurturing of connections with people from different part s of the world.Improved innovation in businesses

See more here: https://brainly.com/question/14728967

WILL MARK A BRAINLIEST!!! PLS HELP!!!





Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

man, just got rick rolled brb going to cry

Explanation:

Daijōbu desho. Datte Kimi yowai mon.

Q10: ____ server maintains a database of hostnames and their corresponding IP addresses and performs the translations automatically.

Answers

A web server is designed to maintain a database of hostnames and their corresponding IP addresses while also performing the translations of hostnames to an IP address automatically.

A server can be defined as a specialized computer system that is designed and configured to store, maintain, and provide specific remote services for its end users (clients), especially on a request basis.

In Computer and Technology, the different types of server include:

Virtual serverProxy serverApplication serverPrint serverDatabase serverFile serverWeb server

A typical function of a web server is the maintenance of a database comprising hostnames and internet protocol (IP) addresses, as well as performing the translations of hostnames to an IP address automatically.

Read more: https://brainly.com/question/21078428

A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records.

Answers

A form is an access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and delete records.

How to fix common problem of a computer system?​

Answers

Some ways you could fix a common problem in a computer system are

Run a thorough virus scan.
Update your software.
Cut down on the bloat.
Test your Wi-Fi connection.
Reinstall the operating system.

What will print to the console after running this code segment?


A. 15.

B. 16.

C. 18.

D. 21.

Answers

Answer:

16

Explanation:

answer =3+2

answer =5+3

return 8 × 2

16 will print to the console after running this code segment. Therefore, option B is correct.

What do you mean by code segment ?

A code segment, also known as a text segment or simply text, is a section of an object file or the program's virtual address space that contains executable instructions.

A character array segment that represents a text fragment. Even though the array is directly accessible, it should be treated as immutable. This allows for quick access to text fragments without the overhead of copying around characters.

In memory, the code segment functions normally as read-only memory and has a fixed size; thus, without the need for loading, it can generally be found in read-only memory (ROM) on embedded systems.

answer = 3+2, answer = 5+3

return 8 × 2

= 16

Thus, option B is correct.

To learn more about the code segment, follow the link;

https://brainly.com/question/20063766

#SPJ2

A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us

Answers

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.

Read related link on:

https://brainly.com/question/25522987

We _____ information about space. For example, while reading a textbook, we encode the place on a page where certain material appears.

Answers

Answer:

Extremes is the answer for the blank.

Explanation:

In Linux, most applications and commands are in the ____ directory or its subdirectories bin and sbin.

Answers

On a Linux computer, most of the software applications are saved in the /usr directory or in its subdirectories named, bin and sbin.

A Linux can be defined as an open-source and community-developed operating system (OS) that is designed and developed for the following electronic devices:

Mainframes. Computers.Embedded systems.Mobile devices.

Generally, the Linux operating system (OS) is based on UNIX and it is typically released under the GNU general public license (GPL).

On a Linux computer, the commonly used directory for saving most software applications is the /usr directory or sometimes its subdirectories named, bin and sbin.

Read more: https://brainly.com/question/20629962

using iot to track packages, containers, and other bulkware are examples of what type of smart iot technologies?

Answers

There are technology that are used to detect and identify objects with tracking tag. The statement is an example Smart logistics IOT technologies.

Smart logistics is commonly called Connected logistics.  It helps or allows us to have near real-time tracking of movement/delivery of goods and services.

It is often used by ECommerce companies, food delivery companies, app-based taxi service companies, online markets etc.

 

In the logistics process, Internet of things can aid an individual by tracking goods and services as it saves time.

Learn more from

https://brainly.com/question/19995128

Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a fileserver, network
attached storage, or the cloud?
Why?
What are some possible disadvantages of your recommendation that they should be aware of?

Answers

Answer:

I would recommend the cloud because they can access their data on every single device. There are virtually no disadvantages to the cloud.

Explanation:

Hope this helps.

How do i add a picture on a computer? Its a random question but i dont know how to do it. It needs to be a very detailed description.

Answers

get the picture glue it on the screen
Other Questions
A single bout of resistance exercise training increases muscle protein synthesis by as much as ______% above resting levels A swimming coach needs to choose a team for a relay race. The coach must select 4 of 6 available swimmersand put them in a strategic sequence.How many unique ways are there to arrange 4 of the 6 swimmers? Which of the following is a natural event that is part of the long-term carbon cycle? (1 point)A. Earthquakes B.Tsunamis C.Blizzards D. Volcanic eruptions Read this quote from the Strange Case of Dr. Jekyll and Mr. Hyde. "It can make no change. You do not understand my position," returned the doctor, with a certain incoherency of manner. "I am painfully situated, Utterson; my position is a very strangea very strange one. It is one of those affairs that cannot be mended by talking." Based on this information what is the best definition of incoherency?A. Something that is unimportant.B. Something that is unclear.C. Something that is rude or unfavorable.D. Something that is suspicious. what are all the square numbers that are greater than 10 but less then 40 which was the first state to allow women to voteeven before the constitution was amended? Decide if the following sentence is grammatically CORRECT or INCORRECT. ste son nuestros carros. Correct Incorrect. Which conclusion about proposed changes in transportation doboth speakers support?AChanges would affect citizens' health.. Changes would increase with federal grants.. Changes would improve economic conditions in thecity.OD. Changes would decrease traffic congestionthroughout the city Evan takes 15.5 minutes to walk 1 mile.How long will it take him to walk 4.35 miles?Enter your answer as a decimal in the box. Explaining Effects Why was the arrival of American forces so important to the war effort? Help! Ive been on this test for 1-2 hours! Which factor is not a type of spectra?A. emissionB. absorptionC. continuousD. discontinuous What is the value of the function Y equals 2X plus 3 When x equals -1 PLEASE HELPPP RUNNING OUT OF TIMMEETwo shops sell baked beans in different sized tins. Calculate the price per 1.25 kg for shop B. Give your answer in pence.Shop A) 1.25kg for 4.85Shop B) 250g for 0.88 the perimeter of an equilateral triangle is 14.4 cm. Find out the length of the side of that triangle in decimal fraction What is the best Team in the NHL. (hint TBL) How does Orwells choice to create a satire and allegory support his purpose for writing Animal Farm? Check all that apply. It mocks Soviet leaders by using pigs to represent their behavior. It creates a way for Orwell to expose a political system indirectly. It reveals the corruption of power through the actions of the pigs. It allows the reader to access the private thoughts of each character in the story. It shows the influence of propaganda by having the animals believe anything they are told. Savannah is deciding between two parking garages. Garage A charges an initial fee of $9 to park plus $1.50 per hour. Garage B charges an initial fee of $4 to park plus $2.50 per hour. Let A A represent the amount Garage A would charge if Savannah parks for t t hours, and let B B represent the amount Garage B would charge if Savannah parks for t t hours. Graph each function and determine which garage would be cheaper if Savannah needs to park for 6 hours. What is the formula of(a+b)whole square what's 2x+3y=1,470 in slope intercept form?