If you want to excel in the field of web design, what must you be able to make and keep?
price estimates
statement of work
final deadlines
promises

Answers

Answer 1

Answer:

You  need to beable to make final deadlines because maybe if your adding divs or maybe something takes a bit long for you to do you need to give the person your working for an idea of what and why you may take long to get your website polished.

Explanation:

Answer 2

Answer:

B. final deadlines

Explanation:

edg 2021 (got 100%)


Related Questions

which file access access flag do you use to open a file when you want all output written to the end of file's contents

Answers

Answer:

ios::app

Explanation:

Choose a video game that you enjoy playing and discuss its game mechanics. Can you identify any game mechanics that your game has that were not mentioned in the unit?

Answers

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

Explanation:

meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow meow em

What is the most likely reason for protecting a worksheet?

to track all changes made by editors to a worksheet
to stamp the worksheet with an individual’s information
to prevent email programs from sending the worksheet
to prevent unauthorized users from modifying the worksheet

Answers

Answer: D, to prevent unauthorized users from modifying the worksheet.

Explanation:

Answer:

D. to prevent unauthorized users from modifying the worksheet

Explanation:

hope this helps :)

prepare a short report of some technological devices??
please help me brainliest​

Answers

Answer:

Technology is the most useful form of science for the general population. In simple words, technology is when we take the concepts of science and transform them into gadgets and devices that are useful to us as human beings. When we look around us, almost everything is a result of or a form of technology.

For example, the device you are using right now is a form of technology made for communication, or the refrigerator in your kitchen is a use of science that helps to keep your food fresh and cool. With these examples, we see how dependent we are on technology and how important it is for us in our daily lives.

It isn’t easy to imagine our lives without using any form of technology. For the smallest of communications, we tend to turn to our mobile phones. Even most of the food we eat is packaged in factories using various technologies. Thus, imagining a life without technology is impossible. It is not only a fact of life but also a necessity for all of us.

In fact, the smartphone, that is, a mobile phone which can connect to the internet, is becoming one of the fastest-growing and most accessible forms of technology around the world. On a smartphone, you can click photographs, browse the internet, listen to music, and use social media. With the advent of smartphone technology, the practical purpose of not only communicating with your friends is met, but also so many others, as mentioned.

Thus, in today’s world, the importance of technology becomes more and more as the years pass. Scientists have done so much to advance humans using technology, and we still have a long way to go.

Explanation:

You are welcome! ;D

WILL MARK A BRAINLIEST!!! PLS HELP!!!




Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

And if you ask me how I'm feeling

Don't tell me you're too blind to see

We want to simulate constantly flipping a coin until we get 3 heads in a row. What kind of loop should we use

Answers

There are different types of loops that are used in computer programming. The kind of of loop that is suitable is the

while loop.

In computer programming languages, a while loop is simply known to be a control flow statement that gives code to be executed everytime based on a given Boolean condition.

The while loop can simply be said to be a repeating if statement.

It used to repeat a particular block of code in any number of times, until a said point or condition is met.

When used in C programming, it often in repeated manner executes a target statement.

Learn more from

https://brainly.com/question/21298406

Which of the following is a type of equation which returns a value such as TRUE or
FALSE?

A. Argument
B. Expression
C. Nest
D. Control

Answers

Answer:

C

Explanation:

True HOPE THIS HELPS BOY/GURL AH

The type of equation which returns a value such as TRUE or FALSE is logical.

Which formula gives the logical value in the form of true or false?

A logical value is known to be The TRUE and FALSE functions

An example is if you type “=TRUE()” into a cell, it is said to often return the value TRUE and when you type “=FALSE()” it will also return as FALSE.

Learn more about equation  from

https://brainly.com/question/2972832

b. A customer is transferring $2500 from one account to another on Thursday, 4 January 2018. After clicking the next button, an error message is shown.
i.State ONE factor that could have led to an error caused by the customer.

ii.TWO factors that could have led to an error caused by the technology

answers please ​

Answers

Answer:

b

Explanation:

"Depression is being colorblind and constantly told how colorful the world is.”

Answers

Depression is when they tell you how good it is to walk but you can’t walk

Which Amazon device can be used to control smart devices (such as lights) throughout a home using voice commands

Answers

Answer:

Alexa device

Explanation:

You can build smart home and other products that customers from millions of Alexa devices with just their voice .

which one of the following is not a barrier to effective communication?
A physical barrier
B linguistic barriers
C interpersonal barriers
D subjective barrier​

Answers

answer correct:B. ,,,,,,,,,,,,,,,,,,,

The option that is not a barrier to effective communication is D. subjective barrier.

It should be noted that barriers to communication simply means the impediments that can affect effective communication.

Some of the barriers to communication include physical barrier, linguistic barriers, and interpersonal barriers. It should be noted that a subjective barrier isn't a barrier.

Read related link on:

https://brainly.com/question/25718682

I am a device which is used to scan characters printed in magnetic ink​

Answers

Answer:

scanner is right answer or

What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;

Answers

Answer:

The output of count would be 1.

Explanation:

The first if statement is true. Since 10 > 5

The second if statement is true. Since 20 > 5

So,

count ++;  // That increments the variable count by 1

the else statement is not provoked since the if statements were correct.

Define cyber law with its area ​

Answers

Answer:

Cyberlaw is the area of law that deals with the Internet's relationship to technological and electronic elements

Different areas of cyber law are: Computer Crime, Cyberstalking, Intellectual Property, Searching and Seizing Computers and Data Protection adn Privacy.

Element of Ghanaian Culture that bind the people together​

Answers

[tex]⟹[/tex]

For example, social values, religion, morals, political values, economics and aesthetic values all contribute to African Culture. Expressions of culture are abundant within Africa, with large amounts of cultural diversity being found not only across different countries but also within single countries.

Ghanaians are able to express their culture through marriage, dressing, music, festivals, religion, occupation etc. Here, the "enstoolment" and "enskinment" processes of the various ethnic groups differ.

Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

What are the Basic elements of culture in Ghana?

The major elements of culture are said to be:

SymbolsLanguage etc.

Note that Language is one effective social interaction that binds Ghanaians together.

Therefore,Element of Ghanaian Culture that bind the people together​ are:

Language Their Artifacts Norms and traditions Religion Work, etc.

Learn more about culture from

https://brainly.com/question/25010777

#SPJ6

A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.

Answers

Answer:

A posture assessment. :3

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. (1pts) Question 34 - A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital. systems analyst chief information security officer chief security officer network administrator server administrator

Answers

Answer:

1. CSO (Chief Security Officer)

2. Network Admin

Explanation:

Hope this helps!!! :))

Shad has been finding himself unable to focus lately. Sometimes, he feels a knot in his stomach accompanied by nausea. As a result, he rarely has an appetite and is eating less than he should. These symptoms coincided with Shad being selected for the lead role in the school play, which now adds a new responsibility to an already challenging academic schedule and part-time job. What might be an effective strategy for Shad to manage this stress? Add daily workouts to his schedule, at least 20 minutes each, to increase his energy and reboot his focus on his own health. Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments. Change his options for meals and select more appealing "comfort" foods that will make him enjoy eating again and increase his appetite. Quit the school play so that he can return to a schedule that is more manageable and will cause him less stress and anxiety.

Answers

Answer: change the food he eats to a comfort food so that he eats more

Answer:

The answer to this question is **Assess the amount of time needed to fulfill all his responsibilities and create a schedule to prioritize and organize commitments.

Explanation:

This answer makes sense because Shad wanted the the lead role, so he just needs to organize his other responsibilities and create a schedule that works without being stressed. Time management.

When you declare a method, you also need to provide the method ______________, which consists of statements that are executed when the method is called.

Answers

When you declare a method, you also need to provide the method body, which consists of statements that are executed when the method is called.

Hope this helps!

A data dictionary is also known as ________. Group of answer choices a data warehouse clickstream data a data mart ubiquitous computing a metadata repository

Answers

Answer:

A data dictionary is also known as metadata repository.

What are some positive and negative impacts of computer science changing how we work, where we work and when we work?​

Answers

Answer:

Using those tools, computer science allows us to predict hurricanes, tornadoes, or even the outbreak of a potentially fatal disease. It can even be used to predict human behavior, which can help prevent crimes. Computer science can provide us with some life-saving tools and work.

Explanation:

During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.

Answers

Answer:

developed and tested.

Explanation:

True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.

Answers

Answer:

True

Just look it up and put quizlet at the end of your question youll find it.

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

The first step of the Data Encryption Standard (DES) involves breaking the plaintext into blocks of ______.

Answers

Answer:

64 bits

Explanation:

DES uses block encryption

Suppression of politically or socially unacceptable co
O backlinks
O compress
O forum
O censorship

Answers

Answer:

censorship

Explanation:

censorship means to block out something that is against the rules, to silence some sort of message/comments. so the answer is censorship

In disc brakes, pads are forced against the of a brake disc​

Answers

Answer:

Explanation:

It's the surface the brake pads contact. When you step on the brakes, pressurized brake fluid pushes against the pistons inside the caliper, forcing the brake pads against the rotor. As the brake pads press against both sides of the disc, the friction stops the wheel's rotation.

Debug big tower can someone help me

Answers

Answer:

2

Explanation:

2 is because that what i think

Answer:its c

Explanation:

because thts wht i thinl

A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the host reboots or the us

Answers

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of compromise include log-in red flags, unusual outbound network traffic.

Read related link on:

https://brainly.com/question/25522987

Other Questions
Drag steps and expressions into place to explain and show how to evaluate xy for x=3 and y=9. A galaxy spectrum has a redshift of 70,000 km per second. If the Hubble constant is 70 km per second per Mpc (megaparsec), how far away from us in this galaxy How is the wavelength of a sound affected when (a) a sound source moves toward a stationary observer and (b) the observer moves away from a stationary sound source Please help me out !! Asap help me pls (if u don't help and just want points i will report) Please help quick! Thanks! Help !!!!!!!!!!!!!!!!!!!! p l s h e l p m eMatch the unknown entries in the two matrices with their correct values m down. . TEST YOURSELF Fill in the blanks. (a) A cell is the basic unit of ........... (b) The outer covering of a plant cell is called (c) The jelly-like fluid found between the plasma membrane nucleus is called ........ d) are fluid-filled spaces. e) Plastids are absent in .... cells. Lysosomes are found in .... ...... cells only. en Graded Science and Environment Book 7 PLEASE HELP ME ASAPP After a natural disaster, police see a rise in crime because people are out of their normal routine. This is an example of social disorganization theory. A. True B. False Simplify -3(xy + 2y) + 5y - x. Read the excerpt from "Exploring Mars.Stories about the Mars rat spread. It was hard to tell who was serious and who was joking. Some people said the photo was proof of extraterrestrial life.The underlined sentence can best be described asA :the topic of this paragraph.B: the central idea of this paragraph.C: a big idea for the topic.D: a supporting detail for the central idea. Look at attached photo. Will give brainiest to correct answer. Trigonometry. During a biology lab you are asked to look at an animal anda bacterial cell under a microscope and document whatcomponents they both share in common. Which of thefollowing is NOT a feature that all cells have in common?1.Dna2.cell membrane3.cell wall4.cytoplasm Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong). 2: When passing another vehicle, you are allowed to exceed the speed limit by?a) O 10 mph.b) O 5 mph.c) O 3 mph.d) O 0 mph. Alex washed 10 1/2 windows in 3/4 hour. At this rate, how many windows can he wash in one hour? if you saw a man stealing food and then giving it to a homeless person . what would you do? explain why What different genetics practices are used in agriculture, especially related to animals? Think particularly about advances in biotechnology that are used to manipulate animal genetics. How can these practices be used to increase the probability of new organisms having specific traits compared to natural breeding? Cessation of breathing is called