answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natulia [17]
2 years ago
15

Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w

ants to represent content and a banner for the home page. What should she use? Isabel should use a to show where the content and banner will go
Computers and Technology
2 answers:
vladimir2022 [97]2 years ago
7 0

Answer:

Wireframing can be of varying levels, including low fidelity and high fidelity.

If your Wireframe is low fidelity then you can add placeholders like a cross on the banner and Lorem ipsum text in the content section.

If your Wireframe is high fidelity then you should add a sample image on the banner, and actual text in the content section.

Explanation:

Juli2301 [7.4K]2 years ago
3 0

Answer: Filler content

Explanation: I think what the question is getting at is using filler content. This includes filler images and sample text. Once the website is all set up, the filler content is replaced with the actual content.

You might be interested in
How efficient would a 6-bit code be in asynchronous transmission if it had 1 parity bit, 1 start bit, and 2 stop bits?
Lana71 [14]
How efficient well if we are transmitting 6bits and we need 10 to transmit the 6 bits that would be 6/10 = .6 = 60% efficient.
7 0
1 year ago
Define a new object in variable painter that has properties "name" storing "Vincent van Gogh"; "artworks" storing "The Starry Ni
trapecia [35]

Answer:

painter = {'name' : "Vincent van Gogh", 'artworks': ["The Starry Night","Irises","The Potato Eaters"],'bornDate': "March 30, 1853", 'eyeColor': "July 29, 1890", 'diedDate': "July 29, 1890"} #this is a code which holds the questions defined value in a painter variable.

Explanation:

  • The above question wants to declare a variable that is in the form of a key and value pair.
  • The above question states to define name, artworks,eyeColor, and dieddate as a key and the other is defined as a value.
  • when a user wants to access the whole dictionary then he can do with the help of the painter variable.
  • But when he wants to access the value of any particular key, then he can do it with the help of the key name as "painter[keyname]".

6 0
2 years ago
The major result of treating 1-butyne with 6M aqueous NaOH would be:_______.A. the production of an alkene.B. the production of
andriy [413]

Answer:

D. nothing, as the alkyne would not react to an appreciable extent.

Explanation:

Nothing, as the alkyne would not react to an appreciable extent.

6 0
1 year ago
Can you find the reason that the following pseudocode function does not return the value indicated in the comments? // The calcD
Alexus [3.1K]

Answer:

see explaination

Explanation:

Function Real calcDiscountPrice(Real price, Real percentage) // Calculate the discount.

Declare Real discount= (price * percentage) / 100.0 // Subtract the discount from the price.

//dividing by 100.0 because of % concept

Declare Real discountPrice = price - discount // Return the discount price.

Return discount End Function

5 0
1 year ago
The OSI security architecture provides a systematic framework for defining security attacks, mechanisms, and services. True or F
Alex Ar [27]

Answer:

True is the correct answer for the above question

Explanation:

  • The OSI security architecture is a security framework that is used to secure the data packets when it is going to transfer on the internet for communication.
  • It is used to define the security rules and mechanism which need to secure the data packets.
  • It mainly focuses on Security services, Security attacks, Security mechanisms.
  • The above question-statement states about the framework which defines the security mechanism to secure from the attacks are known as OSI Security architecture which is the correct statement which is described above. Hence True is the correct answer.
3 0
2 years ago
Other questions:
  • Jack is an accountant. He can't access the spreadsheet software, which is installed on the server. What should Jack do?
    5·2 answers
  • PLEASE HELP!! WILL GIVE BRAINLIEST!!
    15·2 answers
  • Suppose that a 10-mb file is stored on a disk on the same track (track 50) in consecutive sectors. the disk arm is currently sit
    13·1 answer
  • Manny is a personal trainer. He gives his client an endurance test each week. He would like to illustrate how much the client ha
    7·2 answers
  • When your tire blows out in the middle of a drive, you should _____. A. let go of the steering wheel B. pump the brakes immediat
    13·2 answers
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    6·1 answer
  • Match the vocabulary word to the accurate definition. A software program that enables you to search for, interact with, and retr
    5·2 answers
  • Write a client program that writes a struct with a privateFIFO name (call it FIFO_XXXX, where XXXX is the pid that you got from
    11·1 answer
  • Which of the following could NOT be represented by a boolean variable?
    8·1 answer
  • A chain of dry-cleaning outlets wants to improve its operations by using data from
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!