__________________ is a criterion in a document evaluation checklist that asks whether the layout of the information is consistent and helps guide the reader through the document.

Fill in the blank(s) with the appropriate word(s).


Form

Computer Science & Information Technology

You might also like to view...

Which one of the following recommendations applies to making the longest data sets go down the screen?

A. Structure your data. B. Make sure your data is entered accurately. C. Remember the rules of mathematical precedence. D. Use absolute and relative references appropriately.

Computer Science & Information Technology

What is the most specific device identification string?

A. HDID B. Driver ID C. GenID D. Hardware ID

Computer Science & Information Technology

One form of software theft is the theft of the software from software manufacturers, which is known as piracy. Because this has historically been rather easy to do, the practice has become very common. As a computer instructor you feel it is your responsibility to explain this practice to students through the use of some examples. ? Which of the following is NOT permissible under a single-user license agreement? a. Jamie installs Quark Xpress on a single computer.b. Christine leases her copy of Dreamweaver.c. Phuong-Dao makes one copy of Microsoft Office 2013 as a backup.d. Isaiah sells his copy of Adobe Photoshop CS6, having removed it from his computer first.

What will be an ideal response?

Computer Science & Information Technology

? Squidoo, as shown in the accompanying figure, and HubPages are platforms for ____ websites.

A. user-generated B. e-book C. trading partner D. order fulfillment

Computer Science & Information Technology