Critical Thinking QuestionsCase 2-1You are planning a new small business Web site and are considering the images that you want to add to pages at the site. You discuss your plans with two of your classmates, Jim and Steve.You also discuss the importance of images at your site with Jim and Steve. After the discussion, you decide to ____.
a. add as many images as you can find, because most site visitors prefer images to textc. take a class on creating a neat company logo using a graphics design programb. select a few relevant images that help convey your site's messaged. forego adding images, the text is what is most important to visitors
What will be an ideal response?
Answer: B
Computer Science & Information Technology
You might also like to view...
What does this code do?
void PickRandomNumbers() { int intNumber1; double dblNumber; int intNumber2; Random objRandom = new Random(); intNumber1 = objRandom.Next(); dblNumber = 5 * objRandom.NextDouble(); intNumber2 = objRandom.Next( 1, 10 ); lblInteger1.Text = Convert.ToString( intNumber1 ); lblDouble1.Text = Convert.ToString( dblNumber ); lblInteger2.Text = Convert.ToString( intNumber2 ); } // end method PickRandomNumbers
Computer Science & Information Technology
Which of the following is an example of a Level 3 incident?
A. Malware detected on multiple systems B. User's excessive use of bandwidth and resources C. Compromise of any company web site or company presence D. Compromise or suspected compromise of protected customer information
Computer Science & Information Technology
Which command is used to compute a checksum using the SHA1 algorithm?
A. md5sum B. checksum C. gpg D. sha1sum
Computer Science & Information Technology
When a device that uses the 802.11n standard connects to a router that uses the 802.11ac standard, data will be transmitted between the two using the 802.11________ standard
Fill in the blank(s) with correct word
Computer Science & Information Technology