Kiaan wants to give people who attend his presentation a printed copy of the slides. Instead of printing one slide on each piece of paper, he wants to print six slides on each piece of paper. Which setting should he select on the Print tab in Backstage view to do this?

Answers

Answer 1

Answer:

Under the Print Tab of the Backstage view of his presentation, Kiaan can print 6 slides on each piece of paper by selecting the "Full Page Slides" which is under settings.

Once that is done, he will be presented with an array of choices.

He is to select whether to print 6 pages/sheet vertically or horizontally under the "Handouts" section.

Thereafter, he can proceed to click on "Print".

Cheers!


Related Questions

Create a python program that will input their name and their age. It will show an output "Hi, {name} ! How are you? I know you are {age} old."

I WILL MARK YOU AS BRAINLIEST​

Answers

Answer:

age = 10

name = Cynthia

make an f string so the variables appear in the string. There are other ways to do this but I prefer f strings instead of using string concatenation. It causes problems adding 2 strings together most of the time.

print(f'Hi, {name} ! How are you? I know you are {age} old.')

the fibonacci sequence begins with 0 and then 1 follows. all subsequent values are the sum of the previous two, ex: 0, 1, 1, 2, 3, 5, 8, 13. complete the fibonacci() function, which has an index n as parameter and returns the nth value in the sequence. any negative index values should return -1. ex: if the input is: 7 the output is: fibonacci(7) is 13 note: use a for loop and do not use recursion.

Answers

The fibanocci sequence with the use of a for loop and do not use a recursion .

Program :

def fibonacci(num):

 if num < 0:

     print("-1")

 elif num == 0:

     return 0

 elif num == 1:

     return 1

 else:

     return fibonacci(num-1) + fibonacci(num-2)

if __name__ == '__main__':

  start_number = int(input())

  print(f'fibonacci({start_number}) is {fibonacci(start_number)}')

what is a Fibonacci sequence?

The Fibonacci series is a sequence of numbers (also known as Fibonacci numbers) in which each number is the sum of the two numbers before it, with the first two terms being '0' and '1'. The term '0' may have been omitted in earlier versions of the series. A Fibonacci series can thus be written as 0, 1, 1, 2, 3, 5, 8, 13, 21, 34,... As a result, every term can be calculated by adding the two terms preceding it.

Thus the code return the fibanocci series

To know more on fibanocci follow this link:

https://brainly.com/question/29764204

#SPJ4

5.19 LAB: Countdown until matching digits
PYTHON: Write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.

5.19 LAB: Countdown until matching digitsPYTHON: Write a program that takes in an integer in the range

Answers

Using the knowledge of computational language in python it is possible to write a code that write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.

Writting the code:

n = int(input())

if 20 <= n <= 98:

   while n % 11 != 0:

       print(n)

       n -= 1

   print(n)

else:

   print("Input must be 20-98")

See more about python at brainly.com/question/18502436

#SPJ1

5.19 LAB: Countdown until matching digitsPYTHON: Write a program that takes in an integer in the range

which three statements are true about purchase orders in qbo

Answers

Regarding QBO  , three claims are accurate: You can only shut individual lines on a buy order you establish, and Quickbooks Online closes purchase orders even when payment is not yet received in full. Purchase orders can only be created for inventory.

Why would you utilize QuickBooks purchase orders?

Make it simpler to track orders: An essential component of record keeping is the purchase order. You can quickly track your orders by generating a purchase order. Also, it's simple to verify that you got the right things when your order is delivered.

What exactly is a buy order and how do you utilize one?

Purchase orders are written instructions given by a buyer to a seller. They act as legally binding documentation of the goods/services and serve as a key tool for buyers by formalizing specifications and pricing.

To know more about QBO  visit:-

https://brainly.com/question/30591322

#SPJ1

Question:-

Which 3 statements are true about purchase orders in QuickBooks Online?(Select all that apply)

.You can only create purchase orders for inventory

.You can close individual lines on a purchase order

.You can add purchase orders to any type of purchase transaction

.QuickBooks Online closes purchase orders, even when not fully received

.You can add multiple purchase orders to one purchase transaction

give one major environmental and
one energy problem kenya faces as far as computer installations are concerned?​

Answers

One considerable predicament that Kenya encounters pertaining to the utilization of computers is managing electronic waste (e-waste).

Why is this a problem?

The mounting number of electronic devices and machines emphasizes upon responsibly discarding outdated or defective hardware in order to avoid environmental degradation.

E-waste harbors hazardous materials such as lead, mercury, and cadmium which can pollute soil and water resources, thereby risking human health and ecosystem sustainability.

Consequently, a significant energy drawback with computer use within Kenya pertains to the insufficiency or instability of electrical power supply.

Read more about computer installations here:

https://brainly.com/question/11430725

#SPJ1

20. Think about all the careers (example: teacher) you have learned about in this unit. List three careers and identify what the educational requirements are for each career. In addition, provide what high school subjects could help you prepare for these careers.

Answers

Answer:

Explanation:

Three careers and their educational requirements and recommended high school subjects are:

Nurse: To become a registered nurse (RN), you typically need to earn a Bachelor of Science in Nursing (BSN) degree from an accredited nursing program. Alternatively, you can become a licensed practical nurse (LPN) or licensed vocational nurse (LVN) with a diploma or certificate from an accredited program. High school subjects that can prepare you for a nursing career include biology, chemistry, and health sciences.

Software Developer: To become a software developer, you typically need a bachelor's degree in computer science, software engineering, or a related field. In addition, some employers may require or prefer candidates with a master's degree. High school subjects that can prepare you for a career in software development include computer science, mathematics, and physics.

Lawyer: To become a lawyer, you typically need to earn a Juris Doctor (JD) degree from an accredited law school and pass a state bar exam. High school subjects that can help you prepare for a legal career include history, government, and English.

In general, high school students who are interested in pursuing a specific career should focus on taking courses that will prepare them for the educational requirements of that career. Additionally, participating in extracurricular activities or internships related to the desired career can also be beneficial in gaining practical experience and developing relevant skills.

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Write down an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation.

Answers

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

What basic architecture do microcontrollers employ, what are the variations that emerge from that architecture? Mention some of the architectures.

Answers

Von Neumann or Harvard architectures are frequently used in microcontrollers, including modifications such as RISC, CISC, and DSP architectures. The ARM, PIC, AVR, and 8051 are some more architectures.

What differences exist in the architecture of microcontrollers?

Both von-Neumann architecture and Harvard architecture are common design models used by all MCs. They stand for two distinct methods of data transfer between the Processor and memory. "RISC MCs" are MCs with Harvard architecture. 'CISC microcontrollers' are MCs that use von Neumann's architecture.

What constitutes a microcontroller's fundamental architecture?

The Harvard architecture and von Neumann architecture, which each offer various ways of transmitting data between the processor and memory, can be used as the foundation for microcontroller design. A Harvard design allows for simultaneous transfers because the data bus and instruction are independent.

To know more about modifications visit:-

https://brainly.com/question/12951131

#SPJ1

10+2 is 12 but it said 13 im very confused can u please help mee

Answers

Mathematically, 10+2 is 12. So your answer is correct. However, if you are trying to write a code that adds 10 + 2, you may need to troubleshoot the code to find where the bug is.

What is troubleshooting?

Troubleshooting is described as the process through which programmers detect problems that arise inside a specific system. It exists at a higher level than debugging since it applies to many more aspects of the system.

As previously stated, debugging is a subset of troubleshooting. While debugging focuses on small, local instances that can be identified and fixed in a single session, troubleshooting is a holistic process that considers all of the components in a system, including team processes, and how they interact with one another.

Learn more about Math operations:
https://brainly.com/question/199119
#SPJ1



Every Java statement ends with: *

Period
Colon
Double quote
Semicolon

Answers

Answer:

semicolon is the answer

semi colon i did that test

Do my Twitter posts count as opinions or facts?

Answers

They count as opinions

Problem Description: Your programs run on a "chip", a CPU. This chip is manufactured on a silicon wafer, a very very thin circular slice of purified silicon with some impurities added to it. A silicon wafer usually has many chips (or dies) created on its surface by automated tools and robots, then at one point in the process the wafer is sliced apart to make individual CPUs (or dies). Your program will do some calculations about these wafers and chips. Follow this link for more information. Given the diameter of the silicon wafer in millimeters
(mm)
, the area of the wafer in square millimeters
(mm 2
) and the area of one individual chip (die) in square millimeters
(mm 2
)
, this equation will calculate how many dies can be cut from the wafer. The equation corrects for wasted material near the edges. Note that it should give an integer number of dies (you don't want to cut half a die). Note that the area of the wafer is NOT an input value. You will have to calculate the area of the wafer given the diameter. If you need to, look up the formula for the area of a circle.
DiesperWafer = dieArea waferArea ​
− 2 dieArea ​
π waferDiameter ​
Where: DiesPerWafer (the number of dies cut from a wafer) = the answer waferDiameter
=
the diameter of the wafer
(mm)
dieArea
=
the chip size
(mm 2
)
waferArea
=
area of the wafer
(mm 2
)
(must be calculated ahead of time) Sample Run 1 What is the diameter of the wafer? (mm)
255.5
What is the area of a single die?
(mm ∧
2)17.0
From a wafer with area
51270.99
square millimeters you can cut 2878 dies. This does not take into account defective dies, alignment markings and test sites on the wafer's surface. Sample Run 2 What is the diameter of the wafer? (mm) 400 What is the area of a single die?
(mm ∧
2)25.0
From a wafer with area
125663.71
square millimeters you can cut 4848 dies. This does not take into account defective dies, alignment markings and test sites on the wafer's surface. Test Plan ( 30 points) Part of our grading process will be to run your program with these cases. Submit screenshots to demonstrate results for A., B., and C. No points would be given if there are no screenshots of the test cases. To get full credit, your program must produce the right results for all test cases below and you must provide screenshots. Test cases are worth 5 points each. (20 points) Design: Write the design for the program in pseudocode as comments and submit it to Icollege as "design.py". NOTE that we do not want Python code in this file! Just comments which can be used in the implementation later. - Give the three P's (purpose, pre- and post-conditions) and author info as usual. The steps do NOT have to be numbered. - \# supply program prolog (3 P's) - \# main function - \# Display introductory message - Your design here (60 points) Implementation: Write a Python program to implement your design. Start by making a copy of the Python file you have that has the design in it (possibly modified with improvements you or your partner came up with) and write your Python code between the commented lines of the design. Make sure you eliminate any syntax and semantics errors. Here is where test cases are important! Name this file wafer_FirstName_LastName.py. For instance, if your name is John Doe, the file name should be wafer_John_Doe.py Specifications for the implementation - This program uses input; you will have to prompt the user for the inputs. The inputs can be assumed to be floats. - You must use at least one function and one constant from the math library. - Format the calculated wafer area to 2 places. - You should have a main function and all code except for the import statement should be inside the main function definition. - Make sure you format the lines of the output as described. The line breaks and the punctuation should be as shown. The output messages should be exactly as given.

Answers

According to the question, the program will be:

# Main Function

def main():

   # Display introductory message

   print("This program will calculate how many dies can be cut from a wafer given its diameter and die area in millimeters.")

   # Get input from user

   wafer_diameter = float(input("What is the diameter of the wafer? (mm): "))

   die_area = float(input("What is the area of a single die? (mm^2): "))

   # Calculate the area of the wafer

   wafer_area = (wafer_diameter/2)**2 * 3.14159

   # Calculate the number of dies per wafer

   dies_per_wafer = die_area * wafer_area - 2 * die_area * 3.14159 * (wafer_diameter / 2)

   # Output the result

   print("From a wafer with area {:.2f} square millimeters you can cut {:.0f} dies. This does not take into account defective dies, alignment markings and test sites on the wafer's surface.".format(wafer_area, dies_per_wafer))

# Call main function

main()

What is program?

A program is a set of instructions given to a computer to perform a specific task. Programs may be written in any programming language, such as C, C++, Java, Python, etc. and can be compiled into an executable format for a specific type of computer. Programs typically contain data, algorithms, and control structures to perform a specific task or solve a specific problem.

To learn more about program

https://brainly.com/question/29621691

#SPJ1

How to start Microsoft acess​

Answers

Answer:

As with most Windows programs, Access can be executed by navigating the Start menu in the lower left-hand corner of the Windows Desktop. To start Access, click on the Start button, then the Programs menu, then move to the Microsoft Office menu and finally click on the Microsoft Access menu item.

How are actual rocket launches similar to how balloon rockets and canister rockets launch?

Answers

Answer: in a net force acting forward on the balloon thrust.The balloon flies forward under the influence of the thrust, and the air coming out of the back of the balloon is the equal and opposite reaction to the thrust. same goes for a rocket

Explanation:

hoped this helped

Chemical equations of Carbon + water​

Answers

Answer:

Aqueous carbon dioxide, CO2 (aq), reacts with water forming carbonic acid, H2CO3 (aq). Carbonic acid may loose protons to form bicarbonate, HCO3- , and carbonate, CO32-. In this case the proton is liberated to the water, decreasing pH. The complex chemical equilibria are described using two acid equilibrium equations.

PLS MARK AS BRAINLIEST

reate a class called Plane, to implement the functionality of the Airline Reservation System. Write an application that uses the Plane class and test its functionality. Write a method called CheckIn() as part of the Plane class to handle the check in process Prompts the user to enter 1 to select First Class Seat (Choice: 1) Prompts the user to enter 2 to select Economy Seat (Choice: 2) Assume there are only 5-seats for each First Class and Economy When all the seats are taken, display no more seats available for you selection Otherwise it displays the seat that was selected. Repeat until seats are filled in both sections Selections can be made from each class at any time.

Answers

43 if you forgot the 43

What is the purpose of application software

Answers

Answer:

Explanation:

type of computer program that performs a specific personal, educational, and business function. Each program is designed to assist the user with a particular process, which may be related to productivity, creativity, and/or communication.

Which type of evidence should victims collect to help officials catch cyber bullies ?

-home addresses
-birthdays
-social media
-usernames user
-passwords

Answers

Answer:

Social media

Explanation:

Social media and usernames user so that they can find them without any problem : D

what does an attacker need to do to use acquired user and account details from a users smart card

Answers

What an attacker needs to do to acquire user and account details from a user's smart card is to clone it.

What is cloning?

Cloning is the technique of producing an identical replica of another application program or object. The phrase can refer to an object, programming, or application that has similar functionality and behavior to another item or application program but does not include the actual source code from the relevant object or program. Cloning is also used to describe the operation of creating an identical replica of a directory file or disk, including any subdirectories or files included inside the disk or directory.

Cloning is the process of creating a genetically identical copy of a cell or an organism, and it is not just used for cyber theft. Cloning occurs frequently in nature. The duplication of any type of biological material for scientific studies, such as a chunk of DNA or a single cell, is known as "cloning" in the field of biomedical research.

learn more about Cloning at:

https://brainly.com/question/16155328

#SPJ1

The are two schools of ____________ are Symmetry and Asymmetry.

Answers

The two schools of design that encompass symmetry and asymmetry are known as symmetrical design and asymmetrical design.

Symmetrical design is characterized by the balanced distribution of visual elements on either side of a central axis. It follows a mirror-like reflection, where the elements on one side are replicated on the other side, creating a sense of equilibrium and harmony.

Symmetrical designs often evoke a sense of formality, stability, and order.

On the other hand, asymmetrical design embraces a more dynamic and informal approach. It involves the intentional placement of visual elements in an unbalanced manner, without strict adherence to a central axis.

Asymmetrical designs strive for a sense of visual interest and tension through the careful juxtaposition of elements with varying sizes, shapes, colors, and textures.

They create a more energetic and vibrant visual experience.

Both symmetrical and asymmetrical design approaches have their merits and are employed in various contexts. Symmetry is often used in formal settings, such as architecture, classical art, and traditional graphic design, to convey a sense of elegance and tradition.

Asymmetry, on the other hand, is commonly found in contemporary design, modern art, and advertising, where it adds a sense of dynamism and creativity.

In conclusion, the schools of symmetry and asymmetry represent distinct design approaches, with symmetrical design emphasizing balance and order, while asymmetrical design embraces a more dynamic and unbalanced aesthetic.

For more such questions on symmetry,click on

https://brainly.com/question/31547649

#SPJ8

Which device is connected to a port on a switch in order to receive network traffic?

Answers

Answer:

"Passive IDS" is the appropriate answer.

Explanation:

A framework that is designed mostly for monitoring and analyzing internet traffic operations and alerting a user or administrator about possible bugs, as well as disruptions, is known to be passive IDS.This IDS cannot carry out certain preventive as well as remedial processes as well as operations by itself.

Question 2 of 15
DMAIC and DMADV are methodologies of:
Select only one answer.
Six Sigma
PDCA
SPS
OPDSA

Answers

i know that this is the second one

What microphone is this

What microphone is this

Answers

Answer:

Thats looks like a Sennheiser Pro Audio Wireless Microphone System, Black (MKE600) .  also known as Sennheiser MKE 600

Where you can get it:

https://www.amazon.com/Sennheiser-MKE600-Camcorder-Shotgun-Microphone/dp/B00B0YPAYQ

Youre welcome. (pls give brainlest thanks)


You are reorganizing the drive on your computer. You move several files to a new folder located on the same partition. When you move the files to the new folder,
what happens to their permissions?

Answers

Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.

What is a VPN, and why do businesses use them?An encrypted connection between user devices and one or more servers is established by a virtual private network (VPN), a service that provides Internet security. A VPN can safely link a user to the internal network of a business or to the Internet at large. Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.  The ultimate objective in both situations is to keep web traffic, especially traffic with proprietary data, off the public Internet.

To Learn more about VPN refer to:

https://brainly.com/question/16632709

#SPJ9

Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.

What is a VPN, and why do businesses use them?An encrypted connection between user devices and one or more servers is established by a virtual private network (VPN), a service that provides Internet security.A VPN can safely link a user to the internal network of a business or to the Internet at large.Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.  The ultimate objective in both situations is to keep web traffic, especially traffic with proprietary data, off the public Internet.

To Learn more about VPN refer to:

brainly.com/question/16632709

#SPJ9

What happens if you have two values with no operator between them

Answers

In Computer programming, if you have two values that has no operator between them, you would experience a syntax error.

What is a syntax error?

A syntax error can be defined as a type of error that typically occurs due to mistakes in the source code of a program such as:

Spelling of words.Punctuation errorsIncorrect labelsSpacing

This ultimately implies that, a misplacement of punctuation or spacing in a command during programming that causes the source code of a program to stop running is most likely a syntax error.

In conclusion, we can infer and logically deduce that if you have two values that has no operator between them, you would experience a syntax error in computer programming.

Read more on computer programming here: brainly.com/question/25619349

#SPJ1

Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.

Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.

You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:

What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.

Answers

In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:

Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.

What is the Case Facts?

First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.

Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.

Learn more about affidavit from

https://brainly.com/question/30833464

#SPJ1

what portion of companies use social media to locate new employees?

A. About a third
B. About Half
C. About Two-Third
D. Nearly All

Answers

Most companies will CHECK over social media when hiring, but not all companies ADVERTISE or use social media to get employees. About a third of companies ADVERTISE over social media.

Compare Ethernet frames to other frames.


•Most frames use CRC, but Ethernet does not. •Most frames use a protocol called CSMA/CD.

•Ethernet frames generally do not have stop frames.

•Ethernet frames have more parts in their frame footers.

Answers

Most frames use crux and I can only do a couple

: "I have a customer who is very taciturn."

: "I have a customer who is very taciturn."

Answers

The client typically communicates in a reserved or silent manner

B. He won't speak with you.

Why are some customers taciturn?

People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.

The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.

Learn more about taciturn people here:

https://brainly.com/question/30094511

#SPJ1

PLS HELP WILL MARK BRAINLINESS AND 30 POINTS
In your own words in at least two paragraphs, explain why it is important, when developing a website, to create a sitemap and wireframe. Explain which process seems most important to you and why you feel most drawn to that process.

(i.e. paragraph one is why is it important and paragraph two is which process felt most important to you and why)

Answers

When creating a website, it is important to create a sitemap so that a search engine can find, crawl and index all of your website's content. a sitemap makes site creation much more efficient and simple. A sitemap also helps site developers (assuming you have any) understand the layout of your website, so that they can design according to your needs.

A wireframe is another important step in the web design process. Creating a website is like building a house. To build the house, you first need a foundation on which to build it upon. Without that foundation, the house will collapse. The same goes for a website. If you create a wireframe as a rough draft of your website before going through and adding final touches, the entire design process will become much easier. If you do not first create a wireframe, the design process will be considerably more difficult, and you are more likely to encounter problems later on.

To me, the wireframe is the most important due to the fact that is necessary in order to create a good website. In order to create a sitemap, you first need a rough outline of your website. Without that outline, creating a sitemap is impossible.

Other Questions
experiments suggest that practicing parts of a discrete task in isolation__________. What is the distance between W(3, 1) and X(-2,-5)? Round to the nearest tenth.10A. 61.0B. 3.3C. 2.2D. 7.8 Robert swims a lap in the pool. His coach graphs his distance from the starting block.A. Determine whether each graph is a function. Justify your answer.B. Construct Arguments - Which graph must be incorrect. Explain a about worker measure the mass of some sucrose as 0.947mg. covert that quality to grams and to kilograms if two temperatures differ by 25 degrees on Celsius scale, the difference of temperature on Fahrenheit scale is? the earth gets its heat from what source? Alex paid $3.59 for 1.35 pounds of chicken.To the nearest cent, how much did Alex pay per pound? What purpose do the seven basic file operations serve regarding a file?How are file types used to indicate the internal structure of a file? which station would be more likely to occur in the modern era than earlier periods of human history 18. Lab Summary - Explain how this experiment models a cell membrane. Use thefollowing terms in your explanation: selectively permeable, hypertonic, diffusion, indicator. If Shondra traveled the same number of miles each hour, how many miles did she travel in 4 hours? (T/F) foreign direct investment (fdi) occurs when a firm invests resources in business activities outside its home country. Antimony has two naturally occurring isotopes . The mass of antimony -121 is 120.904 amu and the mass of antimony -123 is 122.904 amu. Using the average mass from the periodic table, find the abundance of each isotope (Remember that the sum of the two abundances must be 100). is 3.254 rational or irrational Maryam is driving her car when she glances at the temperature displayed on her dashboard. It says that the temperature is currently 78 degrees outside. This temperature is called a ___. Suppose that the fed undertakes an open market purchase of $5 million worth of securities from a bank. if the required reserve ratio is 12%, what is the resulting change in checkable deposits (or the money supply), assuming that there are no cash leakages and that banks hold zero excess reserves? light is passed through a solution with a light path of 1 cm and the absorbance is recorded as 0.40. if the light passed through the same solution at the same wavelength and the light path is reduced to 2 cm, the absorbance should be: group of answer choices 80 20 60 40 Which inequality is best represented by this graph? laura goes for a cycle from her house to the post office 4km away work out laura's speed cycling to the post office CORBETTMATHS 2016 !life science review test so answer today, read everything before answering!(i have bad memory so i don't remember much of what the answers are well)Question: Maria and Sam were digging for worms. They wanted to go fishing. They collected about 20 worms in a pail. "Oh, those worms are so slimy!" Maria exclaimed.How would you describe the sentence: "Those worms are slimy?"what not to answer with: NO LINKS, QUESTIONS ON ANYTHING ELSE (LIKE WHY I ONE STAR; OUTSIDE OF BRAINLY QUESTION LINKS; LINKS), OR BLANK ANSWERS!answer choices below:A) It is a prediction.B) It is a qualitative observation.C) It is a quantitative observation.D) It is an inference about the worms.star amount meaning:1 star = links that aren't brainly question links and blank answers2 stars = brainly question links without an answer with them3 stars = wrong answer4 stars = close or explained incorrectly5 stars = correct in all ways