A designer creates a mockup of a website homepage for a youth services nonprofit. They incorporate elements that add hierarchy to the design, make text easy to read, and add visual style. What visual design element are they using?

Typography

Iconography

Layouts

Symbology

Answers

Answer 1

Since the designer creates a mockup of a website homepage for a youth services nonprofit, the visual design element that they using is known to be called  Layouts.

What in web design is a mockup?

An application or web page mockup is seen as a kind of a  static design that includes a lot  of the final design elements but is said to be not functional.

Note that A mockup often contains some placeholder data and is less polished than a live page. It is found to be helpful to break down each element of the definition.

Through the use of  website mockup can help you realize your vision and decide on design concepts before developers begin to work. A sketch is the first step in the web design process before moving on to a wireframe.

Therefore, Since the designer creates a mockup of a website homepage for a youth services nonprofit, the visual design element that they using is known to be called  Layouts.

Learn more about visual design element from

https://brainly.com/question/19584310
#SPJ1


Related Questions

Describe what happens when you add an additional bit to a binary number in terms of the amount of data (combinations) it can store.

Answers

Answer:

You double the amount of combinations.

Explanation:

Each bit doubles the number of combinations.

n bits = 2ⁿ combinations

n+1 bits = 2ⁿ⁺¹ = 2·2ⁿ

The internet allows you quick access to research and digital media what do you need to do if you want to use someone’s else’s work?

Answers

Answer:

You need to cite someone else's work

Explanation:

Which of these is an example of an input device?
(1 point)
O a mouse
O a screen
O a printer
O a 3-D printer

Answers

A mouse is an input device.

what is computer? where it is used?​

Answers

Answer:

it is an electronic device for storing and processing data and it is used at homes schools business organizations.

Explanation:

brainliest

why is hard disk called random access medium​

Answers

RAM is called “random access” because any storage location on the computer can be accessed directly (as opposed to randomly). Hard drives, for instance, are organized in a way that allows the user to store and access information easily by referencing specific locations on the hard drive's platters.

20. Electricians will sometimes call
"disconnects" or a "disconnecting means."
A) O Three-pronged plugs
B) O Switches
c)O Electrical cords
D) C Two-pronged plugs

Answers

Electricians will sometimes call "disconnects" or a "disconnecting meaning option B)  Switches.

What exactly do electricians do?

An Electricians are  known to be people who are responsible for the work of repairing, installing as well as  maintaining control systems, lighting, communications, and others.

Note that Electricians will sometimes call the term "disconnects" to a person to off the  Switches.

Hence, Electricians will sometimes call "disconnects" or a "disconnecting meaning option B)  Switches.

Learn more about Electricians  from

https://brainly.com/question/24786034

#SPJ1

Which virus is also known as hybrid virus ?​

Answers

Answer:

A multipartite virus

Explanation:

Which of the following are types of containers that can be used in Windows Server 2016?

Answers

Answer:

Windows Server Container and Hyper-V Container. They differ mainly in the degree of isolation they provide. Windows Server Container uses process and namespace isolation technology to isolate applications.

Explanation:

window server 2016 support two types of container nearly

diffention of window vista

Answers

A significant update to Microsoft's Windows NT operating system is Windows Vista. The longest gap between versions of a Microsoft Windows desktop operating system at the time, Windows XP, which was launched five years prior, was directly replaced by it.

what's drawing toolbar​

Answers

Answer:

The drawing toolbar, a feature in Microsoft Word, is a collection of many tools to draw and colour shapes, add text effects, create text boxes, and add graphics with colours within a Word document. In addition, users could choose from pre-drawn shapes, add clip art or draw shapes as desired.

OBJP4 Self-Check 1.2: binary1
Language/Type:
Author:
Java basics binary numbers
Marty Stepp (on 2016/09/08)
Convert each of the following decimal numbers into its equivalent binary number:
6
44
72
131

Answers

Answer:

6 = 0110

44 = 101100

72 = 1001000

131 = 10000011

Explanation:

You can use the windows calculator in programmer mode to make this conversion easily.

If you want to do it by hand, here's one way to do it.

1. Write from right to left.

2. If your number is even, write down a 0.

3. If your number is odd, write down a 1 and subtract 1 from it.

4. Divide your number by 2.

5. If number not 0, go to step 2.

1. The type of browser that allows you to access audio and video content is known as A). Graphic based browser B) Graphic browser Text browser based browser Text​

Answers

The type of browser that allows you to access audio and video content is known as  Text browser.

What is web browser in HTML?

The web browser is known to be a kind of an application software that is made to look through www (World Wide Web).

It is one that helps to give an interface between the server as well as the client and often make  requests to the server for web documents.

Therefore, The type of browser that allows you to access audio and video content is known as  Text browser.

Learn more about Web Browser? from

https://brainly.com/question/22650550
#SPJ1

What are phone lines that are leased to customers at a fraction of their data-carrying capacity
but at a lower price?
cable
fiber-optic cable
T-line
packet switch

Answers

Answer:

hdkkkkkaixnr w9fjr fje9rjjb

emekroo

Activity
Perform an online search and identify the tools for system management. Describe the features/functions of any three system management tools

Answers

The three system management tools

Hardware inventories.Software inventory and installation.Anti-virus and anti-malware

What are the function of hardware features?

The feature and functions of inventory management is that they are  said to be tools that are used to tell or know the right amount and type of input products, as well as the products in process and those that are finished products.

Note that it helps in the facilitating of any production and sales operations.

Therefore, The three system management tools

Hardware inventories.Software inventory and installation.Anti-virus and anti-malware

Learn more about  management tools from

https://brainly.com/question/24662469
#SPJ1

The reason that many of the innovations of the twenty-first century is coming to pass is the result of
O more computer scientists.
O better computer components.
O quantum computers.
O better operating systems.

Answers

The reason that many of the innovations of the twenty-first century is coming to pass is the result of better operating systems.

Why did technology advance so fast in the 21st century?

The use of Technology as well as Technological evolution is one that has increase a lot exponentially.

This is due to the fact that each generation of technology is one that often makes better  over the last, the rate of progress is one that is different from version to version and it is one that do speeds up.

Therefore,  a better operating system tends to make innovation to be more faster and so. the reason that many of the innovations of the twenty-first century is coming to pass is the result of better operating systems.

Hence, option d is correct.

Learn more about operating systems from

https://brainly.com/question/22811693
#SPJ1

what is the entity relationship model?

Answers

also known as an entity relationship model, its a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.

As the complexity of a network increases, the possibility of security breaches decreases. is this true or false

Answers

As the complexity of a network increases, the possibility of security breaches decreases is a false statement.

What is the complexity of a network?

Network complexity is known to be a term that connote the series of nodes and alternative paths that is said to often exist inside of a computer network.

A network is seen to be complex due to the nature of its functions as it is known to be often multipurpose in nature.

It is one that is seen as the different kinds  of communication media, communications equipment, as well as the protocols, hardware and software applications that can be located in the network.

Therefore, As the complexity of a network increases, the possibility of security breaches decreases is a false statement.

Learn more about security breaches from

https://brainly.com/question/24956493
#SPJ1

difference between iso 27002 and nist 800-53

Answers

The 20 families of NIST 800-53 rev5 security controls (ISO went from fourteen (14) chapters in 2013 to three (3) sections in 2022).

What Is NIST CSF?

An optional collection of suggestions for managing and lowering cybersecurity risks are published by the National Institute of Standards and Technology (NIST).

The difference between iso 27002 and NIST 800-53

ISO 27002 is effectively a subclass of NIST 800-53, with its cybersecurity controls falling under the twenty (20) families of NIST 800-53 rev5 security controls (ISO went from fourteen (14) chapters in 2013 to three (3) sections in 2022).

Thus, the 20 families of NIST 800-53 rev5 security controls (ISO went from fourteen (14) chapters in 2013 to three (3) sections in 2022).

Learn more about the NIST CSF here:

https://brainly.com/question/15682090

#SPJ1

List two (2) important factors which should be considered when merging documents

Answers

Answer:

Cash vs. ...

Impact on Pro-forma EPS and Ownership. ...

Impact on Credit Statistics. ...

Purchase Price Allocation. ...

New Depreciation and Amortization from Write-Ups. ...

Creation of Goodwill. ...

Asset Sale. ...

Stock Sale.

Explanation:

These are just a couple of examples, hope this maybe helped :)

Computing Systems Unit Test
Computing Systems Unit Test
Define the three overarching domains that contain application software system software and hardware layers along with the
of abstraction in each and explain in detail how each of these layers, whether software or hardware, interacts with the
hers Explain your answer in 3-5 sentences

Answers

Explanation:

how ubuntu being practiced in your community?

Do you believe that software manufacturers should be tolerant of the practice of software piracy in third-world countries to allow these countries an opportunity to move more quickly into the information age? Why or why not? What would the benefits and disadvantages of this be?​

Answers

Answer:

I do not believe that software manufacturers should be tolerant of the practice of software piracy in third-world countries. I believe that this would be a disservice to the software manufacturers, as well as to the countries themselves.

The benefits of software piracy are that it allows countries to have access to software that they would otherwise be unable to afford. However, the disadvantages are that it encourages people to pirate software instead of buying it, which hurts the software industry. It also means that people in these countries are using software that is not licensed, which could lead to security and stability issues.

Explanation:

Hope this helps!

Carla wants to learn more about how CPUs work. Which of these videos would be the MOST useful to her?
(1 point)
O "How Input Devices Work™
O "Storage Devices for Beginners"
O "Computer Output Devices 101"
O "Introduction to Computer Processing"

Answers

Answer:

it works with atoms

batteries

keyboard

You can use the Cut and Paste commands to move files from one location to another.
er:
a O True
b O False

Answers

Answer:

true

Explanation:

What method is used to ensure proper ventilation in a server room?
Internal cooling systems
Maintaining a steady temperature
Hot and cold aisles
Internal fans

Answers

A method which is used to ensure proper ventilation in a server room is: C. Hot and cold aisles.

What is a server?

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

What is a server room?

In Computer technology, a server room is also referred to as a data center and it can be defined as a dedicated space (room) that is typically used for keeping a collection of servers and other network devices.

Generally, hot and cold aisles are often used in server rooms (data centers) to ensure proper ventilation, especially by removing hot air and pushing cool air into the server room.

Read more on hot and cold aisles here: https://brainly.com/question/13860889

#SPJ1

Ashley has many interests. She likes to read, listen to music, and play soccer with her
friends. But her favorite thing to do is to go camping with her family. She likes camping
because she gets to spend time with her mom and dad and little brother. She also loves
being outside and sleeping in a tent. She likes cooking over a campfire and roasting
marshmallows. Camping is a great way to get fresh air and exercise.
2. Which of the following is a supporting detail about Ashley from the
paragraph that gives the best support for the main idea?
OShe likes all kinds of music.
OShe likes weekends.
OShe likes cooking over a campfire.
OShe likes her little brother.
(1 point)

Answers

Answer:

c. she likes cooking over a campfire

Explanation:

it says it right in the story

While many networking jobs will list a bachelor's degree as their minimum
requirement, but many will actually accept an associate's degree or trade school
training.
True
False

Answers

Answer:ture

Explanation: I just took the test and got the question right

Answer: True

Explanation: I just took the test

Explain how would you label each part of the computer?​

Answers

Answer:

Explanation:

you can simply label computer each part by showing the marking on them using numbers and writing below like 1. for CPU

Imagine you have just learned a new and more effective way to complete a task at home or work. Now, you must teach this technique to a friend or coworker, but that person is resistant to learning a new way of doing things. Explain how you would convince them to practice agility and embrace this new, more effective method.

Answers

if a person is resistant to learning a new way of doing things, one can  practice agility by

Do Implement the changeMake a dialogue with one's Unconscious. Free you mind to learn.

How can a person practice agility?

A person can be able to improve in their agility by carrying out some   agility tests as well as the act of incorporating any form of  specific drills into their workouts.

An example, is the act of  cutting drilling, agility ladder drills, and others,

A  training that tends to help in the area of agility are any form of exercises  such as sideways shuffles, skipping, and others.

Therefore,  if a person is resistant to learning a new way of doing things, one can  practice agility by

Do Implement the changeMake a dialogue with one's Unconscious. Free you mind to learn.

Learn more about agility from

https://brainly.com/question/15762653
#SPJ1

Question 1 The Movie class includes a toString method. Suppose another class is using the Movie class and has declared m as a Movie and initialized m. Which TWO of the following would use the toString method correctly to print out information about the movie m? 1 point 1 System.out.println(m); 1 System.out.println(toString()); 1 System.out.println(m.toString); 1

Answers

The two print statement which would use the toString method correctly to print out information about the movie m are:

System.out.println(toString()); 1.System.out.println(m.toString()); 1.

What is a method?

In Computer programming, a method can be defined as a block of executable code (sets of instruction) that are written and used by programmers to break down a given problem into small but manageable fragments (pieces).

This ultimately implies that, methods are typically written and used by programmers to break down any complex problem into simple and manageable fragments (pieces) such as in modern programming languages, which comprises several predefined methods.

In conclusion, the "System.out.println(toString());1" and "System.out.println(m.toString()); 1" calls the toString() function which then returns the string representation of the object movie.

Read more on print methods here: https://brainly.com/question/19594241

#SPJ1

Can any one make her/his own 5 E-learning questions related to any subject. Plss don't copy from any website.​

Answers

Answer:

Your pupils will be totally engaged in learning if you use the 5E Approach while creating lesson plans. Your children will be inspired to share their learning with others and study ideas, concepts, and tactics together if you follow the 5 stages of engage, explore, explain, elaborate, and assess.

Explanation:

in my own words

Other Questions
When cleaning a microscope lens you should use only lens paper in order to avoid scratching the optics. a. true b. false How much of the food that you eat is unprocessed, unpackaged or locally grown? in michigan Write an inequality and then solve.9. A freight elevator can safely hold no morethan 2200 pounds. An elevator operator musttake 60-pound boxes to a storage area. If theoperator weighs 155 pounds, how many boxescan be safely moved at one time? a sporting event coordinator has 200 mini foam fingers she gives 2 foam fingers to each student in attendance. there are 26 left. how many students are in attendance? thank u Find the volume of a cube with a side that measures 0.01 cm. (Hint: V = s ). order of operations MCJoshua purchased a game card for the arcade for a total of $15. He played two basketball hoop games for $2.75 each and three rounds of air hockey for $1.25 each. How much did he have left on the game card? In the entrepreneurship method, ______ requires thinking about and analyzing existing information. i need help asap. plsss give me the right answer To say that economists use the scientific method means that they are using ___________. PLEASE HELP THIS IS SO CONFUSING TO ME!!!According to the American Sleep Disorders Association, the average teenager needs around 9.5 hours of sleep per night, possibly because of hormones that are critical. Yet studies show that teenagers generally get an average of only 7.4 hours a night or less. Calculate the number of seconds of sleep that an average teenager is lacking for the 180 days of school in one year. which of the following ordered pairs make this question true y=2x-4? How did industrialization in the United States affect the system of slavery? Judy Blume's career as an American writer spans four decades and includes many literary awards. She is most famous for her novels geared toward pre-teens. One notable example is Tales of a Fourth-Grade Nothing. However, Blume also has had success writing for an adult audience. Three of her novels for adults reached the New York Times best-seller list. In a 2008 interview Blume remarked, "I have so many stories left to tell!" By that time she had written nearly 30 novels. Judy Blume an exceptionally talented and productive American author.Which of the following lists represents text evidence pieces that all support the central idea in this paragraph?a: Four decades, many awards, best known for pre-teen novelsb: Many awards, can write for multiple audiences, 30 novelsc: Tales of a Fourth-Grade Nothing, best-seller list, interviewd: American writer, Tales of a Fourth-Grade Nothing, 30 novels At the development team meeting someone suggests building database queries dynamically from form fields on the login page. how do you respond? what do you use to support your position? what's the answer? It's difficult to understand and my teacher doesn't really teach. Which of these statements is true of fashion design and most other creative fields?Internships are rare because people believe certain skills can't be taught.Apprenticeships are essential to a long career.Even entry-level positions can be very competitive.Most positions offer high salaries and long-term stability. Two friends are playing with water balloons. They each start at the bucket of balloons and walk in opposite directions before tossing their balloons at each other. Joy walked 14 steps forward, and Shaunte walked 5 steps backwards. Which expression correctly represents the distance between the friends? 14 + |5| = 19 steps 14 + 5 = 19 steps |14| + |5| = 19 steps |14| + 5 = 19 steps What differentiable functions have an arc length on the interval [a,b] given by the following integrals? note that the answers are not unique. give all functions that satisfy the conditions. Not a work problem but me and my friend want to know what this means and the language its in( came from a secret admire) .hunak hadhih alfataat alati 'uhibuha wa'uriduha bishidat wa'ana 'ufakir biha fi waqt muta'akhir.Please help its for a friend!!! why were so many early civilizations along rivers? why is that significant/what does that show us?