What is Adobe Dreamweaver ? What is it used for ? Name and describe its major components and features in detail​

Answers

Answer 1

Answer:

Part A

Adobe Dreamweaver is a computer application used for building websites and other types of web development, as well as mobile content development for both the intranet and the internet, on the Apple OS X and Windows Operating System Platforms

Part B

Adobe Dreamweaver is used for designing, building, and coding websites and mobile contents by developers and designers and by mobile content developers

Part C

i) Adobe Dreamweaver allows rapid flexible development of websites

The simplified engine on which Adobe Dreamweaver is based makes it easy to adapt web standards including CSS, and HTML for personalized web projects, thereby aiding learning of the web standards and fast (timely) web development

ii) The time between starting development and deployment is shorter when using Adobe Dreamweaver due to the availability of customizable templates that serve wide range of user web interfaces, including e-commerce pages, newsletters, emails and blogs

iii) Building of websites that adapts to the screen size of the device from where the site is accessed is possible with Adobe Dreamweaver

Explanation:


Related Questions

The cultivation in mountain areas, with their scattered plots of usable land at various altitudes with different climates, landscapes and little margin for mechanization, are managed by family farms in the most efficient and effective way.

Answers

Answer:

Mountain farming

Explanation:

Mountain farming is done in hilly areas of the mountains. It is mainly family farming. The mountain farming is mainly done in the mountains where the paddy fields are scattered and the limited use of the usable lands are available.

It is cultivated in different types of climatic conditions or landscapes with limited use of mechanization or machines. The mountain farming is maintained by the family farms in an effective way.

explain why the computer is powerful working tool???​

Answers

Answer:

here ya go

Explanation:

A computer is a powerful tool because it is able to perform the information processing cycle operations (input, process, output, and storage) with amazing speed, reliability, and accuracy; store huge amounts of data and information; and communicate with other computers.

benefits of Internet as method of information transmission​

Answers

Answer:

The Internet enables effective global communication around the world and has changed the way people socialize and consume media via social networks, and has facilitated teleworking, distance learning and e-learning. The Internet has given rise to new e-commerce companies and industries, and knocked out other traditional players, but also contributed to the development of the IT bubble and burst at the turn of the millennium. To counter piracy of music and movies over the internet, new streaming services have been developed since the 00's and cut out distribution lines. Web magazines and social media have competed with many traditional media, especially the local press, and reduced the labor market for journalists. Social media may have been a tool (but not a catalyst) for revolutions such as the Arab Spring and of significance for an explosive increase in the spread of fake news and misinformation since the 2000s. Social media is believed to have had an impact on election results, but it is debatable whether fake news has had it.

The size (number of bytes) of a structure-type variable can be changed by the following factors. Select all that apply. Group of answer choices changing the orders of the members in the structure. adding a member into the structure. changing an int-type variable to a pointer-type variable. changing the computer from a 32-bit to a 64-bit processor.

Answers

Answer:

A, B, and D

Explanation:

Considering the available options, the size (number of bytes) of a structure-type variable can be changed by the following factors:

A. changing the orders of the members in the structure.

B. adding a member into the structure.

D. changing the computer from a 32-bit to a 64-bit processor.

write a program to enter RADIUS of a CIRCLE and PRINT AREA of TRIANGLE using Q Basic. (class 8)​

Answers

Answer:

The program is as follows:

10 INPUT RADIUS, BASE, HEIGHT

20 CIRCLE = 3.142* RADIUS * RADIUS

30 TRIANGLE = 0.5* BASE * HEIGHT

40 PRINT CIRCLE

50 PRINT TRIANGLE

60 STOP

Explanation:

The program description doesn't tally;

In other words, it is impossible to calculate the area of a triangle using the radius of a circle.

So, I designed the program to get input for radius, base and height.

Get input for radius, base and height

10 INPUT RADIUS, BASE, HEIGHT

Calculate area of circle

20 CIRCLE = 3.142* RADIUS * RADIUS

Calculate area of triangle

30 TRIANGLE = 0.5* BASE * HEIGHT

Print area of circle

40 PRINT CIRCLE

Print area of triangle

50 PRINT TRIANGLE

End of program

60 STOP

what is the basic unit of measuring storage capacity of computer?​

Answers

Answer:

All data are stored on 1s and 0s computers (bits). We explain how much data we store using conditions such as kilobytes and megabytes.

Explanation:

Storage devices

All are stored in 1s and 0s on a computer. One of only 1 0 is called 'bit' in a computer. It takes 8 1s and 0s if we save a character in a computer, so we could say it needs 8 bits to store a character.

Computer and memory storage is frequently measured in megabytes and gigabytes (GB). A medium-sized novel includes approximately 1 MB of information. One MB is 1024 kilobytes, not a million bytes, or 1,048,576 bytes (1024x1024).

Similarly 1 GB is 1.024 MB (1024x1024x1024) bytes, or 1.073.741.824 bytes.

Selma writes the following four answers in her Computer Science examination.
State which computer terms she is describing.
“It is a signal. When the signal is received it tells the operating system that an event has occurred.”
Selma is describing

Answers

Answer:

Interrupts.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

The four (4) input-output (I/O) software layers includes the following;

I. User level software: it provides user programs with a simple user interface to perform input and output functions.

II. Device drivers: it controls the input-output (I/O) devices that are connected to a computer system through a wired or wireless connection.

III. Device-independent OS software: it allows for uniform interfacing and buffering for device drivers.

IV. Interrupt drivers (handlers): it is responsible for handling interruptions that occur while using a software on a computer system.

An interrupt is a signal from a program or device connected to a computer and it's typically designed to instruct the operating system (OS) that an event has occurred and requires an attention such as stopping its current activities or processes.

In conclusion, the computer term that Selma is describing is interrupts.

Answer:

Interrupts

Explanation:

Dr Martin Luther King and his followers go to Selma, Alabama to attempt to achieve, through non-violent protest, equal voting rights and abilities for black people. In 1964, Dr. Martin Luther King Jr. of the Southern Christian Leadership Conference (SCLC) accepts his Nobel Peace Prize.

write an algorithm to find perimeter of circle​

Answers

It is usually called the circumference of a circle, not a perimeter.

For a circle with radius r, the formula for the circumference C is

=2

Answer:

Explanation:

Algorithm:

step 1 : Start

step 2 : Read r

step 3 : POC = 2*22/7 *r                   POC = perimeter of circle

step 4 : display POC

step 5 : Stop

A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect?
A. MAC filtering
B. 802.1X
C. WPA2
D. EAP-FAST

Answers

Answer:

C

Explanation:

WPA2 builds on its predecessor, WPA, and is specifically designed to meet the most demanding enterprise security needs. ... Furthermore, because WPA2 is backwards- compatible with WPA, organizations that have already implemented the WPA standard can migrate to WPA2 at their own pace.

A current divider is to be designed using a 2mA DC current source and 1K resistors, the specification that the current is 1.5mA.

Answers

Answer:

The solution of the given query is described below throughout the explanation segment.

Explanation:

Given:

DC current,

= 2mA

Resistors,

= 1K

According to the question,

⇒ [tex]i=\frac{(1K+1K+1K)\times 2mA}{1K+1K+1K+1K}[/tex]

⇒   [tex]= \frac{3}{4}\times2mA[/tex]

⇒   [tex]=1.5mA[/tex]  

What are the uses of DVD Ram​

Answers

Answer:

Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

DVD Ram Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

What is a benefit of using a client/server network?
Cheap to maintain
Easy to install
Has a central, powerful computer
Unable to share files

Answers

Answer:

Has a central powerful computer

Explanation:

When operating a client - server network, a certain access mediun is created such that clients can access information, materials and services from a central computer, this poses great advantage in the area of security and control. Clients would be able to gain access from this central computer using either a local or wide area network. The accessibility provided through this powerful, central computer allows the the network to monitor what actions are being performed and make appropriate restrictions on the network, hence, preventing the invasion of malware and viruses. Hence, the central control is a great feature of a client - server network.

I copied my friend's homework... give me some excuses to get out of it!! ​

Answers

Answer:

Tell the teacher that you will pee in her coffee cup if they don't forget about what you did

Explanation:

Answer:

Explanation:

Depends on the homework, but

"We worked together on it and came to similar conclusions."

"We checked answers with each other when we finished to make sure we got the problems correct and did the problems correctly."

it is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together​

Answers

Answer:

Cable ties

Explanation:

Used to bundle cables neatly inside and outside of a computer. It is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together.

>3

[tex]\boxed{Parts\: organizer}[/tex] is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together.

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

how to prevent water pollution​

Answers

Answer:

Here is your answer

Explanation:

1. pick up litter and throw it away in a garbage can.

2. use environmentally household products such as washing powder, household cleaning agents

3. wash your car or outdoor equipment where it can flow to a gravel or grassed area instead of a street.

4. don't throw waste at ocean it will harm the animals and create tocsin.

_________________________ are people, places, and materials, either printed or non-printed, that can provide answers to inquiries.

Answers

Answer:

Information/knowledge resources

Explanation:

The process of looking for answers to questions that will lead to improved knowledge about a subject is known as an inquiry. The theories of enquiry includes abduction, induction, and deduction

An inquiry can provide the reasoning behind observation by making use of the theories of inquiry and sources that provide answers (information) about the (interrelated) events of the inquiry

Therefore, information and knowledge resources are the people, materials, and places, which can be in the printed, verbal, appearance form that have the capacity to proffer answers to inquiries

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated.
What should you do?
A. Tell the user to wait until you are scheduled to be in that location.
B. Escalate the call to another technician or your supervisor.
C. Drive to the other location as soon as possible and update the driver.
D. Establish a Remote Desktop connection and update the driver.

Answers

Answer:

The answer is "Option D".

Explanation:

It is a desktop platform that helps a "client" computer can join from a remote location to a "host" computer. Clients can then manage and then use apps and files anywhere on network protocols.

This technology enables users to link from the remote location to a specific machine as if they were sitting beside it. Once this connection is established, users can carry out a variety of tasks as if they actually use the computer directly.

help me pls i beg whoever types first ill mark them brainliest

Answers

Answer:

The answer is "Line 1,4,and 9".

Explanation:

Following are the complete code to the given question:

print ("What is your favourite football team? ")#print message

team = input()#define variable that use input method to input value

#this is the IF statement, If they enter Manchester City

if team == "Manchester City":#use if to check string value

#respond like this

   print ("Manchester City is a great team! ")#print message

#alternatively, respond like this

else: #defining else block

   print("I don't mind "+ team +", but Manchester City is better !")#print message

   #don't forget concatenation!

output:

Please find the code with the output in the attached file.

Please find attached file that will explains errors.

help,any question answer​

Answers

Answer:

true

false

true

true

Explanation:

I took the paper

Investigate the many ways that hardware and software can cause an interrupt to occur. Are ALL interrupts treated equally or do some have priority over others?​

Answers

Answer:

Following are the responses to the given question:  

Explanation:

This list is based mostly on the processor. Then you'll be ordered. An interrupt of a particular cable (wire) is produced for PC-ish CPUs (IRQ 0 - 31 for some intel processors). The bigger challenge is a lower number.

Strange factors have included a system clock, power business, 0, some reserved for use by CPU testing, serial/parallel/... ports and also some terminated/error/state/new devices requests device Thus a key touch on the keyboards could create an interrupt that was direct on old devices.

A Python keyword ______________.

can be user defined

cannot be used outside of its intended purpose

can only be used in the comments section

can be used anywhere in a Python program

Answers

Answer:

cannot be used outside of its intended purpose.

Explanation:

In many programming languages, keywords are special and reserved words that are used for specific and specified purposes. They have special meanings and cannot be used outside their intended purposes.

Keywords cannot be used as variable names, identifiers or functions.

In Python, some of such keywords include;

i. True

ii. False

iii. for

iv. while

v. break

vi. continue

vii. if

viii. else

ix. def

x. pass

True or False: Microsoft Publisher allows you to click and drag an element anywhere on the page.

Answers

Answer:

True

Explanation:

Name the function for output in python.

Answers

Answer:

We use the print() function to output data to the standard output device (screen). We can also output data to a file, but this will be discussed later. An example of its use is given below.

Answer:print()

Explanation:As said above. Print is what we use in python (:

how is a trade off best described ?

dilema
compromise
demand
complication

Answers

I think the answer is compromise <3

For what purpose do the hackers create the zombies army?

A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks

Answers

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

QUESTION 10
Twenty first century learning environments promote:
O A. effective learning
B. continuous learning
O c. positive human relationships
OD. all of the above
O E. integration of formal and informal learning​

Answers

Answer:

D

Experts say 21st century learning must take place in contexts that “promote interaction and a sense of community [that] enable formal and informal learning.”i Thus, this paper will address the relationship of physical spaces and technological systems to learning, but more importantly, it will also consider how those

Explanation:

MARK ME AS BRAINLIEST

FOLLOW ME

CARRY ON LEARNING

100 %SURE

Answer is OD all the above

Carlos, a network technician, replaces a failed switch with a new switch. Carlos informs the users on the subnet served by the switch that they can reconnect to the network. One user calls to report that she is still unable to access any resources on the network. Carlos checks the indicator light for the switch port to which that user is connected. The LED light is not lit. What action should Carlos take next to resolve this problem

Answers

Answer:

Explanation:

If the indicated network switch port has no glowing green LED then that switch port is either off or failing. This can sometimes happen even with newly replaced switches. In this case Carlos should first check to make sure that the switch port is properly installed. If so, then he should switch the port for a new one. If the LED light turns on and is still not green, then it may be an error with a faulty cable, and in this case Carlos should replace the cable with a new one, which should solve the issue.

State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.​

Answers

Answer:

Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible  they include all information from previous revisions and updates.

Explanation:

To prevent certain columns from being displayed when printing a worksheet, _______ the columns.

erase
hide
highlight
remove

Answers

Hide I believe!!!!!!
To prevent certain columns from being displayed when printing a worksheet, HIDE the columns.

A customer in a store is purchasing five items. Write a program that asks for the price of each item, and then displays the subtotal of the sale, the amount of sales tax, and the total. Assume the sales tax is 7 percent. Display all results, properly labeled, as numbers with two digits after the decimal point.

Answers

Answer:

Program approach:-

Using the header file.Using the standard namespace I/O.Define the main function.Display the enter price of 5 terms.

Explanation:

Program:-

//header file

#include<iostream>

#include<iomanip>

//using namespace

using namespace std;

//main function

int main(){

       const double SALES_TAX=0.07;

       double subTotal=0,total=0,taxAmount = 0,x;

       

       cout<<"Enter price of 5 items"<<endl;

       for(int j=0;j<5;j++){

               cin>>x;

               subTotal += x;

       }

       taxAmount = subTotal * SALES_TAX;

       total = taxAmount + subTotal;

       cout<<fixed<<setprecision(2)<<endl;

       cout<<"Sub total: "<<subTotal<<endl;

       cout<<"Sales Tax: "<<taxAmount<<endl;

       cout<<"Total: "<<total<<endl;

       

       

}

Other Questions
Which sentence changes this imperative to an indicative mood?Clean up your room!Could you please clean your room?If you would clean your room, it would make me happy.I want you to clean up your room.This room is a horrible mess! HELPPPPPPPPPP [WILL GIVE U BRAINLEST AND THANKS] What is the correct solution set for the following graph? What is the basic idea for how to find surface area of any solid? Secondary succession can only occur as a transition from primary succession. Las calificaciones de los alumnos en un examen de Estadstica han sido: 6, 4, 4, 3, 6, 10, 1, 0, 2, 6 ,6, 8, 5. Calcula su media. Seleccione una: a. 4.6 b. 6.0 c. 5.0 d. 4.7 1. The curved surface area of a cylinder of height 21cm is660cm", find its radius. please help me .....I will give brainliest. The distance between the parallel lines x 2y = 3 and 2x 4y = 12 is Five possible motivations for threat actors (i.e., hackers, attackers) who target companies from an information security perspective are wrath, ideology, opportunity, glory and __________. Group of answer choices national defense boredom ease of execution gain Phn tch chc nng ca cc h c quan chnh c th c; cc biu hinri lon chc nng v ng dng cc bin php k thut nhm nng caonng sut nui trng thy sn \frac{1}{cos^{2} x}-(3+\sqrt{3} )tanx-3+\sqrt{3} =0 Explain how mile-a-minute vine could have a long-term effect on local ecosystems. Use evidence and scientific information about genetic traits, adaptation and factors in the environment to support your response. 20 POINT MATH PROBLEM HELP For each separate case, record the necessary adjusting entry. On July 1, Lopez Company paid $2,000 for six months of insurance coverage. No adjustments have been made to the Prepaid Insurance account, and it is now December 31. Zim Company has a Supplies account balance of $6,600 at the beginning of the year. During the year, it purchased $2,800 of supplies. As of December 31, a physical count of supplies shows $1,200 of supplies available. Prepare the year-end adjusting entries to reflect expiration of the insurance and correctly report the balance of the Supplies account and the Supplies Expense account as of December 31. Which of the following statements is correct concerning venture capitalist?I. Most venture capitalist are short-term investors in a firm.II. Venture capital firms often specialize in different stages. III. Venture capital is relatively inexpensive in today's competitive markets. a. I and II only.b. I, II and III.c. II and III only.d. Il only.e. I only. In the 1960s Csar Chvez organized the United Farm Workers to assist farmworkers in securing loans to buy homesdemand disaster relief for farmers in the Midwestguarantee government subsidies for U.S. fruit growersimprove working conditions for migrant farm laborers The function f(x) = { x + 1 is used to complete this Which statements are true of the given function? Check all that apply. table. f(x) 012) --2 -1 1 Of(0) = } f(1) = -1 0 N Of(2)= 1 1 2 Of(4) = ? 2 2 Na Citete cu atentie enunurile de la exerciiul anterior i completeaz in caiet un tabel asemanator What is the author's tone as he describes Chuchundra in the following passage?Chuchundra is a broken-hearted little beast. He whimpers and cheeps all the night, trying to make up his mind to run into the middle of the room, but he never gets there.unsympatheticpityirritateddespicable What is the function of the roughER?A. build proteinsB. modify and repackage proteinsC. contains enzymes