Name one of the four things Krug recommends doing to make text more scannable.

What will be an ideal response?

Use plenty of headings.
Keep paragraphs short.
Use bulleted lists.
Highlight key terms.

Computer Science & Information Technology

You might also like to view...

An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following?

A. Social engineering B. Bluesnarfing C. Man-in-the-middle D. Evil Twin

Computer Science & Information Technology

_________ is an organization that produces data to be made available for controlled release, either within the organization or to external users.

A. Client B. Data owner C. User D. Server

Computer Science & Information Technology