Name one of the four things Krug recommends doing to make text more scannable.
What will be an ideal response?
Use plenty of headings.
Keep paragraphs short.
Use bulleted lists.
Highlight key terms.
Computer Science & Information Technology
You might also like to view...
An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following?
A. Social engineering B. Bluesnarfing C. Man-in-the-middle D. Evil Twin
Computer Science & Information Technology
_________ is an organization that produces data to be made available for controlled release, either within the organization or to external users.
A. Client B. Data owner C. User D. Server
Computer Science & Information Technology