A web page designer can use fluid grid layouts and media queries when creating web pages to determine the values to use for mobile, tablet, and desktop layouts. a. true b. false

Answers

Answer 1

The given statement, "A web page designer can use fluid grid layouts and media queries when creating web pages to determine the values to use for mobile, tablet, and desktop layouts" is true because Fluid grid layouts and media queries are two commonly used techniques for creating a responsive web design, which allows web pages to adapt and display optimally on different devices and screen sizes.

Fluid grid layouts use relative units such as percentages and ems to define the size and positioning of elements on a web page, rather than fixed pixel values. This allows the layout to adjust dynamically based on the size of the device screen.

Media queries are used to apply different CSS styles to a web page based on the characteristics of the device that is accessing it. By using media queries, web page designers can specify different CSS rules for different screen sizes, resolutions, and orientations, allowing the page to adapt to different devices.

By using fluid grid layouts and media queries, web page designers can create web pages that are optimized for mobile, tablet, and desktop devices, providing a better user experience and improving the overall usability of the page. Additionally, responsive web design can also improve the search engine optimization (SEO) of a web page, as search engines prioritize mobile-friendly websites in their search results.

To learn more about Media queries, visit:

https://brainly.com/question/16002751

#SPJ11


Related Questions

Develop a complete scanner for the chosen subset of the Ada language. Define the grammar of a subset of Ada. You must submit a short report describing the work performed. You must also include the source of the scanner program, the source program to test the scanner, input and output files. The report must show the execution of this scanner program by using appropriate input files, the program must show a list of the tokens scanned

Answers


The first step is to define the grammar rules for the subset of Ada that you want the scanner to recognize. This involves specifying the syntax for tokens such as identifiers, keywords, operators, literals, etc. You can refer to the Ada language specification for guidance on the syntax.


Write the scanner program: Once you have defined the grammar, you need to implement a scanner program that can recognize the tokens specified in the grammar. The scanner program reads input from a source program and breaks it down into individual tokens based on the defined grammar rules. Test the scanner program: To ensure that the scanner program is working correctly, you need to test it with a source program that includes various tokens from the chosen subset of Ada. Create a source program that covers different types of tokens and save it as a test input file.
Execute the scanner program: Run the scanner program using the appropriate input file containing the test source program. The program should process the input file and display a list of the tokens scanned. The output should indicate the type of each token (e.g., keyword, identifier, operator, etc.) and its corresponding value.



Finally, write a short report describing the work you performed. Include details about the subset of Ada you chose, the grammar rules you defined, and any challenges you encountered during the development of the scanner program. Provide the source code of the scanner program, the source program used for testing, and the input and output files.

To know more about  scanner visit;  

https://brainly.com/question/28588447

#SPJ11

Are technological advances in the computer industry good for people in that industry? HUGE HINT: All questions are relevant, and grading will be based on the pros AND cons listed.

Answers

Technological advances in the computer industry offer numerous benefits, including increased efficiency, expanded job opportunities, and streamlined processes. However, they also present challenges such as skill obsolescence, job displacement, and heightened competition.

Technological advances in the computer industry have both positive and negative implications for people working in that industry. Let's explore the pros and cons:

Pros:Increased efficiency and productivity: Technological advancements lead to improved hardware and software, enabling computer professionals to work more efficiently and accomplish tasks faster. This can result in higher productivity and output.Expanded job opportunities: New technologies often create new job roles and specializations. As the computer industry evolves, professionals with skills in emerging technologies have opportunities for career growth and advancement.Automation and streamlining: Technological advancements, such as automation tools and artificial intelligence, can automate repetitive tasks, reducing manual effort and allowing professionals to focus on more complex and strategic work.Cons:Skill obsolescence: Rapid technological advancements may render certain skills obsolete. Professionals must continually update their knowledge and acquire new skills to remain relevant and competitive in the industry.Job displacement: Automation and advancements in artificial intelligence can potentially replace certain job roles. While new opportunities may arise, some individuals may face challenges in adapting to the changing job market.Increased competition: Technological advancements attract more individuals to the computer industry, leading to increased competition for jobs. Professionals need to continually enhance their skills and expertise to stay ahead in a competitive environment.

To know more about Technological advances

brainly.com/question/4717909

#SPJ11

why do most operating systems let users make changes

Answers

By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.

what apps would you recommend for doing aesthetic school work on laptop​

Answers

Answer:

pinterest

Explanation:

you could get really cute and aesthetic backgrounds and pics from there

What is a piece of information you get with the ipconfig /all command that you would not with just ipconfig?

Answers

ipconfig /all - Retrieve All TCP/IP Network Information: This report covers details such as: Your network adapter(s) make and model Your adapter(s)'s physical address, sometimes called the MAC address or hardware address whether your IP address was assigned statically or via DHCP.

The Windows system's network interfaces' fundamental IP addressing details are shown via the ipconfig command. The IP address and subnet mask are also included in this information. The device's current TCP/IP network configuration values are shown via the ipconfig command.

The IP address, subnet mask, and default gateway addresses are all included. The ipconfig /all switch shows extra data, including the device's physical address and the address of the DHCP server, among other things.

Learn more about ipconfig /all here:

https://brainly.com/question/29908344

#SPJ4

Which one of the following is not a common goal of a cybersecurity attacker?

A. Disclosure
B. Denial
C. Alteration
D. Allocation

Answers

The correct option is D. Allocation. A common goal of a cybersecurity attacker is not to allocate resources or manage them in any way.

The primary objectives of cybersecurity attackers typically revolve around unauthorized access to systems or data, causing damage, or achieving some form of malicious intent.

A. Disclosure refers to the unauthorized release or exposure of sensitive information. Attackers may seek to gain access to confidential data, such as personal records, financial details, or intellectual property, to exploit or sell it.

B. Denial is a goal of attackers aiming to disrupt or deny access to a system or service. This can be achieved through techniques like DDoS (Distributed Denial of Service) attacks, which overload a network or server, rendering it inaccessible to legitimate users.

C. Alteration involves unauthorized modification or manipulation of data, systems, or settings. Attackers may seek to change records, inject malicious code, or modify configurations to achieve their desired outcomes.

In summary, while disclosure, denial, and alteration are common goals of cybersecurity attackers, allocation does not align with their typical objectives.

For more questions on cybersecurity, click on:

https://brainly.com/question/17367986

#SPJ8

write an sql query that will find any customers who have not placed orders (at least select customerid g

Answers

To find any customers who have not placed orders, you can use the below given SQL query:

SELECT CustomerID FROM Customers
WHERE CustomerID NOT IN (SELECT CustomerID FROM Orders)
This query will retrieve all CustomerIDs from the Customers table that do not appear in the CustomerIDs column of the Orders table. In other words, it will return the CustomerIDs of customers who have not placed orders. To break down the query, the first line selects the CustomerID column from the Customers table. The second line uses a subquery to select the CustomerIDs from the Orders table. The NOT IN operator is used to filter out any CustomerIDs from the Customers table that also appear in the subquery result.

This query is useful for identifying customers who may need additional outreach or marketing efforts to encourage them to place an order. It can also help identify potential issues in the ordering process or customer satisfaction that may be causing customers not to place orders.

Learn more about  query here: https://brainly.com/question/31230588

#SPJ11

How is video compression accomplished?

Answers

Answer:

using image compression techniques on consecutive video frames

Explanation:

It uses image compression

Which wireless probe is designed to scan and record wireless signals within its range at regular intervals and report the information to a centralized database? Access point probe Dedicated probes Desktop probe Wireless device probe

Answers

Dedicated probes are designed to scan and record wireless signals within their range at regular intervals and report the information to a centralized database.

What type of wireless probe is designed for scanning and recording wireless signals at regular intervals and reporting to a centralized database?

A dedicated probe is a specialized wireless device that is designed to continuously monitor and capture wireless signals within its range. These probes are specifically built for the purpose of collecting data on wireless networks and transmitting the information to a centralized database for further analysis and management.

Dedicated probes are equipped with sophisticated scanning capabilities, allowing them to capture information such as signal strength, network protocols, encryption methods, and other relevant data. By regularly scanning the wireless spectrum, these probes provide valuable insights into the performance, security, and overall health of wireless networks.

The collected data from dedicated probes can be utilized for various purposes, including network optimization, troubleshooting, security analysis, and compliance auditing. The centralized database serves as a repository for storing and analyzing the gathered information, enabling network administrators and analysts to make informed decisions and take appropriate actions based on the collected wireless data.

Dedicated probes and their role in monitoring and managing wireless networks, including their benefits in network optimization, security analysis, and troubleshooting.

Learn more about signals

brainly.com/question/13127914

#SPJ11

The u.s. bureau of labor statistics forecasts that the number of computer and network support specialist positions in the united states will grow at about ____ percent over the next 10 years.

Answers

According to the U.S. Bureau of Labor Statistics, the number of computer and network support specialist positions in the United States is projected to grow at about X percent over the next 10 years. While the specific percentage is not provided in your question, I can provide you with some information on the growth rate of this field.

Computer and network support specialists play a crucial role in maintaining and troubleshooting computer systems and networks. As technology continues to advance and become more integrated into our lives, the demand for these specialists is expected to increase.

The growth rate of this field can vary based on factors such as technological advancements, industry demand, and economic conditions. It is important to note that projections by the Bureau of Labor Statistics are based on various factors and assumptions.

To get the most accurate and up-to-date information on the projected growth rate, I recommend referring to the U.S. Bureau of Labor Statistics website or other reliable sources.

To know more about  projected growth rate visit:

https://brainly.com/question/24083671

#SPJ11

I don't even understand what I'm supposed to do.

Assignment/ Question
Alex is the new office manager at a small advertising firm. One responsibility is to manage the technology being used by the employees. However, it turns out that they have been using outdated software and could use some upgrades! Before launching a campaign to modernize the office software, Alex needs to know exactly what kinds of software to recommend, so a survey will be distributed to find out what common file types the employees use. Please help by explaining what a file type is, what the different kinds are, and what each one does best. Write a paragraph of at least five sentences that Alex can include at the top of the survey.
Alex collects the survey sheets and combines the results. Now your expertise is needed! Please fill out the file content that matches the file type, as well as recommending a particular piece of software.

I don't even understand what I'm supposed to do.Assignment/ Question Alex is the new office manager at

Answers

Answer:

i tried but i can figure it out

Answer:

You have to fill into the table what the file type and recommendations are (for example, .xls is a spreadsheet and Excel is the software is the recommendation).  Hope that helps a bit!

Explanation:

The image below shows a weather service map
Which detail best describes this map?
O shows isolines and isobars
O shows types of precipitation
O was created for newspapers
O is probably not used to make forecasts
Mark this and return
Save and Exit
Next
Submit

Answers

Answer:I chose A

Explanation:

Which of the following best explains how bias could occur in the game?
A. Points of interest may be more densely located in cities, favoring players in urban areas over players in rural areas.
B. Some players may engage in trespassing, favoring players in urban areas over players in rural areas.
C. Weather conditions may be unpredictable, favoring players in urban areas over players in rural areas.
D. Special items may not be useful to all players, favoring players in urban areas over players in rural areas.

Answers

Answer:

I believe the answer is A

Correct me if i'm wrong but hope i helped! xoxo

which type of valve is used to limit the flow of fluid in one direction only?

Answers

Another kind of flow-control valve is the check valve. A check valve's purpose is to restrict flow to one direction. The ability of flow check valve to regulate speed of air motors and cylinders is a relatively typical function.

What use does a check valve serve?

Control valves are commonly employed in lines to prevent backflow. The flow can freely move one direction through a check valve, but if the flow changes, the piston will close to safeguard the pipes, other valves, pumps, etc.

Do we need a check valve?

One of the most crucial parts of any pipeline system or fluid-moving application is the simple check valve. The delicate design conceals its serious intent.

To know more about check valve visit:

https://brainly.com/question/27876952

#SPJ4

Match each term with its best description. This may take some time to make all of these matches - go slowly, review slides \& notes, and check your work.

Answers

To match each term with its best description, you need to carefully review the information provided in the slides and notes. Here is a step-by-step approach to help you make accurate matches.



Start by understanding the meaning and context of each term. Read the definitions or explanations provided for each term in your study materials. Take note of any key characteristics or features that distinguish each term from others.


Begin matching the terms with their best descriptions by analyzing the similarities or differences between the terms and the provided descriptions. If you're unsure about any part of your answer, it's important to review the slides and notes again to ensure correctness.
To know more about description visit:

https://brainly.com/question/33743179

#SPJ11

If a storage pool is configured as if it has more virtual storage than the physical drives actually offer, what feature is being used?.

Answers

The feature being used is thin provisioning.

Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media usernamesuser passwords

Answers

Bjejfjdjdjdjdjdjdjdndjdjdjdjdjdjdjdjdjdjdjdjdjdjdjdjddjjddjjdjdjdjd

Which two statements are true about the SAFe backlog model? (Choose two.)
A) Epics are in the DevOps Backlog
B) Capabilities are in the Program Backlog
C) Stories are in the Team Backlog
D) Stories are in the Solution Backlog E) Features are in the Program Backlog

Answers

The two statements that are true about the SAFe backlog model are: B) Capabilities are in the Program Backlog, and E) Features are in the Program Backlog.

The SAFe (Scaled Agile Framework) model is based on Lean, Agile, and product development flow principles. The SAFe backlog model is a hierarchical system that connects different layers of planning and execution to achieve an aligned and structured approach to software development. The backlog is a prioritized list of the features, capabilities, and user stories that the team will work on in the future. The SAFe backlog model consists of three types of backlogs: Program Backlog, Team Backlog, and Solution Backlog.

The DevOps backlog is not part of the SAFe backlog model, so statement A is not true. Capabilities are high-level requirements that define a set of features needed to accomplish a business goal or objective. Capabilities are owned by the Agile Release Train (ART) and are included in the Program Backlog, so statement B is true. Features are a set of functionality that delivers value to the customer. Features are included in the Program Backlog, and their size is appropriate for a single iteration, so statement E is true. Stories are specific descriptions of the functionality, and they are used to define the Acceptance Criteria of a feature.

Stories are included in the Team Backlog and represent the work that will be performed in an iteration, so statement C is not true. Solution Backlog is used to manage the work for multiple ARTs and suppliers involved in building a large and complex system. Stories are not part of the Solution Backlog, so statement D is not true.

know more about Program Backlog,

https://brainly.com/question/18650631

#SPJ11

which of the following objects can be passed as a parameter so that the code compiles and runs

Answers

To ensure successful compilation and execution of the code, it is essential to provide an object as a parameter that is compatible with the function or method being invoked.

Why would different codes compile differently?

The code's unique design and characteristics will determine the precise requirements.

In general, it is possible to transmit appropriate objects that belong to matching classes or data types as the expected parameter types. It is crucial to take into account any limitations or prerequisites outlined in the code.

Read more about compiler here:

https://brainly.com/question/28390894

#SPJ4

Access 1.04 knowing your audience

Answers

Answer:

What?

Explanation:

I would like to help, but what is the question

What function affects the cookies downloaded into the host when playing a video clip?


security

privacy

APIs

embedded code

Answers

Privacy cause the cookies it leaves

Which software is used to play, create, and modify audio and video files?
software is used to play, create, and modify audio and video files.

Answers

Answer:

Adobe premiere pro, Maya.

Explanation:

There are many programs that do the following. I have listed two of the most well known softwares that can do this.

What is decision support system

Answers

A decision support system (DSS) is a computer program application that helps businesses make better decisions. Large volumes of data are analyzed, and the best solutions are then presented to an organization.

What is decision support system?

One might be argued that a DSS is anything that offers logical, quantifiable, and scientific data to assist leaders in making educated decisions. Examples of decision support systems include complex decision support software, manual systems, etc.

Note that it is a group of computerized information systems called decision support systems (DSS) provide assistance for decision-making processes. Interactive computer-based systems and subsystems.

Learn more about decision support system from

https://brainly.com/question/7655444
#SPJ1

write a program limited to the instructions provided in the cornell interpreter used in class. the string will not exceed 9 characters. it is the verification of a possible palindrome. display a 0 in a register that i will specify the day of the presentation (if any is required) if it is not and a 1 if it is. the string will be stored in memory location 0x8000. comments will be needed to justify the usage of any instruction.

Answers

Two important concerns that the IT technician must discuss with the customer in order to determine if the OS upgrade can be done are:

1.Compatibility of existing applications and custom software with the new OS: The IT technician needs to check if all the existing applications and custom software used by the customer are compatible with Windows 10. Some older applications may not be compatible with the newer operating system, and upgrading could result in functionality issues or even data loss.

2.Minimum memory and processor requirements for Windows 10: The IT technician needs to check if the older computers meet the minimum hardware requirements for running Windows 10. Windows 10 requires more system resources than Windows XP, so the customer's computers may need to be upgraded with additional memory or processor upgrades to handle the new OS efficiently.

To know more about IT technician click this link -

brainly.com/question/14290207

#SPJ11

When should you create an outline?

A. before you create your first slide
B. while you are creating yours slides
C. after you create your last slide
D.after you have presented your slide​

Answers

Answer:

I think A.

Explanation:

Not D.

Not B.

Sorry if I am wrong

Which of these statements about television is true?

a. "Studies show that people accept television's messages at face value, without much reinterpretation. "

b. "Television coverage can increase an area's participation in an activity. "

c. "American programming is much more popular than local television shows around the world. "

d. "Television is more popular in urban than in rural areas. "

e. "Television has little effect on culture. "

Answers

The statement that is true regarding "Television coverage can increase an area's participation in an activity." The correct option is b.

What is network coverage?

The geographical area covered by a service provider's network. Within this range, the phone will be able to complete a call by connecting to the carrier's or a partner network.

The geographic area where a radio station can communicate is referred to as its coverage in telecommunications.

Broadcasters and telecommunications companies frequently create coverage maps to show users the intended service area of a station.

The statement "Television coverage can increase an area's participation in an activity" is correct.

Thus, the correct option is b.

For more details regarding network coverage, visit:

https://brainly.com/question/28315381

#SPJ1

What is the key sequence to copy the first 4 lines and paste it at the end of the file?

Answers

Press Ctrl+C after selecting the text you want to copy. Press Ctrl+V while holding down the cursor to paste the copied text.

What comes first in the copy and paste process for a slide?

Select the slide you wish to copy from the thumbnail pane, then hit Ctrl+C on your keyboard. Move to the location in the thumbnail pane where you wish to paste the slide, then hit Ctrl+P on your keyboard.

What comes first in the copying process of a segment?

The secret to copying a line segment is to open your compass to that segment's length, then mark off another segment of that length using that amount of opening.

To know more about copy visit:-

https://brainly.com/question/24297734

#SPJ4

Consider the following method. "public static int calcMethod(int num) { if (num <= 0) { return 10; 3 return num + calcMethod (num/ 2); "}What value is returned by the method call calcMethod (16) ? a. 10 b. 26 c. 31d. 38 e. 41

Answers

As per the given program, the value returned by the method call calcMethod(16) is 41. The correct option is a. 10.

What is programming?

The process of developing and designing computer programmes or software applications is referred to as programming. Writing instructions or code in a language that computers can comprehend and use is required.

Until num is less than or equal to 0, the method calculates the sum of the input number (num) and the outcome of running calcMethod with num/2.

The method call calcMethod(16) in this situation would lead to the following recursive calls:

The method calcMethod takes an integer parameter num.If the value of num is less than or equal to 0, the method returns 10.If the value of num is greater than 0, the method performs the following calculation:

a. It recursively calls calcMethod with the parameter num/2.

b. The result of the recursive call is added to the original num value.

This will give:

num = 16 (given input).num is greater than 0, so we move to the recursive call.Recursive call: calcMethod(16/2) = calcMethod(8).num = 8.num is greater than 0, so we move to the recursive call.Recursive call: calcMethod(8/2) = calcMethod(4).num = 4.num is greater than 0, so we move to the recursive call.Recursive call: calcMethod(4/2) = calcMethod(2).num = 2.num is greater than 0, so we move to the recursive call.Recursive call: calcMethod(2/2) = calcMethod(1).num = 1.num is greater than 0, so we move to the recursive call.Recursive call: calcMethod(1/2) = calcMethod(0).

Now, when num becomes 0, the condition if (num <= 0) is satisfied, and the method returns 10.

Thus, the final returned value by the method call calcMethod(16) is 10. Therefore, the correct answer is (a) 10.

For more details regarding programming, visit:

https://brainly.com/question/14368396

#SPJ6

_______ is the process of creating visual tools that describe a system.
a) Problem scoping
b) System maps
c) Data Acquisition
d) Problem statement template

This question is from AI. Chapter name: AI Project Cycle.

Answers

Answer:

c).....Data Acquisition

C………. Is the answer

You can't export data from Access to Word. True False

Answers

False. Exporting data from Access to Word is a relatively simple process that can be done in just a few steps. By doing so, you can create documents, reports, and other written materials that include data from your database.

You can export data from Access to Word.Access and Word are part of the Microsoft Office suite of productivity applications. Although they are separate applications, they can be used together to perform a variety of tasks. Access is a database management application that can be used to create, store, and manage data, while Word is a word processing application that can be used to create documents, reports, and other written materials.

While it is true that Access and Word are different applications, they can be used together to perform a variety of tasks. For example, you can export data from Access to Word to create a report or other document that includes information from your database. This process is known as a mail merge.In order to export data from Access to Word, you will need to follow these steps:Open the database that contains the data you want to export.Select the table or query that contains the data you want to export.

Click on the "External Data" tab in the ribbon.Select the "Word" option from the "Export" group.In the "Export - Word Document" dialog box, select the options you want for your export, such as the file name, file format, and data to include.Click "OK" to export the data from Access to Word.

To know more about export data visit :

https://brainly.com/question/14337731

#SPJ11

Other Questions
As the human resource director, Trisha provides each manager with a breakdown of the metrics for employee performance measurement. She asks them to evaluate their staff against the standards provided in these metrics. Trisha is providing the managers with a(n) _____ device.incentivevalueprocedurecontrolprocesscontrol Early in its formation, Earth is thought to have collided with another large object that knocked it off its axis to its current _____-degree tilt. Question 6All the following factors make it challenging to assess the effectiveness of apresident's economic policies except1 ptsThe White House has no control over the demographic and technological forces thatinfluence the economy. The president's response to crises and external shocks in the economy are difficult toevaluate.The president appoints members of the Federal Reserve, but it is the appointees whoset monetary policy. It is hard to prove a specific policy was the source of good economic outcomes becausemany factors influence the economy. In your own words, what are the major differences betweenCatholics and Protestants? a plumbing supply company, wants to combine the advantages of different incentive-pay plans and help employees understand the organization's goals. which plan will help the company accomplish this goal? Discuss some specific strategies Blake uses in his critique ofsociety in "London" and two of hisother poems. -x - 2 = -(2x + 1) and -4x + 11 = -2(x + 3.5) Who is the queen of Rap Sir Isaac Newton is credited with inventing the first________________.A. perspectiveB. canvasC. pigmentsD. color wheel need help again! Q..3/4 of a piece of metal has a mass on 15 kg. What is the mass of 2/5 of a piece of metal ? i need it done now pls 800,000 rounded to the nearest hundred thousand what is the largest and smallest number While shopping, Dawn finds a backpack that she likes on the sale rack. Its original price is $60,but everything on the rack comes with a 30% discount. Dawn also has a coupon for 15% off ofher total purchase.Dawn says, "Thirty percent and fifteen percent make forty-five percent and 45% of $60 is $33,so it will cost $33."Is Dawn correct? Explain why or why not. Be sure to support your reasoning with amathematical model. Greg is at his house he gets in his car drives north 8. 9 miles and stops at a store then he turns around and drives south 7. 7 miles to his friends house how far is the friends house from Gregs houses? The deepest layer of cells in the epidermis, which is nourished by dermal blood vessels, is called the. How did the younger generation differ from the older generation in the 1920's?Copy of The 1920's For each of the following situations, decide whether Al has increasing, constant or diminishing marginal utility? a. The more economic classes Al takes, the more he enjoys the subject. And the more classes he takes, the easier each one gets, making him enjoy each additional class even more than the one before. b. Al likes loud music. In fact according to him, "the louder, the better." Each time he turns the volume up a notch, he adds 5 utils to his total utility. c. Al enjoys watching reruns of the old sitcom Friends. He claims that these episodes are always funny, but he does admit that the more times he sees an episode, the less funny it gets. d. Al loves toasted marshmallows. The more he eats, however, the fuller he gets and the less he enjoys each additional marshmallow. And there is a point at which he becomes satisfied: beyond that point, more marshmallows actually make him feel worse rather than better. plz answer i need good gradehalp.................... true or false the supervisor holds the employee responsible for performing a delegated task but still bears the ultimate responsibility for the results. Please Help Question in picture