a ux designer wants to quickly mock up salesforce user interface experiences using a collection of prebuilt components. the designers needed salesforce lighting design systems(slds) resources for their designs and prototypes such as base components tokens and designs patterns which tool or installation should best support their needs?

Answers

Answer 1

The best tool for a UX designer looking to quickly mock up Salesforce user interface experiences using prebuilt components from Salesforce Lightning Design System (SLDS) resources would be the Salesforce Lightning Design System (SLDS) website itself. The SLDS website provides a comprehensive collection of base components, tokens, and design patterns specifically designed for Salesforce user interfaces.

The Salesforce Lightning Design System (SLDS) website serves as a centralized hub for all SLDS resources. Designers can access a wide range of prebuilt components, including buttons, forms, navigation elements, and more. These components come with predefined styles, layouts, and behaviours that adhere to Salesforce's design standards, ensuring a consistent and professional user experience. The SLDS website also provides access to design tokens, which are variables representing visual attributes such as colours, spacing, and typography. By utilizing these tokens, designers can easily maintain design consistency and make global style changes throughout their prototypes.

To learn more about UX, click here:

brainly.com/question/31562446

#SPJ11


Related Questions

to help ensure that an html document renders well in many different web browsers

Answers

Answer:

Doctype Declaration

Explanation:

In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.

Answer:

I think it is:

B. a doctype declaration

Explanation:

Which type of operating system is permanently programmed into a hardware device?

A. Embedded OS
B. Firmware
C. Mobile OS
D. Hypervisor

Answers

Answer:

B.FIRMWARE

Explanation:

An operating system that is permanently etched into a hardware device (such as a keyboard or a video card).

The type of operating system is permanently programmed into a hardware device is firmware. The correct option is B.

What is firmware?

A platform's hardware components are configured and controlled by firmware, which is often computer code. As a result, firmware typically executes as the first piece of code when a device is turned on, serving as the cornerstone upon which system trust is based.

Firmware is a class of software that is permanently included in a device's read-only memory. It offers instructions on how to operate the device and reduces hardware-level security risks. Essentially, firmware refers to software that is integrated into a piece of hardware.

It is referred to as embedded software at times. A microcontroller, a component of the microprocessor that instructs the microprocessor on what to do, serves as an illustration.

Therefore, the correct option is B. Firmware.

To learn more about firmware, refer to the link:

https://brainly.com/question/28945238

#SPJ2

which of the following security controls might an organization request from a cloud hosting provider?

Answers

Answer: An organization might request various security controls from a cloud hosting provider depending on their security requirements. Some of the security controls that an organization might request from a cloud hosting provider include:

Data Encryption: Organizations might request data encryption to ensure that their data is protected when it is at rest or in transit.

Access Controls: Organizations might request access controls to ensure that only authorized personnel can access their data.

Network Security: Organizations might request network security controls, such as firewalls and intrusion detection and prevention systems (IDPS), to prevent unauthorized access to their data.

Vulnerability Scanning and Penetration Testing: Organizations might request that their cloud hosting provider performs regular vulnerability scanning and penetration testing to ensure that their systems are secure.

Compliance Certifications: Organizations might request compliance certifications, such as SOC 2 or ISO 27001, to ensure that their cloud hosting provider is following industry-standard security practices.

Incident Response: Organizations might request that their cloud hosting provider has an incident response plan in place to quickly respond to security incidents and mitigate any damage.

Physical Security: Organizations might request physical security controls, such as access controls, surveillance cameras, and security personnel, to protect their data centers and servers from physical threats.

Overall, the specific security controls that an organization might request from a cloud hosting provider will depend on their security needs and the type of data they are storing or processing in the cloud.

An organization might request various security controls from a cloud hosting provider to ensure data protection and maintain compliance with industry standards.

Some of these security controls include:

1. Access controls: Restricting access to sensitive data and systems based on user roles and privileges.

2. Data encryption: Encrypting data at rest and in transit to prevent unauthorized access.

3. Intrusion detection and prevention systems (IDPS): Monitoring and identifying potential threats, vulnerabilities, and unauthorized activities.

4. Security Information and Event Management (SIEM): Collecting, analyzing, and correlating security events for timely threat detection and response.

5. Regular vulnerability assessments and penetration testing: Evaluating and testing the cloud infrastructure to identify potential security risks and vulnerabilities.

6. Data backup and disaster recovery: Implementing processes to ensure the availability and integrity of data in case of system failures or other incidents.

7. Compliance with industry standards and regulations: Adhering to security frameworks like ISO 27001, SOC 2, and GDPR.

Remember to communicate with your cloud hosting provider to discuss specific security control requirements for your organization.

To learn more about security control visit : https://brainly.com/question/27960062

#SPJ11

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Based off a rudimentary periodic table,
was Mendeleev able to accurately predict
the properties of the newly discovered
element discussed here?

Answers

No, he was not able to accurately predict the properties of the newly discovered element.

What is element?
An interesting chance to look at the link that now exists between chemists & philosophers in chemistry is the topic of the conceptual nature of a term "element." The English scientist Robert Boyle was the one who first proposed the chemical element. He stated that an element is a substance that is "incapable of breakdown" and added the prophetic through any means that we are now familiar with, just like a good scientist. Boyle's definition is remarkably accurate in terms of current theory. In today's laboratories, elements have been altered, though not chemically.

To learn more about element
https://brainly.com/question/18096867
#SPJ1

Lee can hold a phone up to a museum exhibit and, on the screen, is more information about the exhibit overlaid on top of a picture of the exhibit. What is this program called?

Answers

Answer:

Augmented reality

Explanation:

augmented reality because I was doing a test looked at the answers and this answer didn’t make since so I looked up the definitions of all of them and it is augmented reality.

Tech A says that most lug nuts and studs are right-hand threaded, which means they tighten when turned clockwise. Tech B says that some lug nuts and studs are left-handed, which means they tighten when turned counterclockwise.

Answers

This question is incomplete.

Complete Question

Tech A says that most lug nuts and studs are right-hand threaded, which means they tighten when turned clockwise. Tech B says that some lug nuts and studs are left-handed, which means they tighten when turned counterclockwise. Who is correct?

a) Tech A

b) Tech B

c) Both Tech A and B

d) Neither Tech A not B

Answer:

c) Both Tech A and B

Explanation:

The Wheels of cars or vehicles are attached or fastened to the car rims using what we call lug nuts and wheel studs. The lug nuts attached or torqued properly on the wheel studs in order to ensure that the wheels of the car are well secured , attached and firm.

We have different types of lug nuts and wheel studs. The differences is based on the threading that it found on both the lug nut and wheel studs.

We have:

a) The right handed threaded lug nuts and studs(wheel studs)

b) The left handed threaded lug nuts and studs(wheel studs).

The right handed threaded lug nuts and studs are tightened when they are turned in the clockwise direction while left handed threaded lug nuts and studs are tightened in the anticlockwise or counterclockwise direction.

It is important to note that no matter the kind of lug nuts and studs(whether right handed threaded or left handed threaded) used to fastened wheels to car rims, it is essential that they are well fastened and torqued to car to prevent them from loosening up.

For the question above, both Tech A and Tech B are correct. Therefore , Option C is the correct option.

why do most operating systems let users make changes

Answers

By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.

how does dns resolve an ns record to an ip address?

Answers

When DNS (Domain Name System) resolves an NS (Name Server) record to an IP address, it follows a hierarchical process.

The NS record contains information about the authoritative name server responsible for a specific domain. Here's how the resolution occurs:

1. The DNS resolver receives a query for a domain's NS record.

2. It starts by querying the root name servers to determine the top-level domain (TLD) server responsible for the domain.

3. The resolver then queries the TLD server, which responds with the authoritative name server for the domain.

4. Next, the resolver sends a query to the authoritative name server, requesting the IP address associated with the NS record.

5. The authoritative name server responds with the IP address, completing the resolution process.

6. The resolver can now use the IP address obtained to establish a connection with the name server and continue resolving further DNS queries for the domain.

This hierarchical process allows DNS to efficiently resolve NS records to IP addresses, enabling proper routing of requests to the appropriate name servers for domain-specific information retrieval.

For more questions DNS, click on:

https://brainly.com/question/27960126

#SPJ8

When it comes to credit scores, why is having a
thin file NOT good?
What reasons might an 18-year-old have for
his/her thin file?

Answers

Answer:

credit karma

Explanation:

karma is -69

One of the features of using web mining is that it improves website usability. This usability refers to how easily website users can ________ with the site.
disengage
view
interact
query

Answers

One of the features of using web mining is that it improves website usability. This usability refers to how easily website users can interact with the site.

Web mining involves extracting useful information and patterns from web data to enhance various aspects of website functionality and user experience. By utilizing web mining techniques, websites can gather insights into user behavior, preferences, and trends, which can then be utilized to optimize the website's usability.

Improving website usability focuses on enhancing the user's ability to interact seamlessly with the site, navigate through different pages, access desired information efficiently, and perform desired actions easily.

To know more about  mining visit :-

brainly.com/question/16965673

#SPJ11

what is reddits nickname

Answers

Answer:

the front page of the internet

Explanation:

Answer:

I don't know

Explanation:

I just don't know

Activity 1: Communication process
Melissa called her coworker, Jonas, to tell him that the department meeting scheduled for tomorrow
afternoon has been moved to next Tuesday at 1 p.m. Jonas indicated that he would note the change
on his calendar. Identify each element of the communication process in this situation.

Answers

The component of communication in this circumstance. Communication process elements .

What are the 4 basic elements of communication?

Eight crucial components make up the communication process, which comprises understanding, exchanging, and meaning: the source, message, channel, receiver, feedback, environment, context, and interference.

There are four essential parts to the communication process. Encoding, transmission medium, decoding, and feedback are some of these components. Two other components are involved in the process, and they take the form of the transmitter and the recipient. Five components make up the fundamental communication model: the sender, the receiver, the message, the channel, and feedback.

The four fundamental forms of communication are speaking, writing, listening, and reading. People form long-lasting impressions of you based on how you interact with them and convey your views.

To learn more about communication refer to :

https://brainly.com/question/1083194

#SPJ1

When checking for a no-start concern, you notice that an engine has no spark. Technician A says to turn on the ignition (engine off) and, using a DMM, find out how much battery voltage is available at the negative terminal of the ignition coil. Technician B says the DMM reading should fluctuate, indicating that the primary coil current is being turned on and off. Who is correct?


A. Neither Technician A nor B

B. Both Technicians A and B

C. Technician B

D. Technician A

Answers

Answer:

Option(C) is the correct answer to the given question.

Explanation:

Since overall the On-Board Diagnostics of the level 2 the computer systems need to evaluate the cause of the engine failures .The malfunction significantly increases in the fuel consumption, so that we can detecting the error code in the vehicle.

If we starting the engine as well as by using the DMM, we'll  see how much battery voltage it is at the negative ignition coil node.If the spark module is faulty and no ignition coils can fire so all the engines are working that's why all the other option are incorrect .

When delivering 2021 Rogue, what limitation should you point out when using the available wireless charging pad

Answers

Answer:

Not all mobile devices are capable of utilizing wireless charging

Explanation:

The reason for this is because the wireless charging feature is a relatively new technology, and so most older mobile devices were not build to support this feature.

Hence, this is a limitation in the case where the vehicle owner owns an older mobile device; they would unable to use the available wireless charging pad.

How do you flatten a 2D array to become a 1D array in Java?

Answers

Answer:

With Guava, you can use either

int[] all = Ints.concat(originalArray);

or

int[] all = Ints.concat(a, b, c);

Explanation:

Use GUAVA

Which of the following is a support activity?A) outbound logistics activitiesB) operations and manufacturing activitiesC) technology development activitiesD) customer service activitiesE) marketing and sales activities

Answers

Customer service activities are considered support activities within a business.  The correct option is D.

Support activities are those that provide assistance and support to the primary functions of a business. In this case, customer service activities involve addressing customer inquiries, providing technical support, handling customer complaints, and ensuring customer satisfaction.

Outbound logistics activities (option A) involve the movement of products from the business to the customer. Operations and manufacturing activities (option B) pertain to the production and manufacturing processes. Technology development activities (option C) focus on research and development of new technologies. Marketing and sales activities (option E) involve promoting and selling products or services.

Therefore, the correct answer is D) customer service activities as they are part of the support activities within a business.

You can learn more about Customer service at

https://brainly.com/question/1286522

#SPJ11

Ethan entered a long column of numbers into a spreadsheet and noticed that he accidentally entered the data into column d when it should have been in column e. what is the fastest way for ethan to make this correction? a. highlight the cells containing the data, press delete, move to the new cell and reenter the data. b. highlight the cells containing the data, press delete, move to the new cell and reenter the data. c. double-click on the group of cells and select the move command from the menu. d. double-click on the group of cells and select the move command from the menu. e. use the mouse to highlight the cells containing data and click and drag the highlighted cells to the new location. f. use the mouse to highlight the cells containing data and click and drag the highlighted cells to the new location. g. use the mouse to highlight the cells containing the data and press the arrow key once. h. use the mouse to highlight the cells containing the data and press the arrow key once.

Answers

Using the click-and-drag method is the most practical way for Ethan to make this correction and it helps to avoid any unnecessary errors or complications.

The fastest way for Ethan to correct his mistake is to use option E: use the mouse to highlight the cells containing data and click and drag the highlighted cells to the new location. This method allows Ethan to move the data from column d to column e without having to delete and reenter the data. It is a simple and efficient solution that saves time and ensures that the data is accurately transferred to the correct column. Additionally, this method preserves any formatting or formulas that may be associated with the data, which would be lost if the data was deleted and re-entered.

To learn more about Errors :

https://brainly.com/question/29883906

#SPJ11

HELP FAST I NEED THE ANSWERS NOW!!!
YOU’LL GET 20 POINTS AND I AM GONNA PUT YOU IN BRAINIEST!!

HELP FAST I NEED THE ANSWERS NOW!!!YOULL GET 20 POINTS AND I AM GONNA PUT YOU IN BRAINIEST!!

Answers

Answer:

1. The food could contaminate (food contamination) & drinks could potentially spill on appliances.

2. Reading the directions beforehand allow you to properly assemble or handle objects such as beakers, or hot plates. You could break the glass objects or burn yourself on the heat source.

3. If you're at school in a lab, you could say an eye wash shower, fire blanket, or fire extinguisher.

4. Dispose trash etc. into the appropriate bins, and clean any spill before

leaving the lab.

5. NO. It's important to follow the procedures carefully so you and the people around you will not be harmed.

hope this helps!!

what is the answer to the image​

what is the answer to the image

Answers

your answer is

b

you’re welcome

―Connectivity is Productivity‖- Explain the statements.

Answers

connectivity is productivity. It’s true for a modern office, and also for any place – for an undeveloped village.

What FIM score would be given to a person who needs a helper to set up items or assistive devices?

Answers

The FIM score given to a person who needs a helper to set up items or assistive devices would be a score of 2.

This score reflects that the individual requires assistance from another person to complete the task of setting up items or assistive devices. This level of dependence on others indicates that the person may have limited physical or cognitive abilities that affect their ability to perform activities of daily living independently. The FIM score is often used by healthcare professionals to assess a patient's level of disability and plan appropriate rehabilitation interventions to improve their functional abilities.

learn more about assistive devices here:

https://brainly.com/question/28302360

#SPJ11

Write a program that inputs the length of two pieces of wood in yards and feet (as whole numbers) and prints the total.
MUST BE IN PYTHON

Answers

The program that inputs the length of two pieces of wood in yards and feet (as whole numbers) and prints the total is given below:

The Program

#Getting inputs from the User

feet_1= int(input("Enter the first length in feet: "))

inche_1 = int(input("Enter the first length in inches "))

feet_2 = int(input("Enter the second length in feet: "))

inche_2 = int(input("Enter the second length in inches "))

# Calculations

inches = inche_1 + inche_2

inc_to_ft = inches // 12

rem_from_div = inches % 12

sum_ft = a_ft + b_ft + inc_to_ft

#Printing the final result

print("Feet: {} Inches: {}".format(sum_ft, rem_from_div))

Read more about computer programs here:

https://brainly.com/question/23275071

#SPJ1

How to use arrays in python as a counter ?

I need to write a program in python where a dice is rolled i have to track how many times each of the six digits(1,2,3,4,5,6) are rolled.

So how do i do that ?

Answers

Answer:

len is a built-in function that calls the given container object's __len__ member function to get the number of elements in the object.

Functions encased with double underscores are usually "special methods" implementing one of the standard interfaces in Python (container, number, etc). Special methods are used via syntactic sugar (object creation, container indexing and slicing, attribute access, built-in functions, etc.).

The method len() returns the number of elements in the list.

In what situations might you need to use a function that calls another function?

Answers

Answer:

Explanation:

It is important to understand that each of the functions we write can be used and called from other functions we write. This is one of the most important ways that computer programmers take a large problem and break it down into a group of smaller problems.

studying computer science is really worth it for future?​

Answers

Yes, a computer science degree is worth it for many student also they make 74,762 annual salary
Yes, it is a vital job and they make very good money


HELP PLEASEEEE!!!!!!!

HELP PLEASEEEE!!!!!!!

Answers

This is too little points for a question I’m sorry.

Edmentum Plato Course - Learning in A Digital World: Strategies for Success

How can a student tell if a piece of research is current?


A.

The information was written recently or has been updated recently.


B.

The ideas fit with what is widely known about the topic now.


C.

The writer of the information is still writing other pieces.


D.

The website the information is from is up to date and still active.

Answers

Answer:

A

Explanation:

The information was written recently or has been updated recently.

Charles accessed a website for a research paper and recorded the information below.

Title of Website:
The Fall of Rome
Title of Article:
Military Forces
Author:
Marian Shelby
Publisher:
Unknown
Date Accessed:
October 14, 2012
Date Published:
March 11. 2009
Format:
Web

According to the Modern Language Association (MLA) style guidelines, which citation is formatted correctly?

Answers

Answer:

The answer is D

Explanation:

The MLA citation for Charles will be:

shelby, marian. “the fall of rome.” military forces. n. p., 11 mar 2009. web.

14 oct 2012.

What is a citation?

A citation is given as the mentioning of the work from a book, paper, or other author's work. The citation involves the details of the article with its author and other publications in varying formats.

The MLA format of citation is given as:

Last name of author, first name of author, title of source, title of publication, version, number, publisher, date, location

The MLA citation for Charles will be:

shelby, marian. “the fall of rome.” military forces. n. p., 11 mar 2009. web.

14 oct 2012.

Learn more about MLA citation, here:

https://brainly.com/question/12415105

#SPJ2

How many different bit strings are there of length 8 that contain the string 0000?

Answers

Answer:

answer is 8! / (4! * 4!). Which gives a value of 70.

Explanation:

we have 8 places, we’re going to pick 4 places to put the zeros, it is 8! / (4! x 4!)

There are 8 (4! * 4!) different strings are there of length 8 contain the string which gives a value of 70.

What are synthetic materials?

Synthetic fiber or material are those fibers which are not found naturally infact they are man made or made by humans. In the manufacturing of synthetic fiber various chemical process where takes place and these are responsible for the production of synthetic material.

The main advantage of using synthetic material is that they are long lasting or durable products. Many natural fibers are ready to get dyed and the synthetic fiber perform consumer friendly behaviour. The main characterstics of synthetic materials are that they are waterproof, stretching, and stain resistance.

In the manufacturing of synthetic fiber various chemical process where takes place and these are responsible for the production of synthetic material. Many natural fibers are ready to get dyed and the synthetic fiber perform consumer friendly behaviour.

Therefore, There are 8 (4! * 4!) different strings are there of length 8 contain the string which gives a value of 70.

Learn more about synthetic material here:

brainly.com/question/24357817

#SPJ2

Other Questions
Passenger airplanes take off in the troposphere but can eventually move intothe stratosphere. The planes may remain in the stratosphere until it is time toland. Why do you think planes fly in the stratosphere? A population of pea aphids doubles every week.The population begins with 300 individual pea aphids.In how many weeks will the population reach 9,600 individuals? If y is a positive integer, for how many different values of y is, 144/y a whole number? With _________, the vendor manages the applications and data. define primary health carer service John has two hours before having to go to his part time job. He is deciding between studying for a math exam and taking a nap. If John chooses to take a nap, the opportunity cost of his decision is PLEASE HELP1.1: Characteristics of Life and Biology in the Real World1. When scientists look at an onion slice under a microscope, they see many small "boxes"within the piece of onion (see image to the right). Unlike an onion--which is a plant--someorganisms like bacteria are only made of one "box" and are functional unit to all living things.Both plants and bacteria, however, share the following characteristic of life because they havethese "boxes" indicating that-a) All living things reproduceb) All living things are made of cellsc) All living things maintain homeostasisd) All living things grow and develope) All living things display organization marco is a medical assistant at plymouth general hospital. when he reports for work this morning, his supervisor asks him to draw blood for stat (immediate) laboratory tests for bertha grover in room 3114. this task would be classified as an . 17. Which of the following is not an issue with migration to land for water plantsa. dehydrationC. supportb. vascular tissued increased preditors Help me please this is due in 20 minUTES find the value of x (click photo) Which element of the following would be the worst to use for pipes and fillings in the rainwater harvesting system? Explain by referring to the reactivity of each and to the nature of the ions that form. Support your answer using electronic configuration and periodic trends. Aluminum, Copper, Lead Ann drove to the store 10 km north of her house and then drove to the library, which is 5 km south of the store. She drove a total distance of 15 km. What was Ann's displacement? O A. 15 km south OB. 5 km north C. 5 km south D. 15 km north SUBMIT 8PM 5. How is she similar to a flag being raised? Part 2 Arrays - Guess The Capital of A State Write a programthat repeatedly prompts the user to guess the capital of a randomlydisplayed state. Upon receiving the user input, the program reports Pls help Ill brainlest pleaseeee hurrryyyyyyyy Two dice are rolled. What is the probability of having both faces the same (doubles) or a total of 4 ? round to the nearest hundreth. HELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAP HELP I NEED HELP ASAP The long-run average total cost curve is determined by the firm choosing a level of _____ costs to minimize _____ costs.