Answer:
ITS ALL ABOUT C
Explanation:
READ IT CAREFULLY
Check all that apply to Raster Graphics
in photoshop
only use certain colors
infinitely scalable
made from pixels
based on math
limited scalability
Answer: made from pixels, limited scalability
Explanation:
everything in PS is made up of pixels and you can see this if you zoom in too much or scale up too much, it will look like Mario 64. It is not like a vector based program, wich uses math to calulate lines so you can scale it indefinetly and it will remain crisp.
What is the primary difference between sort and filter?
Answer:
Filter only shows the messages that match a particular criterion
A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue?
Answer:
Service record (SRV)
Explanation:
Service records (SRV record) are data records stipulating specifications of the DNS such as the port numbers, servers, hostname, priority and weight, and IP addresses of defined or cataloged services servers.
The SRV record is the source of information and the search site about the
location of particular services as such an application i need of such services will look for a related SRV record
A configured SRV is the source of the ports and personal settings for a new email client, without which the parameters set in the email client will be incorrect.
Providing products or services that could be raffled off by a non-profit organization to raise money is an example of a business _____.
Jack needs to create a technical drawing for a new tool.
Answer:
Jack should send an e-mail out to all of their clients and BCC them on it (so that they don't have each others information) and distribute the information quickly. E-mail is one fastest ways to get information sent to a large amount of people at one time
Answer:
so blueprints? jack needs to know the name and action of each part
why is life so boring and why can´t life just be fair and why is life so short and why do all these bad things happen to good ppl like why do bad things happen period
Answer:
To be honest i wonder the same thing all the time. I wish i knew the answer to all these questions as well.
Explanation:
a battery-powered global positioning system (gps) receiver operating on 9.0 v draws a current of 0.13 a. how much electrical energy does it consume during 30 minute
According to the stated claim, 2106J of electrical energy are used up in 30 minutes.
Why is a receiver necessary?An A/V receiver is the electrical component that controls and fuels your home theater setup. The AV receiver is unquestionably the brain of both a home theater setup. It ingests the signals out of those sources and then transmits the visual and audio impulses to the relevant outputs.
Battery voltage V = 9.0v
Drawn current = I = 0.13A
Consuming time = 30 min = 30 * 60s = 1800s
energy = pt = VIt
= 9.0V * 0.13A * 1800s = 2106J
To know more about Receiver visit:
https://brainly.com/question/553980
#SPJ1
What is the first step in changing where templates are stored?
Click the At startup, open all files in box.
Double-click on the Advanced option.
Open the Excel Options dialog box.
Enter the folder path to use for templates.
Answer:
Open the Excel Options dialog box
Explanation: edg
Shadow and highlight create depth (3D).
TRUE OR FALSE
Answer:
true because then it would be like not popping out
What list of numbers is created by the following code:
range(9)
Group of answer choices
0 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8 9
1 2 3 4 5 6 7 8
0 1 2 3 4 5 6 7 8 9
Answer:
0 1 2 3 4 5 6 7 8
Whats the best way to make a video game?
Answer:
Step 1: Do Some Research & Conceptualize Your Game. ...Step 2: Work On A Design Document. ...Step 3: Decide Whether You Need Software. ...Step 4: Start Programming. ...Step 5: Test Your Game & Start Marketingmohammed is experiencing issues with his work computer. he speaks to the it department and they identify various symptoms of a computer virus. what are symptoms of a computer virus? more than one answer may be correct.
Some of the symptoms of a computer virus include slow down of computer performance, unexpected pop-up windows,some files go missing
What are the symptoms of a computer virus?
Computer performance is sluggish (taking a long time to start up or open programs)Shutting down or restarting problemsThere are no files.Files go missingSystem crashes and/or error messages occur on a regular basis.Unexpected pop-upsNew programs (toolbars, etc.)Major symptoms of having computer virus are crashing of the system and the delay in the performance of the computer also the pop-up windows make the system slow
Delay in installing of files and the installed ones have the restarting or opening problem and uninstalling certain programs might be the final one
Hence to conclude we should be aware of virus in pc and uninstall those virus related softwares
To know more on the concept of virus in pc follow this link:
https://brainly.com/question/26128220
#SPJ4
12. Before the Internet, which invention had the biggest impact on employees in the workforce?
A. Trojan horses
B. Equal income
C. Digital libraries
D. Electricity
Answer:
D. Electricity had the biggest impact on employees in the workforce before the internet. It allowed factories to operate machinery, offices to use typewriters and other electrical equipment, and increased productivity and efficiency.
Explanation:
what is a family of web feed formats used for web syndication of programs and content?
RSS (Really Simple Syndication) and its variants such as Atom and RDF (Resource Description Framework).
RSS is a family of web feed formats that allow publishers to distribute content to a wide audience. It is a popular way for users to keep up with their favorite websites and blogs. RSS feeds can contain a summary of content or the full text, along with metadata such as author, date, and category.
RSS is a standardized system that allows users to subscribe to websites and receive updates, such as news articles, blog posts, or multimedia content, through a feed reader.
To know more about Atom visit:-
https://brainly.com/question/15215058
#SPJ11
the infection of a digital device by a computer virus happens in stages. what is the second step in this process?
Since the infection of a digital device by a computer virus happens in stages, the second step in this process is option A: An action such as running or opening a file activates the virus.
When a virus is triggered, how does it function?A virus that has infected a computer attaches itself to another software so that when the host program runs, the virus's actions are also activated. It has the ability to replicate itself, attaching to other files or programs and infect them in the process.
Therefore, note that in the second stage, the majority of viruses, Trojan horses, and worms start when you open an email attachment or click on one of its links. If your email client supports scripting, then opening an email could expose you to a virus.
Learn more about computer virus from
https://brainly.com/question/26128220
#SPJ1
See full question below
The infection of a digital device by a computer virus happens in stages. What is the second step in this process? Multiple Choice An action such as running or opening a file activates the virus. The infection spreads to other computers via infected email, files, or contact with infected websites. The virus arrives via email attachment, file download, or by visiting a website that has been infected. The payload or the component of a virus that executes the malicious activity hits the computer and other infected devices.
Sports photography is not included in news coverage.
True
False
Answer:
False yes it is
Explanation:
Follow your teacher's instruction to__________________your computer after each use.
Answer: proper shutdown
Hope that helps!
a message ____________________ is a fingerprint of the author’s message that is compared with the recipient’s locally calculated hash of the same message.
A message fingerprint is a unique digital signature that identifies the author's message and is compared to the recipient's locally calculated hash of the same message. This method of verification helps to ensure the authenticity and integrity of the message being sent.
Message fingerprinting is a widespread approach in modern communication networks for preventing unwanted access to data and ensuring that messages have not been tampered with during transit. A hashing technique is used to turn the content of a communication into a unique digital signature before it is transmitted. This signature, or fingerprint, is then delivered to the receiver along with the message.
When the message is received, the recipient's system computes the hash of the message and compares it to the sender's hash to guarantee that they match. If they don't match, it means the communication was tampered with or distorted in route. The communication will be refused in such instances, and the sender will be alerted.
Message fingerprinting is a crucial security measure that is used in various communication technologies such as email, instant messaging, and file-sharing systems. By using message fingerprints, organizations can ensure that their sensitive data remains secure and that their messages are delivered without any tampering or unauthorized access.
To learn more about the digital signature, visit:
https://brainly.com/question/14862771
#SPJ11
Describe the purpose and user requirements for the website.
Answer:
The purpose and user requirements for the website is described below in details.
Explanation:
User Requirements represent how user expectations and wherewith they will communicate with the outcome. Use the characteristics, functions, and content expressed in your summaries to elaborate on your requirements. Your user synopses should describe the responsibilities your users want to perform on your site.
How do you write mathematical expressions that combine variable and literal data
Variables, literal values (text or integers), and operators specify how the expression's other elements are to be evaluated. Expressions in Miva Script can generally be applied in one of two ways: Add a fresh value.
What connection exists between literals and variables?Literals are unprocessed data or values that are kept in a constant or variable. Variables can have their values updated and modified since they are changeable. Because constants are immutable, their values can never be updated or changed. Depending on the type of literal employed, literals can be changed or remain unchanged.
What kind of expression has one or more variables?The concept of algebraic expressions is the use of letters or alphabets to represent numbers without providing their precise values. We learned how to express an unknown value using letters like x, y, and z in the fundamentals of algebra. Here, we refer to these letters as variables.
to know more about mathematical expressions here:
brainly.com/question/28980347
#SPJ1
PLEASE ANSWER FAST IM TIMED
A WYSIWYG editor will save time and make the process of Web site design an artistic practice rather than a ------- practice.
This open source software helps you either create a website through code, or design it with the help of templates and facile customizations.
What is the difference between HTML and WYSIWYG?A WYSIWYG editor shows you a rendered web page as you edit the page. You do not see the actual HTML. When using manual coding, you see the HTML, but you must load the document in a web browser to view the rendered page.
Is WYSIWYG easy to use?An efficient free WYSIWYG Editor comes with an easy-to-use toolbar, keyboard shortcuts, and other features that allow you to easily add or edit content, images, videos, tables, or links. A WYSIWYG editor saves time and makes web content creation quick and easy.
To know more about WYSIWYG visit:
https://brainly.com/question/12340404
#SPJ1
Answer:
Programming
Explanation:
WYSIWYG (sometimes pronounced "wizzy wig") is an acronym that stands for "What You See Is What You Get." It is a phrase that was coined when most word processing, desktop publishing, and typesetting programs were text and code based. HTML, at its code level, is much like the early interfaces on this sort of software. A WYSIWYG editor saves time and makes the process of website design an artistic practice rather than a programming practice.
write an algorithm to find the perimeter of rectangle
Answer:
look at the link i put down below
Explanation:
Does anyone know how to do Python Essentials 5.7.1.6 because i am completely lost
Answer:
create a 2d array of "#" for each letter, and use string manipulation or regular expressions to print each letter
Explanation:
the cards used with mobile phones today are a special type of smart card. a. nas b. raid c. san d. sim
The SIM cards used with mobile phones today are a special type of smart card. In this case Option D is correct
Except when you get a new phone and the card needs to be transferred from the old one to the new one, along with the phone's stored data, IM (Subscriber Identity Module) cards are probably not something you think about very often.
The cards themselves are plain plastic pieces with silicone chips on them, similar to those found in credit cards and hotel key cards, which contain processor and memory circuits that enable them to store up to 256 KB of digital information.
An essential function of SIM cards in mobile and telecommunications technology is as follows: Phone companies can accurately measure usage and charge because they can route calls to the appropriate device for each person and link a physical device with the owner's account.
To know more about SIM cards here
https://brainly.com/question/14100139
#SPJ4
describe the three major subsets of the analytics focused software developers portion of the analytics ecosystem.
1. Data Science: Data scientists focus on gathering, organizing, cleansing, analyzing, and interpreting data. They use machine learning algorithms, predictive analytics, and statistical methods to extract insights from large datasets.
2. Business Intelligence: Business intelligence (BI) engineers develop software and systems that enable organizations to make informed decisions based on data.
3. Data Engineering: Data engineers are responsible for the design, development, and maintenance of data pipelines and data infrastructure. They work with data scientists and BI engineers to ensure data is available in the right format and stored in the right location.
What is Data Pipelines?
Data Pipelines are a set of automated processes that move data from one system to another. They provide a way to extract, transform and load data from multiple sources into a data warehouse, data lake or other target system. Data Pipelines enable organizations to quickly and efficiently collect and analyze data from disparate sources.
To know more about Data Pipelines
https://brainly.com/question/30167532
#SPJ4
What would you classify anti-malware software as?
SaaS
enterprising
cloud
security
Answer:
enterpriseing is the answer
Collin would like to use the data a coworker has entered in a database. The problem is the coworker's database software is different from collin's. Collin should _____.
If Collin would like to use the data that a coworker has entered in a database but the database software is different, he should try to find a way to export the data from the coworker's database in a format that he can use.
Why should Collin save the data in a specific format?
This could involve exporting the data to a file such as a CSV (comma-separated values) or an Excel spreadsheet, which can be opened and used in a variety of different software programs.
Alternatively, Collin could ask the coworker to send him a copy of the database file in a format that he can use, or he could ask the coworker to provide him with access to the database itself so that he can directly access and use the data.
To learn something more about database, visit: https://brainly.com/question/29451665
#SPJ4
Can you see the processing step yes or no
Answer:
I cannot see anything on my screen
Explanation:
I can't see anything............................
A program in the cyberspace and intercept messages containing specific text A. Virus B. Sniffers C. Worm D. Bomb
Answer:
B. Sniffer
Explanation:
The type of program that is being discussed is called a Sniffer. This can either be a software or hardware that allows the user to intercept data flowing from a computer to the internet in real-time before it reaches its destination. The program can be very vague and intercept all the data coming and going to the target computer or it can be very specific and intercept only the data in which it was programmed to target (sniff out). Cyber Criminals use these programs/devices to steal valuable information that they know a user is going to send sooner or later over the internet.
which is true about arrays and methods?a.arrays cannot be passed to methodsb.passing an array to a method creates a copy of the array within the methodc.an array is passed to a method as a referenced.a programmer must make a copy of an array before passing the array to a method
The correct statement is an array is passed to a method as a reference. The correct option is C.
In a programming language like Java, the real array is not replicated when it is supplied to a method. Instead, the method receives a reference to the array.
As a result, any modifications made to the array inside the function will also affect the original array outside the method. This is so because the array's storage location in memory is the same location where the reference points.
It is efficient to pass arrays as references because it prevents irrational memory usage and enables changes to be performed directly to the original array.
Thus, the correct option is C.
For more details regarding array, visit:
https://brainly.com/question/13261246
#SPJ4