Answer:
The rule of thirds helps capture the subject of a photo in a way that's pleasing to look at. It involves breaking any image you want to photograph into thirds, horizontally and vertically, so that you have nine equal parts. Within the grid, you'll notice the lines intersect at four distinct points.
Complete the following sentences. The first step in any project is(organizing,planning,directing,controlling) . A graphic designer needs to organize and(prioritize,assign,direct,control) tasks to get efficient results.
Answer:
planning, prioritize
Explanation:
uhh yeah that's how I guess
what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls
Answer: Insert ribbon > table drop down menu
Explanation:
Answer:Insert ribbon > table drop down menu
Explanation:
What two types of devices have a keyboard integrated into the screen?
Question 1 options:
laptops and smartphones
tablets and electric typewriters
typographers and tablets
tablets and smartphones
Answer:
tablets and smartphones
Explanation:
What is Moore's law? (in simple terms please)
Transistors' density will be doubled every two years. In a simpler term, computers should be twice faster every two years.
Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?
a
Ignore the request and not enter any personal information.
b
Provide only her name and date of birth.
c
Provide only her name and address.
d
Provide the requested information to receive the discount.
Answer:
a
Explanation:
sis is gonna get scammed
Answer:
a
Explanation:
You dont know who is getting your information and it is not someone you know. STRANGER DANGER!
blank are defined by how a company interacts with customers and employees
Some people believe that copying program code without permission
should not be a crime. State one reason why they might believe this and
state one reason why some people would disagree with them.
Answer:
They might believe this because they can think that it's just a normal thing that can be done.
* why people may disagree because they think that it's not right to copy.... it's just like assimilation.... and so they'll disagree
Tommy has hired a marketing company to create a billboard advertisement
for his company. So far, the message billboard contains exciting graphics, a
short description of the company and its services, and the contact
information. Which element of effective advertisement is Tommy missing?
Answer:
the billboard is missing a call to action!
Explanation:
It has exciting graphics and appropriate information.
The element that Tommy missing in the effective advertisement is the call to action.
What is the call to action?Any design intended to elicit an immediate response or promote an immediate sale is referred as in marketing as a “call to action.” A call to action (CTA) is most frequently used to describe the usage of words or phrases that may be inserted into sales scripts, advertising messages, or web sites and that urge an audience to behave in a certain way.
The message's call to action is the section that instructs your audience on what to do. If stated properly, it also motivates people to take action.
Therefore, it is call to action.
Learn more about the advertisement, refer to:
https://brainly.com/question/3163475
#SPJ2
List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)
Answer:
There are several different industries that are involved in the production and use of computers. These industries include:
Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.Answer:
Hardware Manufacturers
Software Developers
System Integrators
Service Providers
Data Providers
ISP
Cloud Computing Providers
Consulting Firms
Explanation:
It is in order..
how to add two binary numbers together (preferably 45 or under words)
Identify the error in the following block of code.
for x in range(2, 6):
prnt(x)
o The first line is missing quotes.
o The first line has a spelling error.
o The second line has a spelling error.
o The second line needs to be indented four spaces.
Answer:
The first line has a spelling error
Answer:the first line is missing quotes
When the prompt function is used in JavaScript, _____ appears.
A.
an error message
B.
a pop-up box
C.
a data warning
D.
a password request
Answer:
B
Explanation:
instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog
Give three examples of ethical or legal issues that an IT professional may encounter and the negative consequences of these issues.
Answer:
1. Private Informations being leaked.
2. Hackers that hacks accounts.
3. Computer Viruses obtained by clicking spam messages.
Explanation:
1. They can turn down the leaked informations by logging to it, legally.
2. IT Professionals could hack the hacker, or outsmart them.
3. Some people can stop Computer Viruses, but IT Professionals can prevent it much better than them.
I hope that my answer helped you. Thank you, and good luck.
The three examples of ethical or legal issues that an IT professional may encounter are:
Privacy violationsCybersecurity breachesIntellectual property violationsWhat are the negative consequences of the issues with IT professional?In Privacy violations: IT professionals may be faced with ethical dilemmas related to the collection, use, and protection of personal data. If personal data is not handled responsibly, it can lead to privacy violations, loss of trust, and potential legal consequences.
In Cybersecurity breaches: IT professionals are responsible for protecting the security of systems and data, and failure to do so can result in cybersecurity breaches that can have serious consequences, such as data loss, financial damage, and reputational harm.
Therefore, in Intellectual property violations: IT professionals may be faced with ethical issues related to the use of copyrighted or patented materials. If these materials are used without permission, it can result in legal consequences and damage to the reputation of the IT professional and their organization.
Learn more about IT professional from
https://brainly.com/question/6947486
#SPJ1
Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )
I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.
Which of the following lines of code creates a division called answer?
A.
B.
C.
D.
Answer:
Explanation:
All of the data in a digital book (letters, punctuation, spaces, etc) are stored and processed in a computer as binary. Break down how this works (hint: Ascii) . Explain in three or more sentences: Please Answer ASAP, Brainiest for Best and most In detail answer!!!!!
PLEASE HELP ASAP I WILL GIVE BRAINLIEST TO CORRECT ANSWER
Able to make a survey form using VB (Visual basics 6.0) to represent ways of conservation of
energy.
(I know what a survey means but how do u make questions to represent ways of conservation of energy? [I also know how to use the resources in the app]
Somebody please give me some ideas it will help me)
1. A virtual network of websites connected by hyperlinks is called
A. a browser
B. a URL
C. the internet
D. the World Wide Web
2. The Domain Name System translates the URL into
A. a client
B. an IP address
C. a website
D. a web browser
the answer of the first McQ is a and second one is b
Answer:
1 Option D is correct: World wide web
2 Option B is correct: Ip addresses
Raymond requires extensive knowledge of SQL and Bugzilla. What is Raymond’s job role?
A.
mobile app tester
B.
mobile app developer
C.
Java developer
D.
senior Java developer
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer
This is really dumb but can someone help me find these memes? I can’t remember what they’re called but I remember how they went
1.) The girl with shades on after the beat drops “I will remember YOU—Soulja boy tell ‘em”
2.) that meme where a toad is biting on the girl finger, and when she asks it to let go it bites down harder
Again, this is super dumb, I’m sorry (if you can, could you post a link to them?)
Tonya is creating a program that will allow the user to input their work address. Which kind of variable should Tonya use for this?
A.
a syntax variable
B.
a float variable
C.
a string variable
D.
an alphabetic variable
Answer:
B.
a float variable is the answer
Explanation:
becouse it is float variable
What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware
Answer:
Hardware
Explanation:
Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.
Hope this helps. <3
Hardware is the name given to the parts of a computer that you can actually touch.
What is Hardware?
The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware.
Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.
Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.
Therefore, Hardware is the name given to the parts of a computer that you can actually touch.
To learn more about Hardware, refer to the link:
https://brainly.com/question/15232088
#SPJ5
Using complete sentences post a detailed response to the following.
Imagine that you are the PM for a development team, and you’ve realized that your major deadline to finish the project is nearly here, but things aren’t complete. You have several choices—for example, hiring more developers, or paying your current staff more to work overtime, or rushing through the code to create something even if it’s not up to the quality you’d like it to be. Given a conflict between completing a project on time, delivering it with good quality, and keeping to a budget, what choice do you make? How would you justify that decision to your clients?
Answer: I would hire more developers because more people will give more ideas and might be better than some of the other developers so this would be the best choice
Question 1(Multiple Choice Worth 5 points)
(03.01 MC)
Which line of code will only allow a non-decimal point to be stored in a variable?
candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 2(Multiple Choice Worth 5 points)
(03.01 MC)
Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?
Add comments to the code
Allow others to understand the code
Display a string on the screen
Make the program interactive
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)
Jabari is writing a program which prompts a user for a value that is negative and has a decimal. Which function should he use?
float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 LC)
In programming, what is a string?
A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)
Which function converts the user's input to a number without a decimal?
float()
int()
print()
string()
Answer:
b
Explanation:
it's not a c or d and now I have to make it 20 characters long so I will do this
Which is the highest amount?
8.2 0.1
2.2 0.12
7.7 0.3
plsssssssssssssssss helpppppp i will follow u
ILL GIVE U BRAINLIEST
Answer: the second one it the highest
Explanation:
PLEASE HELP ME!!!!!
You want to type a document using a language that has a lot more characters than English. Which of these is your best choice for a coding system?
binary
hexadecimal
Unicode
ASCII
Answer:
Unicode
Explanation:
This is a fairly large code and Is well known throughout my family since we study ancient codex and modern codes to solve crimes and find relics of the past, although our research has proven good and unicode is one that is being studied currently now, I have found it as long and very time consuming. Although ASCII is a computer code that consists of graphs and numbers it actually shortens the text. and hexadecimal has been proven to be less reliable and binary is a short code with little symbols
Which is the best approach to debugging?
A.
Don’t worry about it at all until after the program is written.
B.
Be sure the program will work perfectly before writing it.
C.
Anticipate errors before they happen, and find and fix errors that happen.
D.
Use an HTML encoder.
The process of transferring information from a computer's memory to a flash drive is called:
a. writing c. formatting
b. reading d. transporting
Answer:
The process of transferring information from a computer's memory to a flash drive is called writing.
To write to a flash drive, you can simply connect the flash drive to your computer using a USB port, and then use a file manager or other software to copy and paste the files you want to transfer from the computer's memory to the flash drive. Alternatively, you can also drag and drop the files from the computer's file explorer directly onto the flash drive icon.
Formatting refers to the process of preparing a storage device, such as a hard drive or flash drive, for use by organizing it into a specific file system that the operating system can understand and access. Formatting a flash drive will erase any existing data on the drive, so it is usually only done when setting up a new drive or when you want to erase all the data on the drive.
Reading refers to the process of accessing and extracting information from a storage device. When you read from a flash drive, you are accessing and copying the files stored on the drive to your computer's memory.
Transporting refers to the act of physically moving a storage device, such as a flash drive, from one location to another. It does not involve the transfer of data or information.
Explanation: