True we use illustrator to draw vectors and vectors only
why? they are infinitely scalable
Hope this helps.
-scav
hi please help ASAP it's about html!
Create a HTML code for writing a web page for your school time-table.
Answer :-<html>
<head>
<title> Time Table </title>
</head>
<hrcolor = "red">
<hrcolor = "blue">
<body>
<table><tr = "7"><md = "7"><Period 1_></table>
</body>
</html>
[tex] \\ [/tex]
Answered by - ItzMaster
What is Polymorphism in programming? Explain in your own words with examples.
Answer:
A computer program which can change on it's own, such as a polymorphic virus that is harder to detect. It can change it's own code to achieve the same goal but have a different structure.
Explanation:
Answer:
Polymorphism is a feature of object-oriented
programming languages that allows a specific routine to use variables of different types at different times. Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.
Explanation:
hope it helps
What can be written to perform a certain number of iterations or to iterate until a specific result is achieved?
so in coding we use a thing called a loop to one of the most common loops is a if or loop this is when we tell the software to keep trying the task that is in the loop until it completes the task.
-scav
What is the difference between a patent and a copyright?
A copyright protects inventions, a patent protects intellectual property.
B copyright protects intellectual property; a patent protects inventions.
C Copyrights are for music, and patents are for books.
D Patents are for books, and copyrights are for music.
Answer:b
Explanation:
The difference between a patent and a copyright is,
B) Copyright protects intellectual property; a patent protects inventions.
Given that,
To find the difference between a patent and a copyright.
We know that,
Copyrights primarily safeguard original works of authorship, such as literary, artistic, musical, or dramatic creations.
On the other hand, patents are granted to inventors to protect new and useful processes, machines, compositions of matter, or any new and inventive improvement thereof.
So, copyrights are more about creative expressions, like music and books, while patents are focused on protecting unique and innovative inventions.
Option B is true.
To learn more about copyright visit:
https://brainly.com/question/357686
#SPJ4
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing
Answer:
The right approach is Option b (volume testing).
Explanation:
A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.Other options are not related to the given query. So the above is the right response.
The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do
Answer:
Have them try again. If it still is wrong then maybe dont let them use the internet!
Can you use 2 wireless keyboards and 2 wireless mouse on a dual monitor desktop without interfering with the other monitor ?
Answer:
I'm pretty sure this is not possible on Windows OS.
Explanation:
Two different monitors can work, as you probably know, but I don't think you can use separate keyboards and mice on the same machine.
Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.
Answer:
They are the same layer, only they are viewed through different conventions.
Explanation:
OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Each layer has its unique functionality which is responsible for the proper functioning of the communication services.
On the other hand, the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer comprises of four (4) main layers and these includes;
I. Application layer.
II. Transport layer.
III. Internet layer.
IV. Network layer.
This ultimately implies that, the Open Systems Interconnection (OSI) Application Layer and the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer are the same layer, only they are made up of different number of layers and as such are viewed through different conventions.
Answer:
c
Explanation:
A way to categorize information and point you to where to find that information is called
a. An index c. A table of contents
b. A glossary d. Both A and C
Please select the best answer from the choices provided
A
B
C
D
Answer:
D
Explanation:
PLEASE PLEASE HELP pleeeeeeeeeaaaase
Answer:
Truuuuuuueee
Explanation:
Plz give brainliest
Answer:
It's true
Explanation:
I just had the same question , ur welcome :)
How is a high-level programming language compiled? (5 points)
O a
A binary interpreter is used to translate each line of code.
Oь
All lines of code are translated together and then executed at once.
ос
One line of code is translated and then executed before moving to the next line.
d
Six lines of code are translated and then executed before moving to the next set of six.
Answer:
A high-level language is a programming language that uses English and mathematical symbols in its instructions. To execute a program in a high-level language, it can be compiled or interpreted. A compiler translates the entire program written in a high-level language to machine language prior to execution. After the compiler translates the code into machine language, it is typically executed line-by-line.
Explanation:
Answer:
One line of code is translated and then executed before moving to the next line.
What is the dark, sticky substance that forms when tobacco is burned?
Answer: Tar.
Explanation:
A chemical substance made when tobacco is burned. Tar contains most of the cancer-causing and other harmful chemicals found in tobacco smoke. When tobacco smoke is inhaled, the tar can form a sticky layer on the inside of the lungs.
Arranging a given set of data in ascending or descending order is ...................
Explanation:
maybe it's answer is sorting
We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the challenges you would face in such a scenario.
Answer:
Explanation:
Everything runs on the internet nowadays. Living without internet would bring many challenges. One of which would be difficulty making purchases. It is not always easy to find what you need close by which is why the majority of commerce nowadays is done through the internet. Another difficulty would be the lack of information, not being able to quickly search for something. Lastly, and probably the most important is the lack of communication. Without internet, you would lose contact with many loved ones around the world and would be limited to telephone communication.
1) The Output of a computer can be seen on
b) Mouse
a) Monitor
c) Keyboard
Answer:
Explanation:
Option B monitor is the correct answer
Answer:
ans is a
hello
myself swapna
What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
The most common thing to share in Outlook is the calendar.
The Publish Online option is for users outside an organization.
Changing calendar permissions only changes what a user can see.
Publishing a calendar online will allow anyone in the world to see it.
The Share option opens an email message that sends the calendar link.
O Calendar sharing options include Email, Share, Publish Online, and Delegate.
Answer:
The characteristics of calendar sharing options in Outlook 2016 are;
1) The most common thing to share in Outlook is the calendar
2) The Publish Online option is for users outside an organization
4) Publishing a calendar online will allow anyone in the world to see it
5) The Share option opens an email message that sends the calendar link
6) Calendar sharing options include Email, Share, Publish Online, Delegate
Explanation:
1) Sharing is used mostly by a group of people working on a given project
Items commonly shared in Microsoft Outlook includes email Folders calendars and address books (contacts)
Therefore, for people working on a project together, the most common thing to share in Microsoft Outlook 2016 is the calendar
2) The Publish Online option allows a user to make a calendar available to people outside the organization
3) The calendar sharing permissions are;
a) Who can view the date and time marked as busy
b) Who can view the location and titles of appointments
c) Who can view all the calendar details
d) Who can edit
e) Who can delegate
Therefore, changes in calendar permissions does not only change what the user can see
4) When publishing a calendar, a special URL is created that can be shared to people outside of an organization
A published calendar can be viewed by everyone that has the calendar link
Therefore, publishing a calendar online will allow anyone in the world to see it
5) When a calendar is shared, the person with which the calendar is shared will receive an invitation email for the invitee to accept with an "Open this Calendar" button
Therefore, the Share option opens an email message that sends the calendar link
6) Calendar sharing options includes
a) Sharing the calendar within the organization
b) Publishing a calendar to the web to share the calendar
c) A calendar can be shared in an email
d) Authority can be delegated to a particular calendar
Therefore, calendar sharing options include Email, Share, Publish Online, Delegate
1, 2, 3, 5
just did it
Write a pseudocode algorithm that ask a user to enter three numbers. The program should calculate and print their average
Answer:
BEGIN
INPUT first_number, second_number, third_number
average = (first_number + second_number + third number)/ 3
PRINT average
END
Explanation:
That is the simplest answer one can create
Complete the sentence with the correct response.
When choosing a new computer to buy, you need to be aware of what operating it uses.
Answer:
When choosing a new computer to buy, you need to be aware of what operating system it uses.
Explanation:
An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs.
Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest
Answer:
Explanation:
z 1
-- = --
7 21
solve
Answer:
[tex]z= \frac{1}{3}[/tex]
Explanation:
Given
[tex]\frac{z}{7} = \frac{1}{21}[/tex]
Required
Solve
[tex]\frac{z}{7} = \frac{1}{21}[/tex]
Multiply both sides by 7
[tex]7 * \frac{z}{7} = \frac{1}{21} * 7[/tex]
[tex]z= \frac{1}{21} * 7[/tex]
Rewrite as:
[tex]z= \frac{1 * 7}{21}[/tex]
[tex]z= \frac{7}{21}[/tex]
Simplify fraction
[tex]z= \frac{1}{3}[/tex]
A DTP firm has published and printed fliers for an upcoming fundraising event. In which section of the flyer would you find the contact details of the DTP firm
A. Body
B. Credits
C. Navigation
D. Title
One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
A: capital gains on the investment will be taxed at a lower rate.
B: fees will not be charged by brokers for selling the investment.
C: money earned on the investment will be considered tax-free.
D: profits on the investment can be averaged over the length of time the investment
is held.
Answer:
A, Capital gains on the investment will be taxed at a lower rate.
Explanation:
omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!omae wa mou shindeiru!!!!!!
In python please!! Write the definition of a function named countPos that needs integer values from standard input until there are none left and returns the number that are positive. The function must not use a loop of any kind.
Answer:
Explanation:
The following code is written in Python it doesn't use any loops, instead it uses a recursive function in order to continue asking the user for the inputs and count the number of positive values. If anything other than a number is passed it automatically ends the program.
def countPos(number=input("Enter number: "), counter=0):
try:
number = int(number)
if number > 0:
counter += 1
newNumber = input("Enter number: ")
return countPos(newNumber, counter)
else:
newNumber = input("Enter number: ")
return countPos(newNumber, counter)
except:
print(counter)
print("Program Finished")
countPos()
Write a JavaScript program to create a multiplication table for numbers 1 to 12 using a while loop. I’ll mark brainliest, thanks
Answer:
</p><p>
</p><p>days1(); // calling function days1()
</p><p>
</p><p>function days1() // function days1
</p><p>
</p><p>{
</p><p>
</p><p>var week = ["sunday ", "monday ", "tuesday "," wednesday"," thursday",
</p><p>
</p><p>"friday"," saturday"];
</p><p>
</p><p>var i;
</p><p>
</p><p>for (i=0;i<7;i++) // iterating over the loop
</p><p>
</p><p>{
</p><p>
</p><p>document.write(" The number of days in a week :" +</br>);
</p><p>
</p><p>document.write( week[i] + "</br>" ); // print the number of days
</p><p>
</p><p>}
</p><p>
</p><p>}
</p><p>
</p><p>
Output:
The number of days in a week :
sunday
monday
tuesday
wednesday
thursday
friday
saturday
Explanation:
In this program, we create a function days1().In this function, we declared an array i.e " week " which will store the list of the days of the week. After that, we iterate the for loop and prints a list of the days of the week.
PLEASE HELP !!!!!!!!!!!!!
What is revising?
Answer:
Revision literally means to “see again,” to look at something from a fresh, critical perspective. It is an ongoing process of rethinking the paper: reconsidering your arguments, reviewing your evidence, refining your purpose, reorganizing your presentation, reviving stale prose.
Kevin created a scene in an animation where he shows a leaf falling slowly. Which principle of animation did he follow in doing so? Kevin is using the principle of ____. This principle is proportional to the _____ of the objects displayed. Answers given for the first: Arcs, Timing, Staging Answers given for the second: Height, Length, Speed
Answer:
Kevin is using the principle of Timing. This principle is proportional to the Speed of the objects displayed.
Explanation:
Timing is one of the principles of animation wherein the speed of the movement of an object is controlled by the animator and made to harmonize with certain effects such as sounds. In an example of some projected balls we find that when getting to the peak, their movement is slower compared to when they are coming down.
Speed plays a key role here. This is similar to the slowly falling leaf. Speed and timing are major considerations. When paired with good sounds, the animation comes off better.
what method of technical drawing uses converging lines?
The foundation of linear perspective is the concept of diminution, which states that objects appear to get smaller as they travel farther away from the observer.
What's a good illustration of linear perspective?The seeming convergence of two parallel lines, particularly when looking at a lengthy section of two-lane highway, is an illustration of linear perspective. People who watch the highway in front of them have the impression that the lanes are converging at the horizon.
One kind of linear perspective is one point perspective. In a flat work of art, linear perspective creates the appearance of space and form by using lines to depict objects. It is a methodical method of drawing. One point perspective, which only uses one vanishing point, earns its name.
There are three forms of linear perspective. One point, two point and three point. When the vanishing point for the objects in your picture is close to the center of the scene, you have one point perspective, which is the simplest sort of perspective.
To learn more about linear perspective refer to
https://brainly.com/question/22902116
#SPJ1
A man-in-the-middle attack or impersonation are likely to result in problems with
data availability.
data confidentiality.
data integrity.
data mining.
Answer:
Data Confidentiality
Explanation:
A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.
A man-in-the-middle attack or impersonation is likely to result in problems with data confidentiality. Thus, option B is correct.
What is a man-in-the-middle attack?A man-in-the-middle (MITM) attack is a broad name used whenever an abuser inserts himself into a conversation between a user and now an application. That will listen in on the conversation or to pretend to be one of the participants and create the impression that normal information-sharing is taking place.
Attacks compromise the integrity and confidentiality of exchanges, which exposes information, technology, and other things to malevolent use. Consider the threat if a hacker was able to remotely open an automatic door lock or deploy the airbags in a linked car.
Therefore, option B is the correct option.
Learn more about man-in-the-middle attack, here:
https://brainly.com/question/13014110
#SPJ6
how important the role of valet and butler service in the hospitality
Who is Carl Thompson?