In photoshop what should you consider when determining a projects purpose and objectives?

Answers

Answer 1

Answer:

Identify the purpose, audience, and audience needs for preparing image,Identify three phases that might appear in a project plan. When planning your design project you might include on an outline the goals.


Related Questions

Binary numbers are based on __________.

a
letters (a and b)

b
16 digits

c
10 digits

d
two digits (1s and 0s)

Answers

D. Two digits (1s and 0s

Answer: 0 and 1s.

Explanation:

What is the output?
def divide(numA, numB):
return numA / numb
answer = divide(21,3)
print (answer)
There are no errors but there will be no output.
An error occurs.
7.0
21,3

Answers

The device with gives us meaning and result it’s called output

The output for the given code will be 7.0. The correct option is C.

What is coding?

Coding, also known as computer programming, is the method by which we communicate with computers. Code tells a computer what to do, and writing code is similar to writing a set of instructions.

You can tell computers what to do or how to behave much more quickly if you learn to write code.

Programming is widely regarded as one of the most difficult disciplines to master. Given how different it is from traditional forms of education, such as college degrees in computer science, it's easy to see why some people struggle to learn how to code.

Here, it is printing the answer of 21 divided by 3, which means, the answer 7 will get printed on the screen.

Thus, the correct option is C.

For more details regarding coding, visit:

https://brainly.com/question/17204194

#SPJ2

Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approximation, this means there is a 10% chance of losing the whole packet due to loss of a fragment. What is the probability of net loss of the whole packet if the packet is transmitted twice?

a. assuming all fragments received must have been part of the same transmission?
b. assuming any given fragment may have been part of either transmission?
c. explain how use of the IDENT field might be applicable here.

Answers

Answer:

a. 0.01

b. 0.001

c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.

Explanation:

The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;

= 0.1 x 0.1 = 0.01

When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;

= 0.01 x 0.1 = 0.001

The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.

When should you create an outline?
OA. While you are creating your slides
OB. Before you create your first slide
O C. After you create your last slide
O D. After you have presented your slide presentation


Help need help now please!!!!!!!!

Answers

Answer:custom slide show

Explanation:

Match each method of communication with its intended purpose.
a late-breaking news story
a poetry reading
an advertisement
a small group assignment

Answers

Answer:

1. a late breaking news story = to inform

2. a poetry reading = to entertain

3. an advertisement = to persuade

4. a small group assignment = to collaborate

Explanation:

1. A "breaking news" tells people of what is happening in the society. It informs them of the occurrence of an important event such as the plane crash of Kobe Bryant.

2. Poetry reading is meant to touch the attention of listeners. It tries to entertain them through the poem's interesting verses.

3. An advertisement is being shown/displayed in order to convince people to buy a particular product or service.

4. A group assignment allows the members of the group to contribute their ideas together. Such situation is known as "collaboration." They try to brainstorm together towards a common goal.

Please select the word from the list that best fits the definition

Halloween falls on October 31 every year.

Absolute
Or
Qualified

Answers

the best word that fits the definition is absolute.

Answer:

Absolute

Explanation:

Absolute means that it is a for sure thing. Halloween always falls on October 31st no matter what. So, the statement is absolute.

What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the control plane implemented within the same device or in separate devices? Explain.

Answers

Answer:

A control plane which is based on a logically centralized control is one which knows all routing tables that are in the router of the network.

The data plane is made up of different network switches that are very simple and devices are fast. Such devices can carry out executions of of match plus action rules in flow tables. The switch glow table determines and also manages the different servers and softwares of the control plane.

The control plane and data plane are separated and implemented in different devices as it gives more flexibility and unique networking.

A firm uses BitLocker for volume encryption. Normally, BitLocker performs its task well. However, an administrator was recently forced to decrypt and encrypt the entire volume. Why did the administrator take these actions?

Answers

Answer:

The BitLocker keys were compromised

Explanation:

Given that the act of decrypting and encrypting all over is a means of troubleshooting the issue of security in computing operations. Hence, when an administrator is forced to decrypt and encrypt the entire volume, the main reason for such action can be as a result of "BitLocker keys were compromised."

Hence, the right answer, in this case, is that "The BitLocker keys were compromised."

UML gives two ways to show nesting. The first is very ______, as it shows modeling elements physically contained in the package. An alternative nesting _____ is useful when there is a lot of nesting, or complex nesting, that might be confusing to show with embedding. a. graphic, textualb. textual, syntaxc. textual, verbaged. graphic, syntax

Answers

Answer:

d. graphic, syntax

Explanation:

UML (Unified Modeling Language) is a software design standard used to visually describe or represent an object-oriented program. UML helps to organize, plan, and visualize a program as it provides visual documentations in the form of UML diagrams.  UML diagrams divide a software system into components and subcomponents.  In addition to being a universal design standard, it is also widely used and accepted as the language for outlining programs.

I need help picture above

Answers

Answer:

The 2nd one on top and The Star ones.. (sorry if its wrong

Explanation:

“https” at the very beginning of the URL

100+20000000 please give answer and win iPhone 11 pro​

Answers

Answer:

20000100

Explanation:

This semester we have discussed the acronym S.O.L.I.D as it applies to Object Oriented Design and Programming.
The D stands for Dependency Inversion. Briefly explain the meaning of this letter/phrase.

Answers

Answer:

The Dependency Inversion principle is a basic principle of Object Oriented Programming and Part of SOLID principles. It states that: Entities must depend on abstractions, not on concretions. It states that the high-level module must not depend on the low-level module, but they should depend on abstractions

Explanation:

High-level modules, which provide complex logic, should be easily reusable and unaffected by changes in low-level modules, which provide utility features. To achieve that, you need to introduce an abstraction that decouples the high-level and low-level modules from each other.

Basically Dependency introduced interface abstraction between high level and low level modules which terminates their dependency on each other instead now they depend both on abstraction. This principle enables you to change higher-level and lower-level components without affecting any other classes, as long as you don’t change any interface abstractions.

Which are reasons that resource materials are important? Select all that apply.

O They can help you find fast, reliable answers to your questions.

O They are available to you whenever you need them.

O They can be outdated.

O They will save you time in the long run when they come from reliable sources.

Answers

Answer:

Its A B D

Explanation:

Full credit to the person above me, the answer is correct.

When using a touchscreen, which of the following actions is the same as clicking an item?

Answers

the side buttons ?? could u list what the following are-

Answer:

1) Tap the item

Explanation:

Data ____ refers to the accuracy of the data in a database

Answers

Accuracy or quality?

You know the office network is a

Answers

Answer:

it is a..

Explanation:

office for networks?

where they control the network maybe

Discuss which employees and organizations have a deeper level of information assurance (IA) policy compliance.

Answers

Incomplete question. However, I inferred you want to understand what information assurance (IA) policy is.

Explanation:

Put simply, the term Information assurance refers to policies put in place to reduce any risk associated with the use and transfer of information.

In other words, the information assurance (IA) policy of an organization refers to policies drafted by the organization to protect the confidentiality or availability of the organization's internally generated information including that of their users. It is, therefore, also an information risk management policy.

Describe how threat modeling helps development teams build best practices and how it takes preventative measures against attacks?

Answers

Answer:

Answered below

Explanation:

Threat modelling is the process of enhancing network security by seeking out possible threats, breaches and vulnerabilities of the network system. This helps the development team take proactive measures in preventing such breaches.

Threat modelling also helps the development team decide where to focus their resources the most, in making sure of a secured network system. It is a dynamic process whereby software and networks are updated, added and removed.

Aisha designed a web site for her school FBLA club. Which item should Aisha consider for improved responsive design?

a
Adding horizontal scroll

b
Including interesting text

c
Improving image quality

d
Removing horizontal scroll

Answers

A is the correct answer I studied it

The items that Aisha should consider for improved responsive design is a adding horizontal scroll.

What is meant by responsive design?

The term Responsive web design (RWD) is known to be a kind of web creation approach that is said to make a dynamic alterations to the view or appearance of a website.

Conclusively, Note that this often depends on the screen size and also the orientation of the device that is said to be used and as such, Aisha should consider for improved responsive design is a adding horizontal scroll.

Learn more about responsive design from

https://brainly.com/question/25941596

types of charts available in MS Word?

Answers

Pie chart , column charts , line graph, bar charts, area graphs, scatter graphs, stock charts, surface charts, radar graphs, bubble graphs, doughnut chart

Jason wants to add an animated image to his baseball team's web page. Which file format should he use?
GIF
IMG
JPG
MPG
PLZZ HELP THIS IS A BIG PART OF MY GRADE!

Answers

Answer:

Gif

Explanation:

A gif. It’s an animated image.

What does the icon look like to add a new worksheet to the current workbook?
O a paintbrush
O a triangle with an exclamation point inside
O a lightbulb
O a circle with a plus sign inside

Answers

Answer:

A circle with a plus sign inside

Explanation:

I took the test

Consider the following skeletal and JavaScript-like program: function main() { var a, b, w, d; function sub1() { var a, c, w, v; function sub2() { var a, d; } ... } function sub3() { var x, w, v, d; .... } } 4.1. (4 points) List all the variables, along with the program units (sub1, sub2, sub3, or main) where they are declared, that are visible in the body of sub3, assuming that static scoping is used. 4.2. (4 points) List all the variables, along with the program units (sub1, sub2, sub3, or main) where they are declared, that are visible in the body of sub2, assuming that static scoping is used.

Answers

Answer:

A. Sub3 local variables are; x, w, v and d while the visible variables from the main variables; a and b.

B. Sub2 local variables are; a and d while the visible variables from the main and sub1 are; c, b, w and v

Explanation:

The variable name defined with the 'var' in the main is on a global scope to other functions defined in it. But when the same name of the variable is defined in the inner functions, its variable name is overridden with the newly defined variable.

I need help picture above

Answers

Answer:

bank transfer or credit card

Explanation:

Bank or credit card because if your shopping online you can’t use cash

When you hear music, read a printout, or view a video, you are using a computer's

Answers

Answer:

Output device.

Explanation:

An output device can be defined as a hardware device that typically receives processed data from the central processing unit (CPU) and converts these data into information that can be used by the end user of a computer system.

All of the output device of a computer are known as peripheral devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since output devices are peripheral devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of output devices are monitor, speakers, printer, projector etc.

Hence, when you hear music, read a printout, or view a video, you are using a computer's output device.

write an algorithm and draw a flowchart to calculate
2^4 using a loop approach?

Answers

Answer:

I'm not about to write a flow chart for you, but here's a quick demo of how to do it:

doPower(2, 4);

function doPower(base, power){

   var result = 1, p;

   for(p = 0; p < power; p++){

       result *= base;

   }

   return result;

}

That function will only work for positive integer exponents of course.

Concerning network security, an attack that occurs when the attacker is able to learn or observe information that they were not supposed to is known as what?

Answers

Answer:

The answer is "Eavesdropping".

Explanation:

It is a personal discussion or communication with many other folks actually or slowly, without any of the consent of everyone else to gain knowledge. It starts by referring to water, which dropped off the building's roof, instead referring to a field the rain fell. The preacher finally told a person that was inside the house to have a discussion.

Write code which takes two inputs from the user, a number of sides followed by a side length, then creates a regular polygon with that number of sides and side length.Sample run:Type the number of sides:8Type a side length:7.5regular octagon with side length 7.5Hint: Make sure you use the right data types when taking user input.

Answers

Answer:

i need free point sorry lol

Explanation:

Answer:

import java.util.Scanner;

public class Polygon {

       public static void main(String[] args) {

               Scanner sc = new Scanner(System.in);

               System.out.println("Type the number of sides:");

               int sides = sc.nextInt();

               System.out.println("Type a side length:");

               double length = sc.nextDouble();

               if (sides== 5){

                      System.out.println("Pentagon, length "+length);

               } else if (sides == 6){

                      System.out.println("Hexagon, length "+length);

               } else if (sides == 7){

                      System.out.println("Heptagon length "+length);

               } else if (sides == 8){

                       System.out.println("Octagon, length "+length);

                } else if (sides == 9){

                       System.out.println("Nonagon, length "+length);

                 } else if (sides == 10){

                       System.out.println("Decagon, length "+length);

} else if (sides == 11){

                       System.out.println("Undecagon, length "+length);

} else if (sides == 12){

                       System.out.println("Dodecagon, length "+length);

} else {

                       System.out.println("Please choose a valid number.");

               }

       }

}

Explanation:

The Java source code defines a class called 'Polygon' the main method of the class prompts for user inputs for the sides and length variables. The nested if-statement prints the type of polygon with respect to the number of sides.

You would like to store the results of the ps command in a file named process_data. What command should you run?
a. ps | process_data
b. ps < process_data
c. ps > process_data
d. ps << process_data

Answers

Answer:

I'm not quit sure nut I think its b!

Explanation: Hope this helps!

Which file type is best for saving audio files?

a
DOC

b
GIF

c
JPG

d
MP3

Answers

Answer:

d.MP3

Explanation:

Please mark my answer as a brainliest .❤❤❤❤

Answer:

MP3

Explanation:

It is the ONLY audio file out of these 4.

Other Questions
What country does the follow concept apply to their gender roles: Families are male dominated, When a husband dies, leadership of the family usually passes to the oldest son rather than the wife, and Muslim women are often sheltered? Which of these is NOT a power of Congress? What causes the part of earths magnetic field called the magnetosphere to exist? How do you think life might be different in the Andes compared to the Pampas? in which of these processes is food broken down into simpler substances ?a, ingestion.b, digestion.c, absorption.d, assimilation. A student has a container with a volume of 2.5 liters. She estimates the volume to be 2.7 liters. Bywhat percent is the student's estimate off? Lenin promised the peasants he would take Russia out of World War I anda. give the land back to them.c. pay higher wages.b. shorten the work week.d. lower taxes.pls help pls help quickly EMERGENCYLook at the map below and write a paragraph (4-5 sentences) explaining the similarities and differences in geography (physical features of the earth) for the New England, Middle, and Southern Colonies simplify4.810+9.510 Correct answer Gets Brainliest Find the value of x so that the ratios 9 : x and 15 : 40 are equivalent. Where must a bill that is designed raise money originate? PLZ HELP ASAP I WILL GIVE BRAINLY TO THE CORRECT ANSWER!!!!Read this excerpt from a speech about the uses of mushrooms. As you read, think about what information belongs on a notecard.According to the USDA, fungi also play an essential role in creating and maintaining healthy soil that supports the growth of healthy plants. As decomposers, fungi convert hard-to-digest organic material into forms that other organisms can use for food. In fact, many plants depend on fungi to extract nutrients from the soil. Specialized fungi grow on the surface of tree roots or within the root cells of other plants. In exchange for carbon from the plant, these fungi bring soil nutrients to the plant.Plants rely on fungi for more than food, though. Hyphae, the long, microscopic threads of fungus, bind soil particles together to increase the soil's water-holding capacity. In dry conditions, hyphae can even bridge dry gaps between moist areas, piping water and nutrients to a plant's roots.Which option is the BEST example of a note card for a speech?a. Plants supply fungi with carbon in exchange fungi bringing them food and water.b. Plant healthc. According to the USDA, fungi also play an essential role in creating and maintaining healthy soil that supports the growth of healthy plants.d. Decomposed organic matter = plant food. Water transport. 2 friends share 6 waffles equally 22. It takes sunlight 8 minutes to reach the Earth. Calculate how long it takes sunlight to reachNeptune? Pls help its easy and worth 10 pls. The Anti-Federalists favored strong state governments because states had led the American people to victory in the American Revolution. all of the states had already passed bills of rights. they believed that was the best way to protect peoples liberty they believed states would more strongly resist an attempted takeover by Great Britain. Talking with a trusted person about what stresses you is an example of what type of coping strategy? A. expressing oneself B. redirecting energy C. seeking support D. both A and C An engine is operating at 25% of its full power. Which number line shows a point that represents 25%?A. B. What is the sum?8+(-12)-200-4020 Describe how Rome consolidated its power.