1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
2 years ago
4

question 4 imagine a designer finishes their prototype in adobe xd. they want to share it with developers. should the designer s

et permissions so that anyone with a link can access the prototype?
Computers and Technology
1 answer:
Pie2 years ago
8 0

Does this file name reflect best practices: A. yes, a file name should include the project name and version.

<h3>What is Adobe Photoshop XD?</h3>

Adobe Photoshop XD can be defined as a software program that is designed and developed to enable the use of an artistic process and tools for the creation of art works or graphic designs such as logos.

Also, Adobe Photoshop is a type of software application which can be used to do the following on image files:

  • Correct color
  • Reduce red eye.
  • Add borders.
  • Change to grayscale.
  • Work with layers

<h3>What is a file name?</h3>

A file name can be defined as a form of title which is given to a file, so as to differentiate it from others and provide some vital information about it such as project name and version.

This ultimately implies that, a file name reflect best practices and should include the project name and version.

Read more on file name here: brainly.com/question/28083624

#SPJ1

Complete Question:

designer wraps up a final prototype of a language learning app in Adobe XD, and wants to share their work with the development team. Before they publish the prototype on the cloud, they name thefile: LanguageApp-Version-Final. Does this file name reflect best practices?

A. Yes, A file name should include the project name and version.

B. No. A file name must include the date, the author, and the version number.

You might be interested in
Can someone please help and answer the 6 questions on the bottom of the page
garik1379 [7]

Ivan rigney

John benson      2

Mark nicholls      4

James  mitchell   7

Paul matthews   13

Neil hooper         8

5 0
3 years ago
__________ refers to the coupling of data stored in files and the specific programs required to update and maintain those files
atroni [7]
I think it is good for the environment
7 0
4 years ago
What do you understand by the terms:<br> I)input<br> ii)process<br> iii)storage<br> iv)output
agasfer [191]

an output device translate information processed by the computer into a form which you can understand.

input device are used to enter information such as letters, numbers, sounds or picture into a computer.

5 0
3 years ago
True or false which cloud storage you can receive your data anytime from anywhere in the world
Fynjy0 [20]
I think false. depends on where you are certain places you can certain you cant. hope this helps.
8 0
3 years ago
A type of authentication that requires the user to provide something that they know, such
bagirrra123 [75]
The answer would be true
5 0
3 years ago
Other questions:
  • Why should you avoid the use of sarcasm cliches and idioms in busniess letters?
    9·2 answers
  • Write code that prints: Ready! firstNumber ... 2 1 Run!
    12·1 answer
  • If you have an application that is not responding and you want to force it to shut down, whichsystem utility can you use?
    8·1 answer
  • Because so many newspapers now have online versions of their publications, many observers feel that "circulation" is an insuffic
    11·1 answer
  • Naseer has inserted an image into his document but needs the image to appear on its own line.
    14·2 answers
  • Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then prel
    8·1 answer
  • Https://meetme.bit.nl/OfficialTrapstarz Join yall its my birthday
    13·2 answers
  • Write any two web browers​
    10·1 answer
  • if you dont' have access to nessus, which of the following can be used by an attacker to gain information about remote *nix host
    11·1 answer
  • What made the digital distribution of both data and visualization more accessible to a broader audience?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!