1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
4 years ago
15

Help me please will give credit to the right answer

Computers and Technology
2 answers:
MissTica4 years ago
5 0

Answer:

the answer should be A that's the best

Alenkasestr [34]4 years ago
3 0
It’s A resource planning
You might be interested in
The two roots of a quadratic equation ax^2 + bx + c = 0 can be obtained using the following formula:
Feliz [49]

Answer: ion k

Explanation:

4 0
3 years ago
Jamal is a graphic designer.a. What hardware tool would you suggest for his computing system? Include an explanation and the cos
Schach [20]

Answer:

Mac computer is the correct answer for option "a" in this question.

Adobe flash is the correct answer for option "b" in this question.

Mac OS  is the correct answer for option "c" in this question.

Explanation:

  • Hardware: Graphic designers must use Mac computers for the best graphic designing.

They support many of the software programs, graphic designers use. Whether the graphic designer chooses Mac or PC, it is important that the computer have a fast processing speed, large amount of hard drive storage and large monitor.

  • <u><em>Cost:</em></u> Approx $5999
  • Software:  Graphic designers must use Adobe flash for the best graphic designing.

Adobe flash help designers easily take graphic design to the Web using basic HTML language.It also helps in motion graphics,web designing etc.

  • <u><em>Cost:</em></u> Adobe Flash is free to install and use. Adobe Flash editing software starts at $99.
  • Operating system: Graphic designers must use Mac OS for the best graphic designing. Mac OS supports most of the software programs and  it inspired Microsoft Corporation to develop its own GUI.
  • <u><em>Cost:</em></u> The current version of Mac OS X costs $29.99 from the Mac's App Store.

3 0
4 years ago
Which of the following characters is acceptable to use in a filename
Rama09 [41]
You never stated the possible answer choices to your answer, but usually in a filename you can use all letters of the alphabet, but you cannot use any symbols. such as backslashes, percentage signs etc., but underscores you can use, since they can be used for spacing 2 seperate words.
4 0
3 years ago
Read 2 more answers
Clickstream tracking tools collect data on customer activities at web sites (true/false)?
Galina-37 [17]

Clickstream tracking tools collect data on customer activities at websites- true.

<h3>what is the website?</h3>
  • A website, often known as a website, is a collection of web pages and associated material that is published on at least one web server and given a shared domain name.
  • The World Wide Web is the aggregate name for all publicly accessible websites.
  • A company's internal website for its workers is an example of a private website that can only be viewed via a private network.
  • Most websites focus on a single subject or objective, including news, education, business, entertainment, or social networking.
  • The navigation of the website, which frequently begins with a home page, is aided by hyperlinks between web pages.

To learn more about website, refer to the following link:

brainly.com/question/9060926

#SPJ4

3 0
2 years ago
Changing the content of a Web site with the intent of leaving a distinguishing mark or changing its appearance is __________. A.
Zigmanuir [339]

Answer: A)Website defacement

Explanation: Website defacement is the type of attack that is done on the website that works for the changing of the appearance or display of the particular site,. This is a unauthorized act that is done by the attackers or hackers to change the website and marking it with their own site.

Other given option are incorrect because they deal with display change of site rather a other types of the system attacks.Thus , the correct option is option(A).

3 0
3 years ago
Other questions:
  • The content of each content page that uses a master page is stored in the ________________ of the master page.
    6·1 answer
  • A touch screen is classified as a special type of scanning device true or false
    15·1 answer
  • Which of the following software costs money?
    6·2 answers
  • How do you activate the Slicer Tools contextual tab?
    13·1 answer
  • Identify ways you can manage a project using project management software
    14·1 answer
  • A chef writing up her famed recipe for beef stew realizes she has switched parsley and oregano everywhere in the recipe. The che
    13·1 answer
  • Create ER Models &amp; Normalization for the following scenarios:
    5·1 answer
  • Write a script that will calculate a person’s weight on each planet of the solar system, the sun, and the moon. You should creat
    11·1 answer
  • Enter function in cell I6 that determines average salary of all full time employees with at least one dependent
    11·1 answer
  • 43
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!