1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
3 years ago
13

WILL GIVE BRAINLIEST! I'm doing a project at school. Does anyone have any good explanations for Digital Art? I need it to be at

least 10-20 sentences long. I already know that digital art is art done on a computer. PLEASE HELP ITS URGENT!
Computers and Technology
2 answers:
likoan [24]3 years ago
8 0
Since you know that it is art on the computer, it is just basically that. You use a program (like paint, or something more advanced) to create a picture, or bring a sketch to life. You can also create art and animation through more complex things such as coding and stuff, but those are some basics. 

Hope this helps you!
kakasveta [241]3 years ago
4 0
If it's digital art you should explain how it works and why it's helpful to you and others. Explain the steps towards digital art and how you shouldn't use it
You might be interested in
4.which pre-defined feature is known as functions in Excel?<br> a.formula<br> b.property<br> c. data
lesya692 [45]

Answer:

I think formula?

Explanation:

8 0
3 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
3 years ago
In a remote control,infrared light( )to control TV<br>a.are used b.is used c.was used​
schepotkina [342]
B. Is used
If this is not the full statement it may be C
6 0
3 years ago
#include
Aloiza [94]

Answer:

#include<studio.h>

#include<conio.h>

void main()

{

char ch;

printf("Enter any letter");

scanf("%c",&ch);

3 0
3 years ago
Why is it important to identify where privacy data resides throughout your it infrastructure?
charle [14.2K]
<span>One of the key elements in reducing the attack surface of an IT enterprise is to determine the location and sensitive nature of all data, especially privacy data which if compromised, could result in litigation, financial loss, or customer confidence loss. Additionally, this information is part of the foundation of when drafting a Disaster Recovery or Business Continuity plan.</span>
7 0
3 years ago
Other questions:
  • Elvis has asked Bonnie out on a date to a baseball game. Elvis is a friend of Bonnie's classmate Ginger and she has met him a fe
    5·2 answers
  • which of the following is not a step of the scientific method A.identifying the problem B.making observations C. making a hypoth
    15·1 answer
  • Computers heat resistant materials breathing systems for fire fighters food-growing technologies improvements in all of the item
    14·1 answer
  • : For each of the following words identify the bytethat is stored at lower memory address and the byte that is storedat higher m
    6·1 answer
  • When describing memory, ____________ is the first component required in the process necessary for retention?
    10·1 answer
  • What resources can be shared over a computer network?
    12·2 answers
  • What should you include in a persuasive speech
    14·1 answer
  • Stephanie would like to know the average number of regular hours worked by her employees. In cell B11, create a formula using th
    8·1 answer
  • What is the CPU's role?
    15·2 answers
  • A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!