1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
9

What are two key benefits of using software tools for graphic design?

Computers and Technology
1 answer:
wel3 years ago
7 0

Hi PaidBeno,

Two key benfits of using software tool like word or powerpoint give you the oppotunity to crate wonderful graphic designs. One example are the shapes and colors to create specific objects. the second benefit is using all the tabs on word that you can use for art to make it look real.

You might be interested in
Determine the number of character comparisons made by the brute-force algorithm in searching for the pattern GANDHI in the text
leonid [27]

Answer:

Total number of character comparison = 43

Explanation:

Using the Brute force algorithm

The string of n characters is known as text, and the string of m characters is known as the pattern.

From the given information:

The text (n)=THERE_IS_MORE_TO_LIFE_THAN_INCREASING_ITS_SPEED

The pattern (m) = GANDHI

The total no of characters that we have in the text = 47

The total number of characters in pattern = 6

For a brute force algorithm;

Since; the first character of the pattern does not exist in the text, then the number of trials made can be attempted can be expressed as = n – m + 1

= 47 – 6 + 1

= 47 – 5

= 42

Thus; the algorithm will attempt the trial 42 times.

Now, for loop in the algorithm to run 42 times, the G in the pattern will have to align against the for T in the text, and in the last case, it will be aligned against the last space.

On each attempted trial, the algorithm will make one unsuccessful comparison.

However, at the trial at which the G in the pattern Is aligned with the G in the text, there will be two successful comparisons.

Hence, we can calculate the total number of character comparison as follows:

Total number of character comparison = \mathbf{\bigg ( ( 42 -  (no. \ of \  failed \ comparison) ) \times 1 + (1 \times ( Two \ successful \  comparisons) ) \bigg ) }

Total number of character comparison = ( (( 42 – 1) × 1 ) + ( 1 × 2) )

Total number of character comparison = 41 + 2

Total number of character comparison = 43

3 0
3 years ago
Who can help me please? ​
malfutka [58]

Answer:

what do you need help with

4 0
3 years ago
Jonas is an experienced security professional who recently accepted a position in an organization that uses Check Point firewall
vichka [17]

Answer:

CCSA

Explanation:

CCSA is "Checkpoint Certified Security Administrator". This certification is best suited for Jonas.

8 0
3 years ago
which of the following present the most significant obstacle to developing IT security if we consider commerce and marketing?
Dmitry_Shevchenko [17]

Answer:

There is no direct return on investment in building security systems.

Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.

There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.

Explanation:

Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers.  New programs and customized demand of IT systems need customized IT security systems.

4 0
3 years ago
Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?
Tamiku [17]

Answer:

802.11a

Explanation:

802.11a supports bandwidth of 54 Mbps in a regulated frequency spectrum of 5 GHz. 802.11a also referred to as Wi-fi 2. 802.11a is basically costs higher than 802.11b though both were created at the same time. Hence 802.11b is more popular than 802.11a . All of them are developed by IEEE.

4 0
3 years ago
Other questions:
  • kai is interviewing for a job, and the interviewer asks him for an example of skill at cooperating with others. Which example be
    14·2 answers
  • How much space should be allotted to park your vehicle parallel to the curb?
    5·1 answer
  • Tammy is preparing to give a presentation. she would like to view information that will remind her what to say to her audience b
    10·1 answer
  • In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the l
    11·1 answer
  • When the code that follows is executed, a message is displayed if the value the user entersvar userEntry = (prompt("Enter cost:"
    11·1 answer
  • What is word processors​
    8·1 answer
  • A digital computer has a memory unit with 16 bits per word. The instruction set consists of 72 different operations. All instruc
    11·1 answer
  • Is wireless or wired network faster??
    8·2 answers
  • What is a limitation of 5G mmWave, despite its high speed?
    11·1 answer
  • Lots of Ways to Use Math.random() in JavaScript
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!