1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
3 years ago
12

Please help!! will fan and medal

Computers and Technology
2 answers:
levacccp [35]3 years ago
7 0
So here are the answers that would best complete the given statements above.
1. <span>The standard resolution for graphics on the Web is 72 dpi.
2. </span> The larger the <span>resolution, the larger the file size.
3. </span>An Inline <span>image is an image that appears on a Web page.
4. File </span><span>size, download times, and the number of colors are factors that will help you decide which graphic format you should use.
5. </span> Adobe Photoshop <span>is an image editing program.
6. The IMG tag </span><span>s used to bring an image into a Web site. 
7. The PNG </span><span>format was the most recently developed popular graphic format. </span>
Volgvan3 years ago
4 0
1. 72ppi
2. higher
3. ?
4. File
5. Photoshop
6. The question is wrong, a program is used to bring image file into a website. An IMG tag is used to bring an image into a web page from it's location specified in the src attribute of the img tag.
7. PNG (Portable Network Graphics)
You might be interested in
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
svetoff [14.1K]

Answer:

Session hijacking

Explanation:

Session hijacking : Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

5 0
3 years ago
Describe how to deploy a website and make it as secure as possible while reducing its resources used
erastova [34]

Answer:

Explanation:

in order to deploy a website, you use these 5 steps, the first step is the preparation step, the second step is to set up DNS record, in step 3 a live testing is set up, in step 4 you set up email accounts while in step 5, you back up and now go live.

in order to secure your website from any threat, malware it hacker it it is necessary to use HTTPS. HTTPS, protects the websites integrity. it also provides data protection as data encryption provides such security. parameterized queries can also be used.

5 0
3 years ago
If I wanted to add code so that the costume of my sprite would change, what menu would I look under to find the "change costume"
Damm [24]

Answer:

D.) Looks

the costume is technically the look of your sprite, so looks is the correct answer

7 0
3 years ago
Technical colleges offer certification in audio engineering through programs that are normally from 2 to 6 months long. False Tr
kompoz [17]

Answer: False

Explanation:

Certification in Audio Engineering equips one with skills needed in the music industry such as being able to record, mix and master sounds as well as knowledge of studio equipment such as microphones, speakers, consoles and the computer software needed to blend all these components together.

As such, it can take a bit of time to learn it adequately enough to be certified.  This is why Technical colleges offer certifications in audio engineering through programs that usually last between 6 months and a year.

6 0
3 years ago
A metallic reflector provides what kind of bounced light
katen-ka-za [31]
<span>a reflector is an improvised or specialised reflective ... Also known as plane reflectors, "flats" or bounce boards, this kind of reflector is located independent of a light source; ... Hence bounce lighting may provide either the primary or secondary (fill) light source, depending on its intensity.</span>
5 0
3 years ago
Other questions:
  • The two types of one-time-password tokens are ______ and ______.
    10·2 answers
  • Presentation software allows business professionals to _____.
    14·2 answers
  • What is heaven backwards?
    11·2 answers
  • How is the numeric string that makes up a digital signature created?
    5·1 answer
  • What does this translate to?: 01001001 01110011 00100000 01100010 01110010 01100001 01101001 01101110 01101100 01111001 00100000
    5·1 answer
  • Which of these conclusions supports the fact that Eclipse is categorized as an IDE?
    8·1 answer
  • What model involves the creation of data and process models during the development of an application
    14·1 answer
  • ¿Por qué es importante aprender a programar?
    9·1 answer
  • Data files whose records are always retrieved in sequence from the beginning of the file are known as
    15·1 answer
  • What is the accurate description
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!