1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
4 years ago
12

Please help!! will fan and medal

Computers and Technology
2 answers:
levacccp [35]4 years ago
7 0
So here are the answers that would best complete the given statements above.
1. <span>The standard resolution for graphics on the Web is 72 dpi.
2. </span> The larger the <span>resolution, the larger the file size.
3. </span>An Inline <span>image is an image that appears on a Web page.
4. File </span><span>size, download times, and the number of colors are factors that will help you decide which graphic format you should use.
5. </span> Adobe Photoshop <span>is an image editing program.
6. The IMG tag </span><span>s used to bring an image into a Web site. 
7. The PNG </span><span>format was the most recently developed popular graphic format. </span>
Volgvan4 years ago
4 0
1. 72ppi
2. higher
3. ?
4. File
5. Photoshop
6. The question is wrong, a program is used to bring image file into a website. An IMG tag is used to bring an image into a web page from it's location specified in the src attribute of the img tag.
7. PNG (Portable Network Graphics)
You might be interested in
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
yaroslaw [1]

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

3 0
4 years ago
Read 2 more answers
Write a function called quadruple that quadruples a number and returns the result. Then make several calls to the quadruple func
valentina_108 [34]

def quadruple(n):

   return n*4

print(quadruple(3))

print(quadruple(1))

print(quadruple(2))

I wrote my code in python 3.8. I hope this helps.

7 0
3 years ago
A bitmap picture can be represented by hexadecimal numbers. Each two-digit hexadecimal number represents a row. To convert a num
adelina 88 [10]

Answer:

answer C. 00 38 44 etc.

Explanation:

Divide the bitmap in horizontal strips of 4 pixels (let's call them nibbles).

Use the following table to map each nibble to a hexadecimal number where 0 =white, 1=black:

0000 = 0

0001 = 1

0010 = 2

0011 = 3

0100 = 4

0101 = 5

0110 = 6

0111 = 7

1000 = 8

1001 = 9

1010 = A

1011 = B

1100 = C

1101 = D

1110 = E

1111 = F

4 0
3 years ago
Display ad traffic from mobile devices may appear to be unprofitable, but the ads might be profitable if
Svetlanka [38]

Answer:

They meet required amount of traffic or clicks.

Explanation:

AdSense is an advertisement platform for businesses. It advertises the registered business on various target client platform like mobile app and web app who allow these adverts for profit with a commission rate for a certain amount of traffic generated from the platform on the advertised business.

6 0
3 years ago
What is number system??​
lubasha [3.4K]

Answer:

It is a writing system that is, a mathematical notation for representing numbers of a given set, using digits or other symbols in a consistent manner

4 0
3 years ago
Other questions:
  • Melissa is visiting a Web page that her co-workers frequently update throughout the day. If she wants o make sure she has the mo
    11·1 answer
  • What is heaven backwards?
    11·2 answers
  • You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o
    6·1 answer
  • If the last digit of a 2's complement binary number is 0, then the number is even. If the last two digits of a 2's complement bi
    7·1 answer
  • Which characteristic of a relational database distinguishes it from a flat file?
    5·1 answer
  • What are the basic features of Usenet group
    15·1 answer
  • Join my among us code<br> SHUHZF
    6·2 answers
  • 2. BIOS is contained in ROM and not in RAM. Can you guess why?​
    15·1 answer
  • Would you rather be rich and unknown or famous and poor
    9·1 answer
  • How do IT Support professionals measure success? Choose all answers that apply. You will get credit for all answers that are cor
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!