1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
2 years ago
10

A design tool helps you plan, evaluate, and explain your ideas to create a product. Some examples of design tools are outlines,

storyboards, idea webs, and sketches.
True
False
An implementation tool carries out the task. We have already discussed implementation tools such as word processing, spreadsheet, and presentation applications. Other tools include skits, songs, posters, videos, websites, and speeches.
True
False
_________show the logical flow of a written document.
A.Outlines
B.Storyboards
A(n) ________ can be thought of as a visual outline, or in some cases a visual play-by-play, of a story.
A.outline
B.storyboard
If you're creating something that's easier to construct by hand, instead of on the computer, you can draw it out and use a scanner (input device) to scan an image of your creation into your computer.
A.True
B.False
Computers and Technology
2 answers:
Marta_Voda [28]2 years ago
5 0
Hey there!

Answers:

1. True
2. Storyboards
3. False

Hope this helps! :)
Arisa [49]2 years ago
4 0
1. True

3. A. outline

4. B storyboard
You might be interested in
The Subset Sum problem is a generalization of the Knapsack problem. Group of answer choices True False g
Katarina [22]

Answer: True

Explanation:

Subset sum problem and Knapsack problem can be solved using dynamic programming.

In case of Knapsack problem there is a set of weights associative with objects and a set of profits associated with each object and a total capacity of knapsack let say C. With the help of dynamic programming we try to include object's weight such that total profit is maximized without fragmenting any weight of objects and without exceeding the capacity of knapsack, it is also called as 0/1 knapsack problem.

Similar to knapsack problem, in subset sum problem there is set of items and a set of weights associated with the items and a capacity let say C, task is to choose the subset of items such that total sum of weights associated with items of subset is maximized without exceeding the total capacity.

On the basis of above statements we can say that subset sum problem is generalization of knapsack problem.

4 0
3 years ago
What is the importance of data validation, and how can user data entry errors be reduced or eliminated?
lisabon 2012 [21]

Incorrect data can lead to unexpected program execution results. Data entry errors can be reduced by only accepting valid input, e.g., if a number must be entered, alphabetic characters are ignored. After data validation, error messages can be prompted to the user, requiring him to enter the data again.

5 0
3 years ago
Which technology can be used as a defense against dos and ddos syn flood attacks?
Montano1993 [528]
In terms of websites, there's a service called cloud flare which can prevent DDOS attacks in websites. Other applications you would have to look up. Hopefully this helps!
6 0
3 years ago
An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traf
Sonja [21]

Answer:

B. Full tunnel.

Explanation:

In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.

A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.

On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.

Hence, the full tunnel method is the most secured type of virtual private network.

7 0
2 years ago
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
Other questions:
  • Write a program that uses the function isPalindrome given in Example 6-6 (Palindrome). Test your program on the following string
    9·1 answer
  • A __________ is the column of data in a database that is used as the basis for arranging data.
    8·2 answers
  • Which of the following would be considered a strong password?
    5·2 answers
  • How does Greenscreen work
    10·2 answers
  • This is going to get taken down but I dont care add me on discord cause ima bored<br> -Red-#9847
    12·1 answer
  • Phishing is a broad term that describes any program that is designed to cause harm or transmit information to others without the
    8·1 answer
  • I have lost the watch (that,which) you gave me​
    12·1 answer
  • What would a system unit that is integrated with the display and keyboard would be considered?
    6·1 answer
  • If an if-else statement is true, it will include which kinds of results?
    13·1 answer
  • A(n) ________ is often developed by identifying a form or report that a user needs on a regular basis.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!