1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
10

A design tool helps you plan, evaluate, and explain your ideas to create a product. Some examples of design tools are outlines,

storyboards, idea webs, and sketches.
True
False
An implementation tool carries out the task. We have already discussed implementation tools such as word processing, spreadsheet, and presentation applications. Other tools include skits, songs, posters, videos, websites, and speeches.
True
False
_________show the logical flow of a written document.
A.Outlines
B.Storyboards
A(n) ________ can be thought of as a visual outline, or in some cases a visual play-by-play, of a story.
A.outline
B.storyboard
If you're creating something that's easier to construct by hand, instead of on the computer, you can draw it out and use a scanner (input device) to scan an image of your creation into your computer.
A.True
B.False
Computers and Technology
2 answers:
Marta_Voda [28]3 years ago
5 0
Hey there!

Answers:

1. True
2. Storyboards
3. False

Hope this helps! :)
Arisa [49]3 years ago
4 0
1. True

3. A. outline

4. B storyboard
You might be interested in
Can you list one property of each of the following?<br> Excel<br> Word<br> Powerpoint
Rudiy27
Exel is used for graphing, Word for any type of essay or paper, and Powerpoint for presentations.
Hope this helps!
4 0
3 years ago
Read 2 more answers
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
nadezda [96]

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

3 0
1 year ago
What caused accident? into passive voice​
lozanna [386]
Accident was caused by what
6 0
3 years ago
The ip address 221.1.10.53 /24 is a what type of address?
jekas [21]
It is a class C address.  Class C covers all addresses in the range 192.0.0.0 to 223.0.0.0.  The /24 represents the number of network bits in the address so we can work out that the subnet mask of this address would be 255.255.255.0.
8 0
3 years ago
Is mayonnaise technically an instrument?
stich3 [128]
No it doesn’t count as an instrument
7 0
3 years ago
Other questions:
  • Write a program that takes two ints as input from the keyboard, representing the number of hits and the number of at bats for a
    10·1 answer
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • You will write a program that reads a binary file that contains records of creatures. Each record can be stored in a Creature st
    10·1 answer
  • Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks
    15·1 answer
  • What steps should Jeremy take to get himself motivated to study for the test?
    12·2 answers
  • What is the purpose of the operating system's processor management function?
    14·1 answer
  • While troubleshooting a network connection problem for a coworker, you discover the computer is querying a nonexistent DNS serve
    13·1 answer
  • Partes de la ventana principal de Microsoft excel 2013 con sus respectivas funciones
    14·1 answer
  • The sequence of Figures shows a pattern. if the pattern repeats, how many triangles will the figure 5 have ?​
    7·1 answer
  • Cara is cleaning her computer when she notices a loose cable connecting to her printer. Which two ports would the cable most lik
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!