1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
10

A design tool helps you plan, evaluate, and explain your ideas to create a product. Some examples of design tools are outlines,

storyboards, idea webs, and sketches.
True
False
An implementation tool carries out the task. We have already discussed implementation tools such as word processing, spreadsheet, and presentation applications. Other tools include skits, songs, posters, videos, websites, and speeches.
True
False
_________show the logical flow of a written document.
A.Outlines
B.Storyboards
A(n) ________ can be thought of as a visual outline, or in some cases a visual play-by-play, of a story.
A.outline
B.storyboard
If you're creating something that's easier to construct by hand, instead of on the computer, you can draw it out and use a scanner (input device) to scan an image of your creation into your computer.
A.True
B.False
Computers and Technology
2 answers:
Marta_Voda [28]3 years ago
5 0
Hey there!

Answers:

1. True
2. Storyboards
3. False

Hope this helps! :)
Arisa [49]3 years ago
4 0
1. True

3. A. outline

4. B storyboard
You might be interested in
Given public class Fishing { byte b1 = 4; int i1 = 123456; long L1 = (long) i1; //Line A short s2 = (short) i1; //Line B byte b2
Aleksandr [31]

Answer:

Line E.

Explanation:

The  given program is as follows:

public class Fishing {

   byte b1 = 4; int i1 = 123456; long L1 = (long) i1;   //Line A

   short s2 = (short) i1;     //Line B

   byte b2 = (byte) i1;     //Line C

   int i2 = (int)123.456;    //Line D

   byte b3 = b1 + 7;     //Line E

   }

In the above code Line E will not compile and give following compilation error:

error: incompatible types: possible lossy conversion from int to byte

This error is coming because in Java b1 + 7 will be interpreted as int variable expression. Therefore in order to make code of Line E work the expression should be type casted as byte.  

The correct code will be as follows:

public class Fishing {

   byte b1 = 4; int i1 = 123456; long L1 = (long) i1;   //Line A

   short s2 = (short) i1;     //Line B

   byte b2 = (byte) i1;     //Line C

   int i2 = (int)123.456;    //Line D

   byte b3 = (byte)(b1 + 7);     //Line E

   }

5 0
3 years ago
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support
grandymaker [24]

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

4 0
3 years ago
What statement is used to close a loop started with a for statement?
liraira [26]
If I get what you are saying then you could use a work like end. :)
5 0
3 years ago
an early type of GUI is created, which includes windows, pop-ups, icons, and menus. What year did this happen? Please help!!! qu
Dahasolnce [82]

Answer:

1979

Sources:

Wired

InventHelp

hope i helped :D

3 0
3 years ago
Without any knowledge of the key, an attacker with access to an encrypted message and the decryption cipher could try every poss
dsp73
A brute force attack. Ciphers should be sufficiently complex for this to be ever successful.
6 0
3 years ago
Other questions:
  • Students recently created a Gaming Club at their school. On Friday of every week, students bring in their gaming consoles (Xbox,
    10·1 answer
  • Susan will be configuring a snort network ids sensor to monitor her subnetwork. she will be using a web-based console interface
    8·1 answer
  • convert the following c code to mips. assume the address of base array is associated with $s0, n is associated with $s1, positio
    14·1 answer
  • "under the control panel, what console contains print management, computer management, and event viewer?"
    11·1 answer
  • The voluntary linkage of computer networks around the world is called the ______.
    7·1 answer
  • Which type of operating system is usually used in personal computers
    13·1 answer
  • Instead of sending an entire file in one big chunk across the​ Internet, __________ is used which dices the file up into little
    12·1 answer
  • PLEASE HURRY!!!!<br> Look at the image below
    8·1 answer
  • Which type of GUI control would be best to use if you wanted the user to select one date from a list of three possible dates to
    5·1 answer
  • 1.Know the BMI of the user. First, the user will input the height in meters and weight in kilograms. After inputting, the inputt
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!