1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
12

In powerpoint, what is line thickness measured in?

Computers and Technology
1 answer:
katrin [286]3 years ago
5 0
Impasto. Hope this helps!
You might be interested in
Which of the following best describes open-source web browsers?
Lostsunrise [7]
<span>Following are some best open source CRM software: Really Simple Systems
</span><span>Bitrix24 Raynet SuiteCRM vTiger 
</span>
is this what you are asking for
4 0
3 years ago
Read 2 more answers
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
ankoles [38]

<u>Explanation:</u>

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major <u>advantage</u> of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main<u> disadvantage</u> of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. <u>A major </u><u>advantage</u><u> of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), </u><u>a disadvantage.</u>

6 0
3 years ago
Data is physically transmitted from one computer or terminal to another in the ________ layer. physical transport application te
omeli [17]

Answer:

The correct answer to the following question will be "Physical".

Explanation:

  • The lowest layer of the OSI model is the physical layer. It's in charge of transferring bits through one device to the next.
  • This layer isn't worried about the importance of the components and deals with setting up a connection to the node of the network and transmitting and receiving a signal.

Therefore, the Physical layer is the right answer.

7 0
4 years ago
What other viruses, Trojans, worms, or malicious software were identified and quarantined by AVG within the Virus Vault
schepotkina [342]

Answer:

Exploit, trojan horse dropper

Explanation:

When using AVG AntiVirus Business Edition to scan a computer system, it is expected that the AntiVirus application will recognize the viruses, worms, Trojans, malware, and/or other malicious software that is present in an infected PC device.

These other viruses, Trojans, worms, or malicious software that were identified and quarantined by AVG within the Virus Vault are: Exploit, trojan horse dropper

5 0
3 years ago
Consider the following class definition.
erik [133]

Answer:

public int getX()

Explanation:

From the question, we understand that the value is to be accessed in other classes.

This implies that we make use of the public access modifier. Using the public modifier will let the instance variable be accessed from other classes.

Also, we understand the return type must be the variable type of x. x is defined as integer. So, the constructor becomes public x

Lastly, we include the constructor name; i.e. getX().

Hence, the constructor is: <em>public int getX()</em>

3 0
3 years ago
Other questions:
  • Defination of computer Software​
    7·2 answers
  • 6. Which of the following options is used to view a computer's memory properties?
    8·1 answer
  • Your environment includes many users who print documents often. A single print device isn't sufficient. You need a "printer pool
    7·1 answer
  • A child with suspected sleep apnea was given an apnea monitoring device to use over the next month. The device was capable of re
    6·1 answer
  • Which is a requirement for searching for a template
    14·1 answer
  • What animal does maleficent transform into in order to defeat prince phillip?
    13·2 answers
  • What line of code makes the character pointer studentPointer point to the character variable userStudent?char userStudent = 'S';
    5·1 answer
  • A chain of dry-cleaning outlets wants to improve its operations by using data from
    7·1 answer
  • Writea SELECT statement that uses the ranking functions to rank products by the total quantity sold. Returnthese columns:The pro
    6·1 answer
  • I don't understand this
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!