1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shalnov [3]
3 years ago
12

What is intensity? this is for digital arts

Computers and Technology
1 answer:
vladimir2022 [97]3 years ago
6 0

Intensity is the brightness of a color. When a color is not mixed with any black or white it is at full intensity; Also called a pure hue. You can also change the intensity of a color by adding its complimentary color.

Hope this helps

You might be interested in
Which type of drawer has three dispensing modes: single-dose, multi-dose, and matrix?
ad-work [718]

Answer:

CUBIE MiniDrawer Bin

Explanation:

MiniDrawers comes in two configurations, and each fitting comes in one drawerslot. The MiniDrawer (1-6) comes with the most primary pocket dimensions. And we have the 18-tray MiniDrawer (1-8) comes with another dimensions in its basic form. You will in fact find various pocket dimensions like 1,2,3,4,6,12, and these comes within the 18-tray and 6-tray MiniDrawers. And they come in all the dispensing modes mentioned in the question. Hence, the above answer. The answer is clear from the options as well, and since it has the matrix mode as well apart from single dose mode and multi dose mode.

6 0
3 years ago
The process of engineering design typically starts with what ?
klemol [59]

The process of engineering typically starts with brainstorming.
6 0
2 years ago
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
1 year ago
What is a constructor? Why would you include a constructor in a class?
QveST [7]

Answer:

Constructor in the class is the member function that gets into action when any new object gets created in the class ,it gets invoked. It does not have any return type and no void return.

The constructor is used in the class because there is the requirement for the initializing of the new object and then only object can do the functioning in the program.

4 0
3 years ago
You open a web page and log into your email. The traffic travels over many routers. What protocol will the routers use to determ
exis [7]

Answer:

Border Gateway Protocol is a protocol the routers use to determine the most optimal path to forward the traffic.

Explanation:

BGP is a path vector protocol which chooses the most optimal path. The protocol decides core routing decisions based on path, configuration and network.

This protocol gives all the notification about the status of the connection and router.

It is used to routing in an autonomous system and provides ways to measure the effectiveness of configuration.

6 0
2 years ago
Other questions:
  • major m,ajorrr points helpppppppppppppppppppppppppppi have a question i hit a few buttons and now my computer is saying everythi
    11·2 answers
  • If we have a priority queue storing approximately million numbers, and the bottom level is "full", which of the following statem
    9·1 answer
  • IF ACCURATE = BRAINLY (if u answer rubbish randomness= reported AND if you got questions dont ask in answer slot= reported)
    13·1 answer
  • Indicate the time efficiency classes of the three main operations (i.e., FindMax, DeleteMax, and Insert) of the priority queue i
    11·1 answer
  • What does a page break do?
    13·1 answer
  • write a pay-raise program that requests a person's first name, last name, and current annual salary, and then displays the perso
    6·1 answer
  • How can injection attacks be prevented? Check all that apply
    6·2 answers
  • Launa is reviewing several videos from her friends doing the latest dance challenge before they are published on their own
    11·1 answer
  • Answer any one: write a computer program:which you know.​
    6·1 answer
  • This isn't an academic question, but can anyone help me change the face on my apple watch to a picture from my camera roll? I've
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!