1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zaharov [31]
3 years ago
15

I need Help!! 4. Explain the importance of including negative space as part of a design.

Computers and Technology
1 answer:
vova2212 [387]3 years ago
5 0
Negative space is the space between, within and surrounding an object in an image. The positive space is the focus of the image, the object itself, but the negative space is just as important. It shares edges with the positive space, defining the outline of the object and creating proportion
You might be interested in
PLEASE HELP ASAP!!
inn [45]
The answer is encryption

steganography would be hiding data, like in an image
digital forensics is the analysis done after an attack
and the last one is a security standard
6 0
3 years ago
Identifiy the impact of new technology for your organizations <br>​
Len [333]

Answer:

1)The Sleepwalker Effect. This effect has several dimensions. ...

2)The Transparency Effect. ...

3)The Black Box Effect. ...

4)The Splintering Effect.

7 0
2 years ago
What is a generic phone
Zina [86]

Explanation:

Generic Android Device means the Android devices which does not any specific brand name or they can not be related to any specific class or brand. For ex: Samsung developed Epic 4g Touch Android device but they later removed lot of fancy features and stuffs from it launched with Galaxy S.

3 0
3 years ago
Read 2 more answers
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
Write a C function which takes three parameters which are the cost for an item in a grocery store, the quantity to buy, and the
xeze [42]

Answer:

struct item

{

  float previousCost;

  float taxAmount;

  float updatedCost;

} itemObject;

void calculation(int cost,int quantity,float tax)

  {

      struct item *itemPointer=&itemObject;

      itemPointer->previousCost=(cost) * (quantity);

      itemPointer->taxAmount=itemPointer->previousCost * (tax/100);

      itemPointer->updatedCost=itemPointer->previousCost+itemPointer->taxAmount;

  }

Explanation:

  • Define a structure called item that has 3 properties namely previousCost, taxAmount and updatedCost.
  • The calculation function takes in 3 parameters and inside the calculation function, make a pointer object of the item structure.
  • Calculate the previous cost by multiplying cost with quantity.
  • Calculate the tax amount by multiplying previous cost with (tax / 100).
  • Calculate the previous cost by adding previous cost with tax amount.
4 0
3 years ago
Read 2 more answers
Other questions:
  • What human activity would cause a decrease in the population of another species? (The action of humans would impact one species,
    9·1 answer
  • Peripherals can be used to output information.<br> True<br> False
    9·2 answers
  • Write a pseudo-code that keeps asking the user for a given number 'n' different of zero, then print all numbers between one &amp
    8·1 answer
  • Which type of microscope can only be used to view non-living specimens?
    10·2 answers
  • A network slows down when a network card is locked in a perpetual mode
    12·2 answers
  • Ann wants to save her presentation so she can work on it later. Which device on her computer can store this data long term?
    15·2 answers
  • Write a list comprehension that creates a list containing the numbers that result from the values 1 through 10 being multiplied
    15·1 answer
  • I NEED HELP!!! BRAINLIEST!!!
    14·2 answers
  • Simplest way to start baking career is to attend_______.<br><br><br><br>​
    9·1 answer
  • What are the main advantages of the d-step tuning of 2023 murano’s xtronic cvt®?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!