1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bija089 [108]
3 years ago
10

How are publishing used

Computers and Technology
1 answer:
Irina-Kira [14]3 years ago
4 0

With so many taking advantage of desktop publishing, it difficult to put a finger on what desktop publishing is actually used for. There are many uses of desktop publishing software and this article explains these uses, and more importantly who employs them. Over the years, desktop publishing has taken on many definitions, and many are unaware of its primary use. There is no definite answer and almost everyone can attest to using desktop publishing at some point in their lives. To help us better understand this term, here is a list of the top 5 uses of desktop publishing software.

<span>Graphic Design. </span>This is the number one use for desktop publishing and can be held accountable for why the term has changed so much over the years. Professional graphic designers use DTP programs such as QuarkXPress, Adobe PageMaker, and Adobe Photoshop to create webpages, the front pages of newspapers, and a variety of other visual documentation. Thanks to DTP, graphic design has become more than just pencil and paper. The introduction of desktop publishing has taken graphic design to greater heights. Without desktop publishing, there is no graphic design, and vice versa.


I made  a little research for you.. =)

=))

You might be interested in
Bradley is working on a program that uses different classes in specific relationships. Help him remember what these relationship
Kitty [74]

Answer:

First one is INHERITANCE. Second one is AGGREGATION.

3 0
3 years ago
A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.
Rzqust [24]

It means that thw operating system is up to date with all the lastest protection systems like an anti virus. An example is that the operating system has a built in ransomware protection system ib place.

Hope this help please give the brainliest award

3 0
3 years ago
Hi can yall tell me if my answers r right or wrong and if they are can u tell which ones r correct. And plz explain only if you
ipn [44]

Answer:

they all look correct to me! :)

Explanation:

8 0
4 years ago
What do you think is the most effective way to ensure that code adheres to good coding standards? (1 correct answer)
Stella [2.4K]

Answer:

The code should pass all the unit test cases.

Explanation:

Unit testing is an important step in the development process, because if done correctly, it can help detect early flaws in code which may be more difficult to find in later testing stages.

When there is a development of a software, at that moment there are many small programs, which are developed by coders and, after they are created, those programs are attached together to make a full working system.

The correct option is the code should pass all the unit test cases....

7 0
3 years ago
Read 2 more answers
In the lecture, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why do you
Klio2033 [76]

Answer:

Packets can arrive out of order from the Internet Protocal layer. So,

when out-of-order packets with higher-than-expected sequence number arrives, then gap is detected.

Receiver of an out of order packet would then generate and sends a duplicate acknowledgement (ACK) for already received packet. If retransmission is performed after the first duplicate ACK, it would lead the sender to introduced too many redundant packets in the network.

Hence, TCP designer chose to wait for third acknowledgement (ACK) instead of performing a fast retransmission to avoid redundant packet transmission.

3 0
3 years ago
Other questions:
  • What happened to Henry at the end of Chapter 4 in Bendy and the ink machine?
    9·2 answers
  • Can your computer become infected with a virus via email
    6·1 answer
  • Technology will not? A. change the way work is done B. process information faster C. slow the pace of work D. link companies and
    8·1 answer
  • what are the products of light-dependent reactions? Why are they important in lighy independent reactions?​
    6·2 answers
  • Describe the GRANT statement and explain how it relates to security. What types of privileges may be granted? How are they revok
    15·1 answer
  • Imagine you are building an ATM system; list at least 6 application domains for the system. That is, in which context is the sys
    13·1 answer
  • The type of memory that stores data<br>Currently in used is called​
    8·2 answers
  • Have a good christmas. this might not be homework, but i just want everyone to have a good week
    6·2 answers
  • What report provides data on how specific sections of a website performed?
    6·1 answer
  • When using a self-contained recovery device on a cfc, hcfc, or hfc system with an operating compressor, technicians must?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!