1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viefleur [7K]
3 years ago
15

what aspect should you consider before adding pictures to a document? you should structure the first before you search for a rel

evant picture
Computers and Technology
2 answers:
vichka [17]3 years ago
7 0

<u>Answer:</u>

<em>Before adding picture to a document, we must first understand the content and choose relevant pictures. </em>

<u>Explanation:</u>

Also, we need to identify how many pictures needs to be inserted for the given content and also consider the amount of space which it is going to <em>occupy in the document, the length of the document and the size of image needs to be taken into consideration. </em>

We must also focus on the type of image file which we are planning to insert. <em>Align the text accordingly so that the insertion of the picture does not disturb the alignment of the picture, etc.</em>

Tanzania [10]3 years ago
7 0

Answer:

It is important to decide which picture will reinforce the main ideas of the document.

Explanation:

Documents mainly express arguments via paragraphs and this has to be kept especially on very formal essays or other academic works, however adding some pictures may be an excellent idea to clarify doubts the reader may have during the reading.  A good writer may add extra content, but it is recommended not to exaggerate on this. Before adding a picture, ask yourself how the picture will be useful to express you ideas better.  

You might be interested in
What is illegal to search on the internet?
Rasek [7]
Child p*rnography, acts of terrorism, how to make bombs ect..
Anything against homeland security.
7 0
3 years ago
Which key is used to indent the first line of a paragraph to the right?
Ivanshal [37]

That would be the tab key

4 0
3 years ago
Read 2 more answers
What are three requirements of information technology a. Accuracyb. _______________________________c. __________________________
Monica [59]

Answer:

1b. Accessibility  1c. Efficiency  1d. Relevance

2. $10 billion

3. False

4. All of them

5. Drone Delivery

Explanation:

1. Information technology is the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information and it must be accurate, accessible, efficient and relevant.

2. Every year about $10 billion is spent on SCM (supply chain management software).

3. supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual delivery to the end user while software are just virtual tools use in the day to day activities.

4. Every activity mention is creating a new demand for the radio-frequency identification technology.

5. Drone delivery

7 0
3 years ago
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Assume that the "read/write file to hard disk" library is part of the kernel. Assume that this library uses 1MB of RAM. Assume t
scZoUnD [109]

Answer:

The Answer is 1 MB.

Explanation:

In order to replace the library it must write 0 MB to hard drive then only it can be replaced. Therefore 1 MB is the correct answer.

5 0
4 years ago
Other questions:
  • Mara's presentation included essential information about the company's new safety procedures. She wanted to make
    13·2 answers
  • Which tables and fields would you access to determine which book titles have been purchased by a customer and when the order shi
    15·1 answer
  • 2<br><br> What combination of keys turns the value in a cell into a percentage?
    12·1 answer
  • How to shutdow computer
    7·1 answer
  • What is the fundamental purpose of sentiment analysis on social media?​
    9·1 answer
  • Need the answer ASAP!!! I’ll mark brainliest if correct
    5·1 answer
  • Multiple Choice: Circle the letter that corresponds to the correct answer.
    12·1 answer
  • A server malfunction has been resolved after replacing a failed hard drive. Enterprise services have been restored. What is the
    5·1 answer
  • Some elementary particles are positively or negatively
    11·2 answers
  • Functions are used to reuse the codes number of times in program
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!