1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ratelena [41]
3 years ago
6

Deon would like to add a lot of color to a web page for a local accounting office even though they are a very conservative offic

e. He thinks it would draw people in to look at the page. What would you tell him?
Computers and Technology
1 answer:
Neko [114]3 years ago
4 0
The colors should match the attitude the business would like to present.
You might be interested in
We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that th
Svetlanka [38]

Answer:

i dont know

Explanation:

3 0
3 years ago
Which of the following is the correct order of the SDLC?
Anastasy [175]
I say when in doubt, go with c
3 0
3 years ago
3. How has air - conditioning affected human life?​
meriva

Answer:

Sudden changes in temperature and humidity affect the respiratory system. ... The air circulation can transmit infectious respiratory diseases. Airborne dust and fungi can cause allergic reactions. Air conditioning is associated with chronic rhinitis and pharyngitis, throat irritation and hoarseness.

6 0
3 years ago
You've received an assortment of files along with accompanying hashes to guarantee integrity. Some of the hash values are 256-bi
Ad libitum [116K]

Assuming they all use the same basic algorithm, what might it be SHA-1.

c. SHA-1

<u>Explanation:</u>

As solution hash value for system will used only 160 bit even though performance is bit slower. Normally SHA-1 method been used. Basically there four methods

MD5 is a methods where it checked regularly whether the file system or altered or not. RIPEMD is a method where it store or converts value to 160 bits. SHA1 methods following some security algorithms where it keeps bits in 160 bits with some security crypto or signature

SHA2- this method following some security algorithms where it keeps bit in 256 bits and we have sha384 and sha512. SHA 2 method is not used now days.

3 0
3 years ago
PLEASE HELP 100!!!!!!!!!!!!!!!!!!
Shalnov [3]

I think it is very accurate. Because how it talks about what happened and why. Yes historical accuracy is important in films and in theatre productions because they need the right information. How it looked like. They react weirdly. The influence is that people are glad to see it and could help them get over some of there fears.Theatre actors influence people to try newer things. They actor uses prop to make them look better.The result is people laugh.Nnbecause the props were horrible.

8 0
4 years ago
Read 2 more answers
Other questions:
  • What's usually kept in database?
    7·2 answers
  • What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manu
    9·1 answer
  • Under normal operations, cisco recommends that you configure switch ports on which vlan
    5·1 answer
  • On a chart created in excel, the horizontal axis is also called the ____.
    15·1 answer
  • Where can information on metalworking occupations be found?
    14·2 answers
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • Which type of unshielded twisted pair (UTP) is commonly used in Ethernet 10BASE-T networks, which carry data at a rate of 10 Mbp
    14·1 answer
  • Irene is creating a wireframe of a website she is working on to show her client. In which phase of the development process is sh
    13·1 answer
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • Create a timeline of the evolution of computers and their impact on society
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!