1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhuklara [117]
4 years ago
11

Desktop publishing design tools are represented by

Computers and Technology
1 answer:
alina1380 [7]4 years ago
5 0

<span>A. icons.
B. windows.
C. trackballs.
D. modems.</span>

Desktop publishing design tools are represented by <span>icons. The answer is letter A. This is the easiest way to access the design tools when in need.</span>

You might be interested in
________ is the application of statistical techniques to find patterns and relationships among data for classification and predi
Finger [1]

Answer:          

Data Mining

Explanation:

  • Data Mining is also called knowledge discovery.
  • It is a computer aided technique of searching and evaluating a bulk of data in order to obtain useful information.
  • This technique searches through the data to find hidden patterns and uses statistical methods to find relationship among data for finding predictive information and for classification of data.
  • This is a mixture of different disciplines which include machine learning, statistics and artificial intelligence and also some mathematical methods.
  • Often the useful information is extracted from enormous database using modeling technique which is used to build a model from instances of the data where the solution is known and later apply this model on the instances where the solution is unknown.
  • In unsupervised data mining, the data analysis is not done by using modeling technique. In other words the labels are provided in order not draw inferences and prediction from data sets. Example is clustering.
  • In supervised data mining the model is developed to make inferences and classification. Example is neural networks.
  • For example data mining is used in Medicine industry to provide more accurate diagnostics and treatments on the basis of patient's medical history , physical examination or different patient tests data.
  • Data mining also makes it possible to manage health resources more efficiently and cost-effectively by detecting risks, predicting diseases in certain sections of the population or predicting hospitalization duration.
4 0
4 years ago
Help, with gaming unlocked
Leto [7]

Answer:

C. empathic understanding

8 0
4 years ago
What occurs when a system produces incorrect, inconsistent, or duplicate data?.
kozerog [31]

Answer: Data integrity issues

Explanation:

8 0
3 years ago
Paula needs to ensure that an animation she has created is repeated. Which option should she use to achieve this?
SCORPION-xisa [38]

Answer:

1.

Explanation:

The option Paula can choose to ensure that the animation she has created in her presentation repeats is the transition. She can find the option of transition from the Transitions tab.

After selecting the Transitions tab, choose the effect you want to create in your presentations. You can also choose the sound of transition, or either you want to create on one slide or all slides, etc.

Therefore, option 1 is correct.

5 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
Other questions:
  • Which statement accurately describes the clutter feature in outlook 2016
    12·1 answer
  • Consider a simple application level protocol built on top of udp that allows a client to retrieve a file from a remote server re
    15·2 answers
  • Two of the goals of community mobilization are getting the community interested and
    6·1 answer
  • Describe the difference between the circumscribed and inscribed options when using the AutoCAD Polygon command
    14·1 answer
  • Hye I'm new branily I don't no use in this aap please follow me​
    10·1 answer
  • How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50
    7·1 answer
  • Which of the following technique is well suited to support very large address space, e.g. 64-bit address space? Select one: a. C
    11·1 answer
  • State 2 advantages of laptops over desktop computers
    11·2 answers
  • Big Chungus is god. prove me wrong.
    10·1 answer
  • A(n) _____ is any group of characters enclosed within either double or single quotation marks in javascript.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!