1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
3 years ago
13

You can use this effect to break a color into a percentage of its full strength.

Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
6 0
The answer on this scenario would then be c. drop out. This effect can be done if one wants to break a color into one's percentage of the full strength. Hope this is the answer and would be of big help.
You might be interested in
an existing technology that would allow users to transfer images from the camera to the computer without connecting them
nalin [4]

Answer:

wireless technology i guess??

5 0
3 years ago
Which of the following actions would help people determine their interests?
lorasvet [3.4K]
That depends on what the actions are, and what their personality is like.
8 0
3 years ago
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
3 years ago
Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed comm
Dmitriy789 [7]

Answer:

sed '/march/{d;}' birthdays.txt > result .txt

Explanation:

sed syntax is basically:

<em>sed '/expression/{command;command;...;}' inputfile > outputfile</em>

  • First, for the expression part, we use /march/ to match all lines containing that string.
  • Then for the command part, we only use {d} command to delete every matching line found.
  • The third part contains the input file to process, I have named it birthdays.txt, but it could have been any other file needed.
  • Finally "> result .txt" makes the script output to be saved into a file named result.txt
6 0
3 years ago
What is used for risk response control?
miskamm [114]

Answer:

Risk response control uses methods such as mitigate, avoidance, shift, actively accept, and passively accept.

Explanation:

Risk Response Control refers to the procedure of evaluating residual risks, detecting new risks, guaranteeing the execution of risk plans, and assessing the success of the plans in decreasing risk is known as risk response control. Whereby the risk response control techniques include acceptance, avoidance, transfer, and mitigation

6 0
2 years ago
Other questions:
  • What weight pencil is recommended for darkening lines and for lettering? *
    7·2 answers
  • Are headphones considered a computer? Why or why not?
    13·2 answers
  • Do the shape of a sign gives you a clue about the information contained on the sign
    7·1 answer
  • Technician A says that S-cams can be left or right handed. Technician B says that S-cam foundation brakes can have one or two an
    15·1 answer
  • What conversion factor should be used to convert from meters to Gigameters?
    7·1 answer
  • In which of the following phases of filmmaking would a production team be focused on the
    10·2 answers
  • Which of the following statements best illustrates how value was created for eggs? when a farmer sells a chicken who is no longe
    9·1 answer
  • Which of the following makes Super Mario Run unique?
    6·1 answer
  • In what way, if any, are problems related to conflicts? Problems and conflicts are the same thing. Problems and conflicts are th
    9·1 answer
  • It is important to consider design details when creating an api because: ______________
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!