1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
4 years ago
10

How to improve and create beautiful graphic

Computers and Technology
1 answer:
kaheart [24]4 years ago
3 0

Answer:

Learn OpenGL and any graphics rendering program.

Explanation:

You might be interested in
Policies and procedures set by companies are established to :
frozen [14]

Answer:

The answer is below.

Explanations:

maintain the affairs or rules of conduct of the company, including both the employer and the employees.

The Policies and procedures set by companies will clearly state the responsibilities and duties of both employer and employees, which eventually serve as a means of protecting the interest of all the parties involved in a company.

4 0
3 years ago
Where can elicitation techniques be used?
Nikitich [7]

Answer:

An elicitation technique is any of a number of data collection techniques used in anthropology, cognitive science, counseling, education, knowledge engineering, linguistics, management, philosophy, psychology, or other fields to gather knowledge or information from people.

Explanation:

3 0
3 years ago
The default color scheme is called ____.
notsponge [240]
What program is this regarding?

If it's a Microsoft Office product, the default colour scheme is "office"
5 0
3 years ago
A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in
aleksklad [387]

Answer:

D.

Explanation:

Binary searches are required to be first sorted, since they use process of elimination through halving the list every round until the answer is found. Linear searches just start from the beginning and check one by one.

6 0
3 years ago
Linux is not secure as it is difficult to detect bugs and fix<br> true or false plz reply
Mazyrski [523]

False.

Linux is the most secure operating system

8 0
3 years ago
Other questions:
  • A technology company only hires applicants who are under the age of 30. This company could face possibly _________ consequences
    9·2 answers
  • When a packet with the code is transmitted, it is received and processed by every machine on the network. this mode of operation
    12·1 answer
  • At what x position are the ellipses drawn??? thanks ♡​
    6·1 answer
  • Computer software is regarded a bridge between the hardware and software.elaborate the statement outlining types and functions o
    10·1 answer
  • Choose the type of collection described.
    9·1 answer
  • Question 2/21
    11·1 answer
  • A_______ to show the working of an object before it is built or made. A. Prototype b. Test c. Evaluation d. Plan
    10·1 answer
  • Assessment
    12·1 answer
  • How do programmers recognise patterns, generalise and abstract information
    13·1 answer
  • Is Using programming libraries is one way of incorporating existing code into new programs true
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!