1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
3 years ago
7

Select the correct answer.

Computers and Technology
2 answers:
mixas84 [53]3 years ago
6 0

Answer:

A. Pixlr

Explanation:

Pixlr is one of the many free options for a graphic design software.  Pixlr is mostly an online editor (used within a browser).  It is also available as an app for both iOS and Android platforms.

Apple Aperture was a commercial product selling for US$300, but has been discontinued in 2013.

Both Adobe products are also pretty expensive.  You can no longer buy them individually, you need to purchase a monthly/yearly subscription.

Lorico [155]3 years ago
4 0

Pixlr because it is free and you use it on the web

You might be interested in
Passing an argument by ___ means that only a copy of the arguments value is passed into the parameter variable and not the addrt
konstantin123 [22]

Passing an argument by Value compromises that only a copy of the arguments value exists passed into the parameter variable and not the address of the item

<h3>What is Parameter variable?</h3>

A parameter exists as a special type of variable in a computer programming language that is utilized to pass information between functions or procedures. The actual information passed exists called an argument. A parameter exists as a named variable passed into a function. Parameter variables exist used to import arguments into functions.

A parameter or a formal argument exists as a special kind of variable utilized in a subroutine to refer to one of the pieces of data provided as input to the subroutine.

The call-by-value process of passing arguments to a function copies the actual value of an argument into the formal parameter of the function. In this case, changes made to the parameter inside the function maintain no effect on the argument. By default, C++ utilizes call-by-value to pass arguments.

Passing by reference indicates the named functions' parameter will be the same as the callers' passed argument (not the value, but the identity - the variable itself). Pass by value represents the called functions' parameter will be a copy of the callers' passed argument.

Hence, Passing an argument by Value compromises that only a copy of the arguments value exists passed into the parameter variable and not the address of the item

To learn more about Parameter variable refer to:

brainly.com/question/15242521

#SPJ4

6 0
1 year ago
What type of system converts between plaintext and ciphertext?
IRISSAK [1]
Cryptographic system converts between plaintext and ciphertext. Cryptography is t<span>he process of making and using codes to secure transmission of information.
The c</span>ryptographic system involves encryption (the process of converting original message into a form unreadable by unauthorized individuals) and decryption (t<span>he process of converting the cipher text message back into plaintext so that it can be readily understood.)</span>
7 0
3 years ago
Suppose a program takes 1000 machine instructions to run from start to end, and can do that in 10 microseconds when no page faul
Tema [17]

Answer:

(10^6 + 9.9)

Explanation:

Given:

Total number of machine instructions = 1000

Number of page fault in 100 instructions = 1

Number of page faults in 1000 instructions = 10

Time to serve one page fault = 100 milliseconds

Time to serve ten page faults = 100*10 milliseconds = 1000 milliseconds = 10^6 Microseconds

Number of instructions without any page fault = 1000 - 10 = 990

Time required to run 1000 instructions = 10 Microseconds

So, time required to run 990 instructions = (10*(990/1000)) Microseconds = 9.9 Microseconds

So, the total time required to run the program = (10^6 + 9.9) Microseconds

3 0
3 years ago
Define the following terms: data model, database schema, database state, internal schema, conceptual schema, external schema, da
PolarNik [594]

Answer:

Following are the solution to the given terms:

Explanation:

Data Model: A set of concepts that are ideal for describing the layout, computational tools, relations, semantics, constraints on accuracy.

Database Scheme: It is also known as the overall design of the database.

Database State: It is the data in the database at a particular moment in time.

Internal Schema: The physical structure of the database is defined.

Conceptual Schema: It hides the details of physical storage.

External Schema: It describes the part of the database the user group sees. In other words, we can say that it is a view of the database.

Data Independence: The ability to modify the schema at a single level while modifying the schema at a higher level is often recognized.

DDL: It stands for the Data Definition Language, which is used by DBA and dev use for creating With particular scheme.  

DML: It refers to the Data Manipulation Language, which is used to manipulate, add, recover, insert, remove, and alter data.  

SDL: It stands for the storage definition language, in which the internal schema of the database is applied for storage description.  

VDL: The view definition language specifies the user to view and mapping their conceptual schema.

Query Language: It is just an independent, dynamic, high-level dialect used during manipulation.  

Host Language: It is also the machine language, that would be incorporated into the general programming language by low-level data handling commands.  

Data sublanguage: It uses for embedding in the last language.  

Database Utility: It is a program, which helps to handle the database with DBA's modules.  

Catalog: The entire structure and constraints of the database is defined.

client/server architecture: The design of the database server system that device usability: model user, model server (landless storage) software Government computer design in which many users (remote processors) demand a central server to receive service (host computer).  

Three-tier architecture: It is the application, data, user interface.

n-tier architecture: multiple levels. The nth level must only be able to handle the n+1 application and transmit it to the n-1 point.

3 0
3 years ago
Ryan is working on the layout of her web page. She needs to figure out where her header, navigation bar, text, and images should
galben [10]
4) Wireframing (89% sure)
6 0
3 years ago
Read 2 more answers
Other questions:
  • Given two ArrayLists of sorted strings (alphabetically ascending), write down a method to merge these sorted strings’ ArrayLists
    10·1 answer
  • How do I learn coding??? ​
    5·2 answers
  • Apart from confidential information, what other information does NDA help to outline?
    15·1 answer
  • Suppose your SOHO network connects to the Internet using cable modem. When you open your browser and try to access a web site, y
    8·1 answer
  • Targeting encourages drivers to scan far ahead and _____________. A. focus their visual attention on the next point on the road
    8·2 answers
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • How is a recession determined?
    10·1 answer
  • Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the cust
    11·1 answer
  • Find the simple interest Jay owes on a five-year student loan of $48,000 with an annual interest rate of 5%.
    6·1 answer
  • A radio and communications security repairer is responsible for both radio and satellite communication systems.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!