Answer:
1.RGB: Best for projects intended to be used on the web or video
Explanation:
On websites or making project RGB combination of colors is used. This combination of colors is used to store images in electronic components.
2. CMYK: best for professional printing projects using process colors
Explanation:
Printing professional use CMYK combinations of color for better printing results.
3.) indexed:The only colors saved are the colors used in the image
To manage digital images we use Indexed mode of colors.
Explanation:
4.) bitmap: uses black and white
Explanation:
bitmap is the combination of the black and white colors. As the images are large in size so that, to reduce the size of the image we store image in bitmap to reduce the size.
5.) gray scale: uses different shades of grey
Explanation:
The different shades of gray colors are found in the gray scale. These shades are used to produce images.
The format painter button in excel copies formatting from one place and it applies it to another
<span>The answer is algorithm, because computer programmers need a programming language that's more similar to their native language. They then write specific steps a computer must take to complete the task at hand. Machine code is not easily memorized and is foreign to most people.</span>
Answer:
The system that will be more prone to attack or vulnerability is the bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.
Explanation:
Solution
If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable to unauthorized persons or individuals.
The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.
With this example, the chances of vulnerability or attacks increases from the following :
- Accounts payable could be disturbed by changing cash in payment false.
- Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
- Transaction fraud like hacking, masquerading are very common in a networked system.