1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
15

What refers to the use of technology to create product styles and designs?

Computers and Technology
1 answer:
torisob [31]3 years ago
8 0
The answer is graphic design
You might be interested in
Given two int variables , firstplacewinner and secondplacewinner, write some code that swaps their values . declare any addition
Mekhanik [1.2K]
Int tmp;
tmp = firstplacewinner;
firstplacewinner = secondplacewinner;
secondplacewinner = tmp;
5 0
3 years ago
How can parents be health educators in family​
Fudgin [204]

Answer:

They can be health educators in family because they are your parents.

Explanation:

The reason why is because since they are your parents that means they have kids, so they probably know the ins and outs of parenting and running a family.

7 0
3 years ago
Hellpppppppppppppppp
jonny [76]

Answer:

i can't see your problem

6 0
2 years ago
Read 2 more answers
What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sen
defon

Co-Ordination Difficulty: ...
Waste of Resources: ...
Larger Interests of the Enterprise Neglected: ...
Emergency Decision not Possible: ...
Lack of Qualified Managers: ...
Certain Activities Decentralization not Possible:
8 0
3 years ago
In Microsoft Windows, which of the following typically happens by default when a file is "double-clicked"
Elenna [48]
Depending on the type of file, it normally runs or opens.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Microsoft access does not create n:m relationships because microsoft access creates databases based on
    7·1 answer
  • Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance
    10·1 answer
  • Please help I really need it
    7·1 answer
  • . What type of computer implementation does the following code represent? Load A,10 Load B,1:5 Add A,B STORE A, [20]
    5·1 answer
  • Write a program to generate following series in qbasics 100,81,64,....1​
    13·1 answer
  • What helps you evaluate websites for reliable information?
    15·2 answers
  • When is 1600 plus 25 and 1700 minus 35 the same thing?​
    10·1 answer
  • How does a programmer use digital waves to transfer sound?
    11·1 answer
  • HELP THIS IS SO DIFFICULT
    10·2 answers
  • An end-user license agreement protects _____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!