1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
5

The number of colors available in a graphic is referred to as......what?

Computers and Technology
1 answer:
polet [3.4K]3 years ago
4 0

<span>The number of colors available in a graphic is referred to as color depth. Color depth is also known as bit depth. It is the number of bits used to indicate the color of a single pixel, in a bitmapped image or video frame buffer or the number of bits used for each color component of single pixel.</span>

You might be interested in
In the context of in-house software development options, companies that develop software for sale are called _____.
Pavel [41]

A software vendor is an organization specializing in making and selling software for mass or niche markets. 

A software dealer is an organization which sell software produced by others.

Meanwhile, Software distribution<span> is the process of delivering </span>software<span> to the end user. And the person or organization who are responsible for distributing software to others are called as software distributors.</span>

Here the answer is A.

6 0
3 years ago
1. Jaina is a big fan of a popular comic book series, and is so inspired that she decides to write her own story. She starts her
dolphi86 [110]

Answer:

copyright infringement

Explanation:

4 0
4 years ago
1. Information integrity ensures that data can be modified only by appropriate mechanisms.
GrogVix [38]

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

6 0
3 years ago
Read 2 more answers
If there is no computer how would human beings have performed the workk
Katena32 [7]

I’m pretty sure we would do things at the agency would do it because overall th i’m pretty sure we would do things at the agency would do it because overall the agents were actually much smarter than we are literally right now and someways because they use more organic and natural and a whole things like herbs Escentuals would help you more than the chemicals in the flu shots that we take and have chemicals and are bad for the body

3 0
3 years ago
What is the cheapest type of printer to buy and run?
myrzilka [38]
It depends solely on how much you will use it. For example, laser printers are more suitable for offices, schools, and environments, where the printer is used almost constantly. If it's used a lot, you're probably looking at a laser printer, since the cartridges have a slightly higher price, but a much higher yield. If you can't afford a laser printer, and you're only going to use it at home, you're probably looking at an inkjet. If you need to print off something for school, ask your teacher, or someone that works at your school. Some secondary/high schools might allow you to use their printers at a lower price
7 0
3 years ago
Read 2 more answers
Other questions:
  • Both the USB flash drive and the DVD are data storage devices, but they both have numerous differences. Both can contain insane
    6·1 answer
  • ​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
    10·1 answer
  • With respect to PERT and​ CPM, slack A. is a task or subproject that must be completed. B. marks the start or completion of a ta
    9·1 answer
  • find all breweries that specialize in a particular beer style. A brewer is considered specialized if they produce at least 10 be
    5·1 answer
  • What is the use of form in HTML​
    12·1 answer
  • Why is a class an excellent representation of an abstract data type?
    15·1 answer
  • ___ involves connecting geographically remote computers into a single network and combining the computational power of all compu
    14·1 answer
  • Which option is the easiest way to configure macros in Access 2016?
    6·1 answer
  • Please help me excel questions!​
    6·2 answers
  • Who is the king of computers?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!