1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
10

Which color is considerd to be a cool color?

Computers and Technology
2 answers:
scZoUnD [109]3 years ago
8 0
It depends on personal tastes and what it's applied on.

For example: I like Blue. I think Blue is cool! But, I also think red is cool, on a sports car. I think it would have to be Red, but thats what I think. The same with orange. Green for a T-Shirt is cool as well!

Remember that if you want to find out what color someone likes, just ask them. Generally though, Red is considered to be cool for most things.
muminat3 years ago
5 0
If you are talking about warm and cool colors, a good example of a cool color would be blue. An example of a warm color would be red. The right side of this diagram shows many colors considered to be more cool than warm.

You might be interested in
Jaboooo helloooo are u there
Fed [463]
?????????????????????
8 0
3 years ago
Read 2 more answers
Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?Ethical Decision
ratelena [41]

Answer:

Explanation:

1. Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that?

Answer:

Before the discussion, Fred, Gladys, and Charlie focused on other ends in regards to information security. Fred was more concerned with adding additional software to fix the malware issues when clearly there were easier steps that need to be taken

2. How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance?

Answer:

Gladys’s performance should be based on the new security measures and protocol that she has in place for the organization. This of course, is putting a lot of trust into Charlie’s performance as she was the one to introduce Charlie with his new plan on the organization’s new security. She practically had him nominated for CIO.

3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?

Answer:

Before considering outside threats, internal threats should be looked into early in the planning process. Internal threats does not necessarily mean that the employees have malicious intent, but the case of human error and failure can also be a negative contribution to cyber security. Creating a security program and education end users by creating a security policy guidance is one of the the best ways to prevent simple cyber security issues from starting

Instead of Charlie being named CISO, suppose instead that Fred hired his son-in-law, an unemployed accountant, to fill the role. Assuming the person had no prior experience or preparation for a job in information security, did Fred make an ethical choice? Explain your answer.

Answer:

Absolutely not! By hiring an unexperienced family member over a trained professional, Fred is letting his emotions get the better of him. Fred should consult with Gladys on whether his son-in-law is good candidate for the position or not. Rather than sacrifice company security, Fred could possibly find his son-in-law a position in the companies’ financial or human resources departments.

8 0
3 years ago
The music is the soul who says this
Crazy boy [7]

Question:the music is the soul who says this

Answer: Arthur Schopenhauer

Explanation: he says music is the language of feeling and of passion

question answered by

(jacemorris04)

4 0
3 years ago
Wht is RAM called Random Access memory and ROM IS called Read only memory​
nasty-shy [4]

Answer: Computer memory is of two basic type – Primary memory(RAM and ROM) and Secondary memory(hard drive,CD,etc.). Random Access Memory (RAM) is primary-volatile memory and Read Only Memory (ROM) is primary-non-volatile memory.

Explanation: Hope this helps :)

6 0
3 years ago
Which of the following arguments are valid? Explain your reasoning
klio [65]

Answer:

a) the Statement is Invalid

b) the Statement is Invalid

Explanation:

a)

lets Consider, s: student of my class

A(x): Getting an A

Let b: john

I have a student in my class who is getting ab A: Зs, A(s)

John need not be the student i.e b ≠ s could be true

Hence ¬A(b) could be true and the given statement is invalid

b)

Lets Consider G: girl scout

C: selling 50 boxes of cookies

P: getting prize

s: Suzy

Now every girl scout who sells at least 50 boxes of cookies will get a prize: ∀x ∈ G, C(x) -> P(x)

Suzy, a girl scout, got a prize: s ∈ G, P(s)

since P(s) is true, C(s) need not be true

Main Reason: false → true is also true

Therefore the Statement is Invalid

7 0
2 years ago
Other questions:
  • Common icons found on the Windows desktop are _____.
    6·2 answers
  • Which sentences in the passage correctly describe a function?
    11·1 answer
  • 4. Who developed the first design technology program which had a
    12·1 answer
  • The various online technology tools that enable people to communicate easily via the Internet to share information and resources
    5·1 answer
  • Working for the Internal Revenue Service is a career in public safety. A. True B. False
    14·1 answer
  • How can you create an illusion of spatial depth in a two-dimensional design?
    15·1 answer
  • What are the process of boots up a computer?​
    15·2 answers
  • Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?
    14·2 answers
  • Which option should you choose to change the background of your current slide?
    10·2 answers
  • This function returns the length of a string:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!