1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
12

Discuss some design considerations that you should keep in mind when you want to design a professional-looking flyer or newslett

er.
Computers and Technology
1 answer:
iogann1982 [59]3 years ago
3 0
Designs on business flyers should be based on the business' theme and the message that it wants to communicate. <span>A sale should have a design that would attract customers with the discounts they can avail with their purchases. </span><span>
</span>Texts, colors, lines, shapes, and images are the elements that should be figured out depending on the kind of communication that a business would want to share. <span>
</span><span>A sale flyer uses big text to emphasize discounts. Advertising products with amounts should require friendly designs with short and clear-cut messages. Colors can also drive customers and associate it with the kind of product. </span>
You might be interested in
Question #2: How would you demonstrate professionalism in a video call with a teacher? Edmentum Digital world Please Help!!
Stella [2.4K]

Answer:

good luck getting an answer then

Explanation:

5 0
3 years ago
A software development company wants to reorganize its office so that managers and the Computer Programmers they supervise can b
dimaraw [331]
Perhaps instead of cubicles, desks are organized in an open workspace which promotes collaboration (and makes it easier).
7 0
2 years ago
Read 2 more answers
Please help with my Python code - Functions
ollegr [7]

Answer:

Explanation:

see attached for help

7 0
3 years ago
Why is code tracing important when debugging?
larisa [96]

It helps reveal the flow of execution of your program, including results of in-between evaluations. In other words, you can see what your program is doing, and why it takes the decisions it is taking.

If something unexpected happens, the trace will show you the sequence of events that lead to it.

7 0
3 years ago
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
Other questions:
  • An employee who interacts with customers regarding the nature of their car problems, rather than actually working on the vehicle
    12·2 answers
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • Energy is defined as stored energy
    13·2 answers
  • sharon gives a thumbs-up to her little brother who has just scored in his schools basketball game. sharon is communicating by us
    5·2 answers
  • How does technology make America great?​
    10·1 answer
  • Which of the following is the best definition of a workplace policy?
    13·1 answer
  • Click on the _____ tab on the ribbon to open the backstage view.
    7·1 answer
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • Data security issues that must be addressed by hipaa implementation teams include:__________
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!