1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tia_tia [17]
3 years ago
15

What is a butt cap? (0.5 points)

Computers and Technology
1 answer:
777dan777 [17]3 years ago
5 0

Answer:

Butt cap chops off the stroke at the end.

Explanation:

Stroke end are called caps, other parts of a stroke are joins and dashes. There are three types of caps used in Computer graphics design, they are;

Butt cap, round cap and projecting cap.

You might be interested in
Create a Produceclass that hasan instance variable of type Stringfor the name, appropriate constructors, appropriate accessor an
Nezavi [6.7K]

Answer:

you suck

Explanation:

5 0
3 years ago
Is designed to access a computer or operating system without the knowledge or permission of the user.
kramer

Answer:

Spyware

Explanation:

Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

5 0
2 years ago
All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not
7nadin3 [17]

Answer: Dereferencing a variable that is not a pointer

Explanation:

The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.

Some of the reasons for a fatal execution-time error include:

• Dereferencing a pointer that has not been initialized properly

• Dereferencing a null pointer

• Dereferencing a pointer that has not been assigned to point to a specific address.

It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.

6 0
2 years ago
How does segmenting your network increase network security?
lys-0071 [83]

Answer:

By segmenting networks, it becomes easier to protect the most sensitive data that you have on your internally-facing network assets. The creation of a layer of separation between servers containing sensitive data and everything outside of your network can do wonders to reduce your risk of data loss or theft.

Explanation:

PLEASE MARK ME AS BRAINLIEST

5 0
3 years ago
In a folder hierarchy, the top level is referred to as which of the following?
Vesnalui [34]

Answer:

B. root

Explanation:

Every user in Linux is assigned a folder from which they can store their files. The interpreter allows you to abbreviate your route with the “~” symbol. The ls command without any additional data shows the files in the current directory, but if after the name of the command a path is written, it shows the files in that path. Therefore, the ls ~ command shows the files in the user's folder.

In addition to the folders and files created by the user or programs, every Linux folder has two subfolders defined by default:

“..”: It is the top level folder in the file hierarchy that contains it. This subfolder is also present in the root of the filesystem (the folder with absolute path “/”), but points to itself.

“.”: It is the folder itself that appears as if it were also a subfolder. It can be considered as a "self-reference" or pointer to itself.

These folders are normal folders in the system for all purposes; that is, they can be used on routes. For example, the path /dirA/dirB/dirC/../fichero2.txt refers to the file that is stored in the dirB folder, since from dirC, the folder .. points to its predecessor, dirB. The following figure shows the interpretation of this route as well as the equivalent of the “..” and “.” Folders.

4 0
3 years ago
Other questions:
  • Small-business owner Marcos set up his Google Ads campaign by thinking of “obvious” keywords off of the top of his head. What's
    15·1 answer
  • What is one difference between a web page and a web application? Web pages provide information, while web applications allow the
    8·1 answer
  • What is the name of the file manager in Microsoft Windows. The file manager used in Microsoft Windows is?
    12·2 answers
  • Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
    10·1 answer
  • What does it mean if my ninja blender power light is blinking?
    13·2 answers
  • Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB
    9·1 answer
  • Complete the sentence
    6·2 answers
  • which of the following indicates that the loop should stop when the value in the quantity variable is less than the number 50​
    13·1 answer
  • Why does this website have so many copies of plagiarism?
    5·1 answer
  • What is the decimal value for the jump control?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!