1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tpy6a [65]
3 years ago
13

While creating a sketch, what helps you identify positive and negative space?

Computers and Technology
1 answer:
Eduardwww [97]3 years ago
7 0

Answer:      positive = plus sign and negativie = subraction sign

Explanation:

You might be interested in
How to order reference list in apa format?
Brums [2.3K]
<span>Title. Label this page References, centered in plain text.Spacing. Make sure to double space throughout.Order. List the sources in alphabetical order by the authors' last names. ...<span>Indentation. Do not indent the first line in the citation; however, you must indent any additional lines 5 spaces in the citation.</span></span>
5 0
3 years ago
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
mars1129 [50]

Answer:

B. Symmetric key encryption

Explanation:

Symmetric key encryption is one in which a single encryption key is sent to the receiver so both sender and receiver share the same key. In this type of encryption, the sender uses a particular key to encrypt the data and sends the encrypted data (cipher data) to the receiver and then the receiver uses the same key to decrypt the data.

Public key encryption, or asymmetric encryption uses two keys - a private key and a public key. The public key is know to everyone while the private key is known only to those for whom the message is intended. An application of this type of encryption is in SSL (Secure Sockets Layer) -  a protocol for transmitting data privately on the internet.

Private key encryption is not exactly one of the encryption methods but rather, a private key and a public key are used in encryption.

The best option is therefore <em>symmetric key encryption</em>.

<em>Hope this helps!</em>

7 0
3 years ago
Jabari created new video game for his coding course. What is one way he should format his pseudocode?
AleksAgata [21]

Answer:

Last one is the only logical one.

Explanation:

Hope this helps!!!

8 0
3 years ago
FREE POINTS AND BRAINLIEST!!!<br><br> You guys are welcome. :)
Viefleur [7K]
Heheheheheheheheh perfect b
3 0
3 years ago
Read 2 more answers
Why hasn't net neutrality been taken away? It's past Dec 14.
Roman55 [17]
Because it was only passed, now they have to decide what they want to do 
6 0
3 years ago
Other questions:
  • The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
    9·1 answer
  • What's the name of this apex legend hero​
    13·2 answers
  • All linear programming problems have all of the following properties EXCEPT
    9·2 answers
  • In a Java Script language. create a two-dimension array consisting of numbers representing costs. After creating the array, prin
    11·1 answer
  • When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share
    7·1 answer
  • Write a complete Java program called Rooter that gets a positive integer called "start" from the user at the command line and th
    7·1 answer
  • What two characteristics describe an ftp connection?.
    9·1 answer
  • when demonstrating 2022 altima’s parking assistance, what steering feature should you mention when pointing out how easy the veh
    10·1 answer
  • All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​
    5·1 answer
  • Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!