1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
3 years ago
14

How do graphic designers showcase their work?

Computers and Technology
2 answers:
LekaFEV [45]3 years ago
8 0

on their own webistes, you can make one on weebly.com for free


Luda [366]3 years ago
6 0

They showcase it digitally since their work is done on computers.

You might be interested in
What allows a programmer to write code quickly and efficiently for an action that must be repeated?
Marta_Voda [28]
An literation :))!! i hope u get it right lol
6 0
3 years ago
Read 2 more answers
When you use the Copy and Paste commands, you are accessing...?
vampirchik [111]
C!!!!!!!!!!!!!!!!!!!
3 0
3 years ago
Read 2 more answers
To ensure a smooth transfer the outgoing incident commander should provide
balandron [24]

Explanation:

To ensure a smooth transfer, the outgoing incident commander should provide a transfer of command briefing to the new incident commander. This should be done in a scenario in which the Deputy Incident Commander will be replacing the current Incident Commander.

7 0
3 years ago
A _______ is a host that runs software to provide information, sucha s web content, to other hosts.
elixir [45]

Answer:

Server

Explanation:

Servers are used to house information from websites to video games.

3 0
3 years ago
Which of the following is planted on an infected system and deployed at a predetermined time?A. Logic bombB. Trojan horseC. Worm
nekit [7.7K]

Answer:

A. Logic Bomb.

Explanation:

A Logic Bomb is a piece of code that is planted in a software system that is infected intentionally to set off malicious function.They are deployed at a predetermined time.

For ex:- a programmer hiding the files that deletes details of the employee who left the company.So these files can never be deleted.

4 0
3 years ago
Other questions:
  • He smallest network is a ______________________, which is a network of personal devices, such as the network you use when you sy
    5·1 answer
  • C++
    8·1 answer
  • . double x = 5; declares that x is a...............variable.
    14·1 answer
  • COMPUTER SCIENCE:PIXELS
    5·1 answer
  • _____ is a systems development technique that produces a graphical representation of a concept or process that systems developer
    11·1 answer
  • Google’s adwords system provides a quality score as a measure of _____, which indicates the usefulness of an ad message to consu
    6·1 answer
  • Consider the following declaration.int[] alpha = new int[3];Which of the following input statements correctly input values into
    12·1 answer
  • Messages that have been accessed or viewed in the Reading pane are automatically marked in Outlook and the message subject is no
    10·2 answers
  • HURRRY WILLL GIVE BRAINLIST!!!!!!
    12·1 answer
  • What do you think that private information like passwords pin number will be guarded or shared with the public? why?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!