1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enyata [817]
3 years ago
10

Which are technical and visual demands that need to be considered when planning a project? Choose three answers

Computers and Technology
1 answer:
Marina CMI [18]3 years ago
8 0

Answer: Resolution or DPI, deliverables, and file types are important technical and visual demands to consider when planning a project.

Explanation: Keep in mind whether or not the project will be published in print or on the Web.

You might be interested in
E Highlight
Arlecino [84]

Answer: See explanation

Explanation:

The uses of information

communication technology in the health sector​ include:

• Improvement in the safety of patients through direct access to case story.

• Keeping track of the progress of the patient.

• Checking of the treatments for a disease it illness online.

• It's also vital for the electronic storage of the medical data.

7 0
3 years ago
Which type of inventory control is expensive but helps keep inventory especially secure? A. RFID tags B. Barcodes C. Visual merc
lawyer [7]

Answer:

a) RFID tags

Explanation:

yeah they're super expensive but keep everything secure so nothing gets in it .

3 0
2 years ago
You load an image file into a numpy array and look at its shape, which is (433, 650). What does this indicate?
Nat2105 [25]

Answer:

option C

Explanation:

The correct answer is option C

the uploaded image shape is ( 433 , 650 )

this shape means that the image is a grayscale image which is 433 pixels high by 650 pixels wide.

a gray scale image is  in white and black color.

433 pixels high by 650 pixel wide means that the image is formed with the combination of 433 vertical dots and 650 horizontal dots.

Resolution of an image can be found out by the  pixels present in the images.

higher the pixel higher is he resolution of the image.

6 0
3 years ago
Write a recursive method to form the sum of two positive integers a and b. Test your program by calling it from a main program t
77julia77 [94]

Answer:

see the code snippet below writing in Kotlin Language

Explanation:

fun main(args: Array<String>) {

   sumOfNumbers()

}

fun sumOfNumbers(): Int{

   var firstNum:Int

   var secondNum:Int

   println("Enter the value of first +ve Number")

   firstNum= Integer.valueOf(readLine())

   println("Enter the value of second +ve Number")

   secondNum= Integer.valueOf(readLine())

   var sum:Int= firstNum+secondNum

  println("The sum of $firstNum and $secondNum is $sum")

   return sum

}

5 0
3 years ago
Given the following snippet of code, answer the following two questions based on the code: typedef enum {Sun, Mon, Tue, Wed, Thu
ANEK [815]

Answer:

1) The value of x will be 6.

2) The value of y will be 7.

Explanation:

1) The value of x will be 6.  

The enum values are labeled by default from 1. This means that Sun = 1, Mon = 2, Tue = 3 and so on.  

So, x = Mon = 2 and y = Sat = 6  

x increases up to y = 6 in the while loop.  

and then y also increments by 1.  

2)So the value of y = 7.  

You will need actual printf("Sun") or printf("Mon") for printing the actual text for the enum.

7 0
3 years ago
Other questions:
  • When using Regedit to browse through the registry, the key that is highlighted is the ________, and its value entries are visibl
    5·1 answer
  • After completion of this chapter, you should be able to:  Describe the structure of an IPv4 address.  Describe the purpose of
    5·1 answer
  • A page with no meaningful content that is full of ads and the webmaster makes money from if someone clicks on them is called____
    7·1 answer
  • A ____ typically rests on the desk or other flat surface close to the user’s computer, and it is moved across the surface with
    13·1 answer
  • A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABAB. Unfortunately, your f
    8·1 answer
  • Consider the following threats to Web security, and describe how each is countered by a particular feature of SSL.
    15·1 answer
  • Which of the following languages does not provide built-in-pattern matching operations (the language, although, has pattern matc
    14·1 answer
  • May someone type this down below just like how it is shown in the picture.
    7·1 answer
  • Write if true or false
    12·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!