1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
3 years ago
8

the technique of blocking some parts of a photograph to emphasize (or draw attention to) another part of the same photograph is

called
Computers and Technology
1 answer:
marshall27 [118]3 years ago
4 0

The answer is framing.

When you frame a picture, not physically but digitally, you block out parts of the photo to enhance the focus of other parts of the photo.

You might be interested in
Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state).
jeka57 [31]

The programing language, R has a unite unite function in the tidyr package. Hence, the code chunk which let's the analyst create the location column is; <em>unite (stores, "location”, city, state, sep=",") </em>

  • The syntax for the unite function is ; unite(data,col,..., sep)

  • <em>data</em><em> </em><em>=</em><em> </em><em>dataframe</em><em> </em><em>from</em><em> </em><em>which</em><em> </em><em>data</em><em> </em><em>is</em><em> </em><em>to</em><em> </em><em>be</em><em> </em><em>extracted</em><em> </em><em>`</em><em>;</em><em> </em>stores
  • <em>col</em><em> </em><em>=</em><em> </em><em>name</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>new</em><em> </em><em>column</em><em> </em><em>;</em><em>"</em><em> </em>location"
  • <em>.</em><em>.</em><em>.</em><em> </em><em>=</em><em> </em><em>dataframes</em><em> </em><em>to</em><em> </em><em>be</em><em> </em><em>merged</em><em> </em><em>;</em><em> </em>city, state
  • <em>sep</em><em> </em><em>=</em><em> </em><em>seperator</em><em> </em><em>;</em><em> </em>","

Hence, the required syntax goes thus :

  • unite (stores, "location”, city, state, sep=",")

Learn more : brainly.com/question/25534959

3 0
2 years ago
Select the WRONG statement about Slide Transitions.
faust18 [17]

Answer:

c. You can apply slide transitions to only a few selected slides.

Explanation:

If you want to, you <em>could </em>literally apply slide transitions to<em> </em><em>every</em> slide.

6 0
1 year ago
Read 2 more answers
Information in​ folders, messages,​ memos, proposals,​ emails, graphics, electronic slide​ presentations, and even videos create
valkas [14]

Answer:

The answer is "Unstructured"

Explanation:

In comparison, unstructured information applies to information, which doesn't suit the conventional column and rows concerning databases properly. It is also known as sources, that include mails, audio and video files, web pages and posts in  communication networks.

  • This tracks and communicates on travel and object flow-through sensors and much more.
  • These types of data are used in both companies and organizations.
5 0
3 years ago
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
3 years ago
Chat messages are most likely to be found where on a computer? firewall nic internet history ram
miv72 [106K]
<span>The answer is RAM.  Chat messages are most likely to be found in the RAM of the computer.  It is Random Access Memory.  </span><span>RAM is considered volatile memory, which means that the stored information is lost when there is no more power.</span>
3 0
2 years ago
Other questions:
  • If you are making a 30-minute presentation, how much time should be spent summarizing your points and making any closing remarks
    11·2 answers
  • Which company provides the Loki Wi-Fi mapping service?
    10·1 answer
  • Write a function, factors, that takes an integer n, and returns a list of values that are the positive divisors of n. Note: 0 is
    13·1 answer
  • Jessica finds out that the government introduced a new trade policy that will increase import tariffs. She calls for a meeting o
    15·1 answer
  • A disadvantage of a bus network is that _____. a. failure in one workstation necessarily affects other workstations on the netwo
    7·1 answer
  • Why is it important to be part of a team in times you fail and in times you succeed?​
    15·1 answer
  • The identification of the technology management framework contain?
    6·1 answer
  • The Electronic Age began in the<br> A. 1940s<br> B. 1970s<br> C. 1980s<br> D. 1990s
    11·2 answers
  • _____ refers to the programs that a device can run.
    9·1 answer
  • A Python file that contains variables and functions and can be used in other programs is called a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!