1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
4 years ago
12

A keyblock is _____________________

Computers and Technology
2 answers:
Elina [12.6K]4 years ago
6 0
I believe the correct answer from the choices listed above is option B. A keyblock is used to create a black outline before the color is added. It <span>usually has the most detail. Hope this answers the question. Have a nice day.</span>
PilotLPTM [1.2K]4 years ago
3 0

A keyblock is used to create a black outline before the color is added. Correct answer: B The term keyblock is used in printmaking.

It is the element of the design which contains most of the structural or descriptive elements of the design. It serves as a guide for the disposition of the other colours.

You might be interested in
__________ often causes overactive eye movement.
shepuryov [24]
The answer is ; D , xanax
3 0
3 years ago
Read 2 more answers
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
In the late 1990s, Microsoft was sued for "tying" its Internet browser, Internet Explorer, to its operating system. A seller for
LekaFEV [45]

Answer:

Section 3 of the Clayton act.

Explanation:

Section 3 of the Clayton act 15 U.S.C.S § 14, makes illegal some kind of distribution practice that facilitates monopolistic arrangement that is section 3 of the Clayton act makes it illegal to enter into tying arrangement, exclusive dealing contracts or requirement contracts if such contracts tends to lessen competition. Where customer is required to pay for an undesired product in order to obtain a desired product.

3 0
3 years ago
When correctly implemented, what is the only cryptosystem known to be unbreakable?
Leona [35]

When accurately executed, the only cryptosystem known to be unbreakable is called: "One-time Pad" (Option D)

<h3>What is a Crypto System?</h3>

The one-time pad is a cryptographic approach that cannot be broken but needs the usage of a single-use pre-shared key that is not less than the message being delivered. A plaintext is coupled with a unique secret key in this manner.

It should be emphasized that in cryptography, a cryptosystem is a collection of cryptographic algorithms that are required to perform a certain security function, such as confidentiality. A cryptosystem is often composed of three algorithms: one just for key generation, one for encrypting, and one for deciphering.

Learn more about Crypto System:
brainly.com/question/15084188
#SPJ1

Full Question:

When correctly implemented, what is the only cryptosystem known to be unbreakable?

A) Transposition cipher

B) Substitution cipher

C) Advanced Encryption Standard

D) One-time Pad

6 0
1 year ago
If you enjoy working with livestock, the best cluster in which to research careers would be: A. Health Science. B. Agriculture,
Pachacha [2.7K]

Answer:

B. Agriculture, Food, and Natural Resources.

Explanation:

The Agriculture, Food and Natural Resources career cluster is for those students who enjoy the outdoors and love working with both animals and plants. The cluster prepares most students for careers in agriculture products and services. This cluster includes a wide range of job occupations such as livestock farmer, florist, and many more. The animal systems career pathway will specifically deal with the business side of livestock. This career pathway will further include students who would want to work as animal breeders, farm workers, animal scientists, or nonfarm animal caretakers.

7 0
3 years ago
Other questions:
  • Sarah is working on a project in which she needs to record all the extracurricular activities in her college. Her college teache
    13·2 answers
  • Select the correct answer from the drop-down menu. Which two technologies support the building of single-page applications? and
    11·1 answer
  • A(n)…………is the interface used toconnect external devices to the computer.
    5·1 answer
  • Universal Containers has strict security model enforced through object, field, and row-based security mechanisms. The Architect
    9·1 answer
  • Please help me!! 10 Points are waiting!!
    8·1 answer
  • A ____ is a synonym for a virtualization application.
    5·1 answer
  • Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?
    12·1 answer
  • Cuales son las paginas web​
    12·1 answer
  • A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best expla
    15·1 answer
  • Which of the following is one of the tools used by a Python IDE that helps prevent syntax errors?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!