1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
2 years ago
7

Donna is a graphic designer working on a poster for a music concert. What is her objective?

Computers and Technology
2 answers:
Igoryamba2 years ago
7 0

<u>Donna's objective:</u>

As Donna is working on a poster for a music concert, her main objective should be to attract her target audience and convince them to attend the concert.

<u>Explanation:</u>

Being a graphic designer, she should add eye-catching elements and populate the poster with a combination of colors to make it more attractive. She should add relevant pictures.

A poster is not complete without the required information about the event. She should add a handful amount of details about the concert enriched with some cheesy one-liners.

Details about the event should be limited as it a poster and not a notice.  

Marina86 [1]2 years ago
3 0

Answer:her objetive is to impress the public with the poster.

Explanation:

The poster have to be about the music. It is very important for the singer or the festival.

The objetive is going on with the festival, with the music and with the concert’s style.

It’s a personal design. But it have to be original for every design.

You might be interested in
In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
NemiM [27]

Answer : The securtiy of the password can be maitained by the shadow files such as:-

  • max is for the days that represent that the same password can be used without the need for changing it  
  • min is for the days that represent waiting days before the changing of password after he/she gets a new password
  • warn are the days that come with Waring sign that the password is going to expire soon.

For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.

4 0
3 years ago
Task 5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is sto
lidiya [134]

The SQL statement that would create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer is:

GET_CREDIT_LIMIT

SELECT CUST_ID 125

FROM FIRST_NAME, LAST_NAME, CREDIT_LIMIT

WHERE LAST_NAME ="Smith"

<h3>What is SQL?</h3>

This is an acronym that means Structured Query Language that is used in handling data in a database.

Hence, we can see that from the attached image, there is a table that contains the details of customers and their various data such as their first and last names, credit limits, address, etc, and the  GET_CREDIT_LIMIT procedure is shown above.

Read more about SQL here:

brainly.com/question/25694408

#SPJ1

3 0
2 years ago
A(n) _________ produces dynamic reports, supports alerts/rss functionality, and supports user subscriptions.
lesantik [10]

A(n) BI server produces dynamic reports, supports alerts/RSS functionality, and supports user subscriptions.

<h3>What exactly is BI server?</h3>

An on-premises report server with a web gateway, Power BI Report Server allows you to see and manage reports and KPIs. The tools for generating Power BI reports, paginated reports, mobile reports, and KPIs are also included. A business intelligence server created by Oracle is called Oracle Business Intelligence Enterprise Edition. It has sophisticated business intelligence capabilities that are based on a single architecture. The server offers centralized data access to all corporate entity-related business information.

There are five stages to query compilation in BI server:

  • Parsing
  • Create Logical Requests
  • Navigation
  • Code Generation Rewrite

To learn more about BI server , refer to:

brainly.com/question/7601044

#SPJ4

7 0
2 years ago
What are 6 external parts or perpherals of a computer system and identify output from input devices.
n200080 [17]
40. External Peripherals of a Computer systems are the following: -> Keyboard – this is an input device -> Mouse – This is an input device also -> Printer – this is an output device -> Flashdrive – This is a storage device -> Monitor – this is an output device -> external hard drive – this is a storage device Output device are those devices that communicate the results of the data processing to the user Input device are those device that communicate the results of the data processing to the computer system Storage device are those device that stores data.
4 0
3 years ago
Which example task should a developer use a trigger rather than a workflow rule for?
Komok [63]

Answer:

A. To set the primary contact on an account record when it is saved

Explanation:

After updating a Contact and then you set the Primary checkbox, the contact becomes the primary contact and this then updates the reference in the Parent Account. Triggers are used for this purpose and not workflow rule. In this case there is only one contact at a time that is set as Primary Contacts, and in the case where an Account does not have any Contacts, the first contact that is created is made the primary and the trigger sets that value in reference.

6 0
3 years ago
Other questions:
  • What does N represent when analyzing algorithms?
    15·1 answer
  • 7. Write a program in C to display the string "ARRAY" in the following format : A AR ARR ARRA ARRAY
    5·1 answer
  • _____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard to the users interest
    14·1 answer
  • Which extension is appropriate for Word document templates?
    10·2 answers
  • Describe the procedure for creating a table or spreadsheet in a presentation slide.
    13·1 answer
  • What is the family access code right now?
    5·1 answer
  • When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may
    5·1 answer
  • Hellpppp please I need it!
    15·1 answer
  • it refers to the ability of different parts of a computer to work together as one. please answer this​
    6·1 answer
  • Who plays warzone im a roze sweat and ill try to carry with loadout
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!