1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
13

A digital designer might do computer animation or video games true or false

Computers and Technology
2 answers:
kaheart [24]3 years ago
5 0

True because it will help developing the product because you have better education and understand how to design digital things.

pav-90 [236]3 years ago
3 0

your answer should be TRUE if i’m correct..

MARK ME BRAINLIEST PLEASE IF IM CORRECT

You might be interested in
Calculate the shear stress (lbf/in^2) for a given normal stress (lbf/in^2) that is applied to a material with a given cohesion (
LenaWriter [7]

MOHR-COULOMB FAILURE CRITERIA:

In 1900, MOHR-COULOMB states Theory of Rupture in Materials which defines as “A material fails due to because of a critical combination of normal and shear stress, not from maximum normal or shear stress”. Failure Envelope is approached by a linear relationship.

If you can not understand the below symbols see the attachment below

 f   f ()  

Where:      f = Shear Stress on Failure Plane  

       ´= Normal Stress on Failure Plane

 See the graph in the attachment

For calculating the shear stress, when Normal stress, cohesion and angle of internal friction are given. Use this formula:   shear stress =  f  c   tan 

Where,  

• f  is Shear Stress on Failure Plane

• c  is Cohesion

•  is Normal Total Stress on Failure Plane

•  is Friction Angle

8 0
3 years ago
In the microsoft powerpoint wiew ribbon. Which presentation wiew enables a user to view one slide at a time in the slide pain?
german

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In the Microsoft PowerPoint view ribbon. A normal presentation view enables a user to view one slide at a time in the slide pain.

As we know that there are different views of presentation, such as, normal view, reading view, slider sorter, outline view, and note pages.

Only a Normal view allows you to see one slide at a time in the slide pain.

6 0
3 years ago
When there is a limited amount of a product, such as rare art or collectible
babunello [35]
C. Scarcity
This is because the word scarce means something is hard to come across or find and there is an insufficient amount for the demand
7 0
3 years ago
What are the options for editing inserted'illustration items in Outlook messages? Check all that apply.
dimaraw [331]

Answer:

changing layout options

resizing the image

adding and editing shapes

adding and editing styles

Explanation:

Inserting screenshots requires no sort of editing. Also, no editing is required for inserting the tables and graphs. However, the options being mentioned in the answer section is an example of editing. Changing layout options is editing, resizing the images is editing, adding and editing shapes is editing as well as adding and editing styles is editing. Hence, the choices mentioned in the answer section are the correct options.

6 0
4 years ago
Read 2 more answers
The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos
cestrela7 [59]

Answer:

A. Helps prevent a system from being fingerprinted by port scans.

B. Can restrict a computer from receiving network traffic.

D. Stop a process or application from launching.

Explanation:

The "host-based firewall" is an important type of<em> firewall software </em>that is being installed into a computer/device in order to allow it to control the network traffic. This enables the host to protect itself from any malware or viruses that may attack. It, primarily, provides a customized protection. Thus, it is more commonly used by <em>small businesses</em> or<em> individual people</em>.

Host-based firewalls allows "packet filtering." This controls the network access which makes it hard for attackers because of the little information that it provides. So, this explains option A. This then prevents a system from being fingerprinted by port scans.

Host-based firewalls can protect the device from unwanted network traffic, so this explains option B. This then restricts the computer from receiving the network traffic.

It can disable programs that are malicious, thereby stopping the launching of those programs. This explains option D.

7 0
3 years ago
Other questions:
  • What is a browser? Give one example
    8·2 answers
  • Name the six parts of the product development life cycle.
    7·2 answers
  • What is structured​ knowledge?
    10·1 answer
  • A power supply unit for a computer converts:
    6·1 answer
  • Write a Python3 program to check if 3 user entered points on the coordinate plane creates a triangle or not. Your program needs
    12·1 answer
  • Could someone please help me with this?
    8·1 answer
  • Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional
    7·1 answer
  • The maximum number of characters that a cell can contain is
    11·2 answers
  • The Freeze Panes feature would be most helpful for which situation?
    6·1 answer
  • 30 POINTS PLS HELLLLPPP WILL GIVE BRAINLIEST What behavior do elements in a stack follow? first in, last out, or FILO behavior l
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!