1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
11

What are frames in anamation

Computers and Technology
2 answers:
navik [9.2K]3 years ago
5 0

Answer:

It is where the picture drawn is is quickly moved

Explanation:

vovangra [49]3 years ago
4 0

frames are essentially a slideshow of <em>many </em>pictures to create an illusion of a moving picture.

You might be interested in
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
2 years ago
Examine the evolution of the World Wide Web (WWW) in terms of the need for a general-purpose markup language. Provide your persp
creativ13 [48]

WWW is used to browse for view the webpage basically content is normally displayed as HTML pages.

In any browser's webpage irrespective of language been used output content display as HTML pages only.

<u>Explanation:</u>

  • In other methods is used XML format where it is opened and closed tag for every word editing XML file is very useful.
  • XML tools are ready is available where end-user can edit or create by for example notepad++ extra
  • It is a language designed to store the data in a specific format and easily process and used by a coding language or web pages.
4 0
3 years ago
4. Select the correct answer.
3241004551 [841]

Answer: B.  PDF

Explanation:

Portable Document Format (PDF) is such an important document that it is considered the international standard for information and document exchange. It is used for letters, resumes and even electronic contracts.

PDF was developed by Adobe to make it independent of the device or application it is being viewed on and combines layers of information into one layer thereby making it a flat document.

7 0
3 years ago
February 1995, Kevin Mitnick was arrested. While on parole was he allowed to have a phone or computer?
m_a_m_a [10]

Answer:

He was not allowed on a phone of computer after being arrested.

Explanation:

If you read about it he wasn't even allowed to work at 7-11 because of an electronic cash register.

6 0
2 years ago
Read 2 more answers
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
Other questions:
  • A smart phone is always a _____.<br> client<br> server<br> network<br> process
    10·1 answer
  • Which of the following is not a skill set required by data scientists? A. Programming expertise B. Big data expertise C. Telecom
    11·1 answer
  • An organization is assigned a Class-C network 200.120.80.0 and wants to form subnets for its threedepartments: D1 (60hosts), D2
    7·1 answer
  • Who is hurt by piracy
    10·1 answer
  • Count the number of words in the string. A word is one or more non-blank characters separated by one or more blanks. My suggesti
    13·1 answer
  • Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1 = 500 kbps, R2
    14·1 answer
  • Emma lives in Pennsylvania, what climate does she live in?
    7·1 answer
  • + Use for loop to print numbers from 100 to 10
    11·1 answer
  • Tier 1 networks form the internet ____.​
    15·1 answer
  • Database queries is an example of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!