1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
9

Ad designers use movement in order to

Computers and Technology
2 answers:
Anna71 [15]3 years ago
6 0

Ad designers use movement in order to determine how the eye is led through a design. Movement will determine where the eye will look first, where it will look next, where it pauses, and how long it stays there. Movement is all about the flow. Flow is created through a combination of visual direction and visual weight.

elena-14-01-66 [18.8K]3 years ago
3 0
Usually to direct viewers through their work, so basically to capture their attentions...
You might be interested in
Which processor interrupts the system 18.2 times per second? What are some of its practical uses?
julsineya [31]

Answer:

timer interrupt

Explanation:

A timer is an interrupt that is generated by the PC's system timer.When this interrupt occurs, the ROM BIOS interrupt handler is called and it increments a count in the ROM BIOS.It interrupts the system 18.2 times per second.It is used for multitasking.Hence we conclude that timer interrupt is the answer.

6 0
3 years ago
What modifier should you use on the members of a class so that they are not accessible to another class in a different package,
vova2212 [387]

The private modifier specifies that only other members of the same class can access the member. The protected modifier restricts access to the member to within its own package.

<h3>What are public and private modifiers?</h3>

The public access modifier permits code from both inside and outside the class to access the class's methods and properties, whereas the private modifier prevents outside code from accessing the class's methods and properties.

Thus, private modifier is the member.

For more details about private modifier, click here

brainly.com/question/15108837

#SPJ1

5 0
2 years ago
When is the redo log buffer written to the redo log file?
natka813 [3]

Answer: B)The redo log buffer becomes one-third full.

Explanation:Redo log buffer is the type of buffer file that is present for storing the changes that have been done in data. Database changes are the made goes in the records of the redo entries.the change of the buffer to the redo files is done when the buffer contains change records which are full till the one-third section, thus conversion takes place from the redo buffer to the redo files.

5 0
3 years ago
Direction. List down 5 preventive maintenance tips in using tools and equipment.<br>1.​
PSYCHO15rus [73]

Answer:

Explanation:

preventive maintenance tips in using tools and equipment.

1. Inspect tools and equipment on a regular basis so as to avoid unexpected breakdown.

2. Clean tools and equipment immediately after use. It is important to wash or clean tools after using them in order to avoid clogging of dirts on them

3. Replace tools and equipment back to their respective storage place immediately after using them

4. Lubricate your tools and equipment to avoid rusting. Lubrication means to oil especially metal tools and equipments.

5. Always follow the instructions of use and maintenance of tools and equipments as stated by the manufacturer.

3 0
3 years ago
29
denis23 [38]

The correct answer is A it transfers control to the next loop in the program.


The most valid answer is that the break statement Exits the loop and continues executing the program, but assuming that there are other loops, the control of the program will go to them since the first loop is broken out of.


3 0
3 years ago
Other questions:
  • What is the name for an object that is what it appears to be?
    11·1 answer
  • The difference between a want and a need is a want is not necessary for survival. Things necessary for survival are known as ___
    6·1 answer
  • If a Web page is not copyright protected, then it is ethical to cut and paste sections of the page into your speech without citi
    12·1 answer
  • A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected wi
    14·1 answer
  • What is the different between 32bit anf 64 bit verision​
    11·1 answer
  • One page of content in a PowerPoint presentation is referred to as a
    12·1 answer
  • Thomas has signed a deal with a production house that allows them to use his images on their website. What is required when imag
    5·2 answers
  • Which attack intercepts communications between a web browser and the underlying computer?
    10·1 answer
  • So, I have an Cru__ on this boy in school and his name is Bray but Yeah.............Can someone help me
    10·2 answers
  • What bonnie is this? From five night at freddys
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!