1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kherson [118]
3 years ago
13

What type of space is often the main focal point of the composition in graphic design

Computers and Technology
1 answer:
iogann1982 [59]3 years ago
3 0

Answer: what are the choices?

Explanation:

You might be interested in
Assume that d is a double variable. Write an if statement that assigns d to the int variable i if the value in d is not larger t
mamaluj [8]

Answer:

That's because the value has reached the size limit of the int data type. ... you should use long rather than int , because long can store much larger numbers than int . If ... In other words, a float or double variable can't accurately represent 0.1 . ... If you're using Java to measure the size of your house, you'd need an electron ...

Explanation:

3 0
3 years ago
Write a Java Program
Helga [31]

In the Deck Builder, initialize the 52 cards (along with the 4 jokers, which should be called “wild” and the suit is “wild”).

<h3>Public class Deck</h3>

  private final List<Carta> Deck;

  public Baralho() {

      listaCartas = new ArrayList<>();

      String[] naipes = {"club", "spade", "heart", "diamond"};

      int pos = 0;

      Carta c;

With this code we will be able to create the Deck, initialize the 52 cards together with the 4 jokers.

Learn more about Deck in brainly.com/question/1660537

8 0
2 years ago
On Windows 7 or 8 How are the windows help and support options different when you press F1 when the desktop is active as opposed
Dominik [7]
It opens a different article depending on what program you on, to accommodate that program.
6 0
3 years ago
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
lisabon 2012 [21]

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

8 0
3 years ago
In an e-mail message, what do the initials bcc mean?
MissTica
BCC stands for Blind carbon copy, carbon copy is where you add addition recipients to an email, blind carbon copy does the same, however, anyone who was BCC'ed into the email will be hidden from all other recipients, meaning no one will know who, if anyone, was included in BCC.   
4 0
3 years ago
Other questions:
  • Personal computer hard disk platters typically have storage capacities ranging from 40 gb to ____.
    8·1 answer
  • Slicing can best be described as
    9·1 answer
  • Can anybody come up with a catchy title for this?
    11·1 answer
  • Your company has recently been hired to install a smart security system for a large office building. The system will include sec
    12·1 answer
  • Write the definition of a function printAttitude , which hasan int parameter and returns nothing. The function prints amessage t
    13·1 answer
  • By
    7·1 answer
  • Write a program to generate a square wave with 80% duty cycle on bit P2.7 Microprocessor.​
    7·1 answer
  • Write a program called array1.cpp file that use either regular for loop or range based for loop to display the contents of the a
    14·1 answer
  • Which option is the correct format of placing HTML tags while coding in HTML?
    13·2 answers
  • Do you guys answer questions about cyber security?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!