1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
8

What is the difference between digital art and digital design?

Computers and Technology
1 answer:
pishuonlain [190]3 years ago
3 0

Answer:

The main difference between graphic design and digital design is that graphic design is mostly static (logos, magazines, pictures etc.), while digital design involves movement (animations, interactive elements, movies etc.). Digital design does not only use visual arts, but may also include audio and sound effects.

Explanation:

You might be interested in
Someone receives and email that appears to be from their bank requesting them to verify account information, this type of attack
svetoff [14.1K]

Answer:

<h2>This is Phishing attack</h2>

Explanation:

What is Phishing attack?

Phishing attack involves sending of sending of unwanted spam mails, well disguised mails to potential victims, it was designed to steal the potential victim's information such as passwords and mails to his/her banking platform.

     

      The goal is  to deceive victims into clicking on a link and taking them to a  website that asks for their login and password, or  perhaps their credit card or ATM number.

People who attack using phishing are called <em>cyber attackers</em>

6 0
3 years ago
What are different sheet icons
telo118 [61]

Answer:

There are three types of icons: “universal,” “conflicting” and unique icons.Explanation:

3 0
3 years ago
You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute
Alex_Xolod [135]

Answer:

Check the explanation

Explanation:

This document transfer ought to work smoothly. Due to the IEEE standards and Principles, the presentation layer is expected to encrypt/decrypt the data on both part of the network. The session layer creates a mutual coordination among the applications while the transport layer is there to ensures delivery. Immediately the segments hit the network, routers control and handle the routing process of the packets to the distant end. Layers 6, 3 & 1 are straightly involved in the italicized parts of the question; however, the entire layers play a role when looking at the transfer as a whole.

5 0
3 years ago
What is artificial Intelligence ?
Charra [1.4K]

Answer:

Artificial intelligence (AI) is intelligence demonstrated by machines, unlike the natural intelligence displayed by humans and animals, which involves consciousness and emotionality. The distinction between the former and the latter categories is often revealed by the acronym chosen. 'Strong' AI is usually labelled as artificial general intelligence (AGI) while attempts to emulate 'natural' intelligence have been called artificial biological intelligence (ABI). Leading AI textbooks define the field as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals.Colloquially, the term "artificial intelligence" is often used to describe machines that mimic "cognitive" functions that humans associate with the human mind, such as "learning" and "problem solving".

As machines become increasingly capable, tasks considered to require "intelligence" are often removed from the definition of AI, a phenomenon known as the AI effect.A quip in Tesler's Theorem says "AI is whatever hasn't been done yet." For instance, optical character recognition is frequently excluded from things considered to be AI,having become a routine technology. Modern machine capabilities generally classified as AI include successfully understanding human speech,]competing at the highest level in strategic game systems (such as chess and Go), and also imperfect-information games like poker,[11] self-driving cars, intelligent routing in content delivery networks, and military simulations.

Artificial intelligence was founded as an academic discipline in 1955, and in the years since has experienced several waves of optimism,followed by disappointment and the loss of funding (known as an "AI winter") followed by new approaches, success and renewed funding.[ After AlphaGo successfully defeated a professional Go player in 2015, artificial intelligence once again attracted widespread global attention.For most of its history, AI research has been divided into sub-fields that often fail to communicate with each other. These sub-fields are based on technical considerations, such as particular goals (e.g. "robotics" or "machine learning"),the use of particular tools ("logic" or artificial neural networks), or deep philosophical differences. Sub-fields have also been based on social factors (particular institutions or the work of particular researchers

Explanation:

<h2>Hopefully u will satisfy with my answer of ur question..!!</h2>

<h2>Please Mark on brainleast please..!!</h2>

<h2>Have a nice day ahead dear..!!</h2>

4 0
3 years ago
Read 2 more answers
NEED HELP IMMEDIATELY!!
Aliun [14]

Answer:

Option C

Explanation:

Option A is incorrect as Worm is a form of malware

Option B is incorrect because antivirus can remove all forms of malware

Option C is correct because a worm is more problematic as compared to the virus. Also, viruses are weaker than worm because they need a host file to run but a worm can work independently.

Option D is also incorrect because both are able to self replicate.

4 0
3 years ago
Other questions:
  • Hen pointing to a tool on the ribbon, a ______ appears, displaying information about the tool.
    7·1 answer
  • Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
    5·2 answers
  • Which scenario shows the best example of intrinsic motivation?
    13·2 answers
  • When writing an algorithm, the step after carrying out your plan is "sharing results."
    5·2 answers
  • . The electric company charges according to the following rate schedule: 9 cents per kilowatt-hour (kwh) for the first 300 kwh 8
    12·1 answer
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    7·1 answer
  • Which input and output pair is correct for a bicycle?
    12·1 answer
  • You can use _____ to track the state of each user in the application.
    8·1 answer
  • Difference between the four generations of computers in a tabular form​
    8·1 answer
  • Significant design efforts, during deliberate planning at combatant commands, produce results as those commands _____. (Select a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!