1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
11

Necessary component of creativity

Computers and Technology
1 answer:
Mnenie [13.5K]3 years ago
3 0

Answer:

Concept of colors, shading, proportions, and what things actually look like.

Explanation:

:p

You might be interested in
In a doubly linked chain implementation of a queue, what is the performance when the dequeue operation
Alex

Answer:A) O(1)

Explanation:While dequeuing operation takes place,that is the elimination of the front element from the queue.In doubled linked list/chain, the dequeue operation operates at the consecutive elements lined in the chain with O(1) time period for the eliminating the item  or returning the last value from the link along with the reference.from the chain link.Therefore, the correct option is option(A).

3 0
4 years ago
NEED HELP NOW 25 POINTS!!!!!!
Ahat [919]
3. ram
idk what #4 is but i hope this helps


7 0
3 years ago
Read 2 more answers
Need of food for living 150 word​
sweet-ann [11.9K]

Answer:

Food is the most important thing in our lives besides water. Moreover, healthy eating means eating a variety of food that gives you the nutrients you need to maintain your health, feel good, and have energy. These nutrients include protein, carbohydrate, fat, water, vitamin, and minerals. Hence we need food for living.

Explanation:

Hope it helps

7 0
3 years ago
Digital Sep <br> helps as reimagine outcomes true or false
iragen [17]

Answer:

true

Explanation:

mark me as brailyist pls

6 0
3 years ago
What are the negative impacts of cloud computing? Answer this question using examples, in at least 6-8 full sentences.
DerKrebs [107]

Answer:

Vulnerability to attacks: Storing data in the cloud may pose serious challenges of information theft since in the cloud every data of a company is online. Security breach is something that even the best organizations have suffered from and it’s a potential risk in the cloud as well. Although advanced security measures are deployed on the cloud, still storing confidential data in the cloud can be a risky affair.

Network connectivity dependency: Cloud Computing is entirely dependent on the Internet. This direct tie-up with the Internet means that a company needs to have reliable and consistent Internet service as well as a fast connection and bandwidth to reap the benefits of Cloud Computing.

Downtime: Downtime is considered as one of the biggest potential downsides of using Cloud Computing. The cloud providers may sometimes face technical outages that can happen due to various reasons, such as loss of power, low Internet connectivity, data centers going out of service for maintenance, etc. This can lead to a temporary downtime in the cloud service.

Explanation:

3 0
3 years ago
Other questions:
  • CompX Inc. is an online retailer of electronic products, including laptops and tablets. The company is known for its unique appr
    15·1 answer
  • Which is an operational process performed by AWS for data security? a.Background virus scans of EBS volumes and EBS snapshots
    8·1 answer
  • A java program that calculates the balance of three months of $1000 and interest rate 6%
    9·1 answer
  • What's the difference between leafgreen and firered?
    9·1 answer
  • Henry is having a problem with the electrical system on his current laptop. The battery for the laptop will not charge. Henry to
    5·1 answer
  • Which language will report a compilation error for the following snippet of code? int i = 3; double n, j = 3.0; n = i + j; Group
    11·1 answer
  • Question # 6
    11·2 answers
  • What will the following code display? int numbers[4] = { 99, 87 }; cout &lt;&lt; numbers[3] &lt;&lt; endl; a. 87 b.0 d. 34. What
    12·1 answer
  • NEED HELP IMMEDIATELY!!
    15·1 answer
  • In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!