1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
12

6.2 lesson practice

Computers and Technology
1 answer:
Lady bird [3.3K]3 years ago
8 0

Answer:

I am guessing it would be 20

Explanation:

In the draw canvas text code the last number from the color is probably the font size.

Correct me if I'm wrong

You might be interested in
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
What are the possible consequences if you fail to identify system requirements correctly and completely?
AlladinOne [14]
There are a few consequences for failing to identify system requirements. 

1. Strain on time and effort which can cost money for either a company or yourself (depending if you are an employer, employee, etc).

2. Additional costs for hardware. If you decide to upgrade your hardware on a later time. It will cost additional money for repairs and replacements to adjust.

3. It can cause dissatisfaction to a user if you are working as a technician (for example) which can leave a negative mark on your reputation/resume) 
4 0
4 years ago
Which is a function of network media?
Eduardwww [97]
The (main) function of the "network media" is the "<span> to transmit signals from device to device" because by doing this and allowing this to happen, this the signals would also send messages, and by this, it would then also be known as social media, and by this, it would be able to send pictures,  text, and etc. This would be the point of the "network media".</span>
5 0
3 years ago
Read 2 more answers
Consider the practice of outsourcing programmers, a common practice in many U.S. businesses. Think about how this practice is us
GuDViN [60]

The practice of outsourcing programmers is known to be the act of  sharing or delegating as well as handing over control of programming and its associated tasks to any form of  external service provider that is said to be very good in that field and has the power and capabilities to handle the technical and operational areas of a programming project.

<h3>What is outsourcing and why is it always practiced?</h3>

Outsourcing is known to  be a kind of a business practice that entails the act of hiring a party that is known to be outside a company to carry out services or make goods that are said to be traditionally carried out in-house.

Note that The practice of outsourcing programmers is known to be the act of  sharing or delegating as well as handing over control of programming and its associated tasks to any form of  external service provider that is said to be very good in that field and has the power and capabilities to handle the technical and operational areas of a programming project.

Learn more about outsourcing  from

brainly.com/question/12101789

#SPJ1

5 0
2 years ago
_______ are malicious programs that come into a computer system disguised as something else such as a free computer game or scre
Lady_Fox [76]

Answer:

Trojan horses

Explanation:

4 0
2 years ago
Other questions:
  • What makes sqlite an appropriate choice for an android application, compared to other relational database management systems, su
    15·1 answer
  • Reputable firms often ask recent graduates to pay an up-front fee for a job.
    10·2 answers
  • Explain the nature of documents that can be suitable for mergin
    12·1 answer
  • The crash rate per mile is ..
    12·2 answers
  • The popularity of blogging is an example of _____. the public producing the media the public regulating the media both of the ab
    15·2 answers
  • Organizations are struggling to reduce and right-size their information foot-print, using data governance techniques like data c
    7·1 answer
  • Write code to create a list of numbers from 0 to 67 and assign that list to the variable nums. Do not hard code the list. Save &
    5·1 answer
  • Clasifica los documentos comerciales en activo, pasivo o patrimonial para cada operacion:
    14·1 answer
  • PLEASE I NEED HELP, WILL MARK BRAINLYEST!!! 50 POINTS!!!
    14·1 answer
  • What is the most used gaming keyboard in 2022?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!