1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
15

Do you think it's better for a young designer to use free, open-source art programs or to pay for commercial programs? Explain y

our answer, but come up with at least one counterargument that forces you to defend your position when you explain why you think one option is better than the other.
Computers and Technology
1 answer:
Alex787 [66]3 years ago
5 0

Answer:

The young designer should use free open-source art programs for his designs. The designer can create new tools and get and update a verse collection of design tools in the software.

Explanation:

An open-source program is a software or application whose source code is available for changes, upgrade and sharing within the public.

Rather than in closed-source software where all upgrades and changes are made only by the tech-company with the license, and the expensive nature of the purchase, the open-source code programs are mostly free with a general public license.  

You might be interested in
In Python please:
Sauron [17]

Answer:

import math

angle = float(input('Enter Angle: '))

shadowLength = float5(input('Enter Shadow Length: '))

tree_height = math.tan(angle)*shadowLength

print('Tree Height = {}'.format(tree_height))

Explanation:

From the equation given, the first step is to derive the equation for calculating the Tree Height.

tan(angleElevation) = tree height / shadow length\\\\tree height = tan(angleElevation) * shadow length

In order to calculate the tangent of an angle, the math module has to be imported. math module allows the program to perform advanced math operations.

The program then prompts the user to input values for angle and shadow length.

The inputted values are converted to floats and used in the equation that was derived for Tree height.

Three height is evaluated and the result is printed to the screen

4 0
3 years ago
a flow chart is the _______ representation of the sequence of steps required of steps required to solve a particular problem​. I
Eddi Din [679]

Answer:

A flowchart is simply a graphical representation of steps. It shows steps in sequential order and is widely used in presenting the flow of algorithms, workflow or processes. Typically, a flowchart shows the steps as boxes of various kinds, and their order by connecting them with arrows.

7 0
3 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Which of the following is NOT a specialized cloud mechanism? A. Automated Scaling Listener B. Load Balancer C. Multi-Device Brok
Sphinxa [80]

Answer:

C...i think so sorry if im wrong

Explanation:

3 0
3 years ago
Read 2 more answers
Arrange the tiles in the order of communication in the linear model.
IceJOKER [234]

Answer:

  • A sender sends a message through a transmitter.
  • The transmitter converts the message into a signal through encoding.
  • The encoded signal then travels through a channel.
  • At the receiver, the signal is decoded.
  • The decoded message is sent to the destination.

Explanation:

The linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

The order of communication in a linear model are;

I. A sender sends a message through a transmitter.

II. The transmitter converts the message into a signal through encoding.

III. The encoded signal then travels through a channel.

IV. At the receiver, the signal is decoded.

V. The decoded message is sent to the destination.

Generally, when a message is encoded by the sender, it requires a recipient to decode it for the communication process to be complete.

5 0
3 years ago
Other questions:
  • Most GUIs provide all of the following except _____.
    7·1 answer
  • Defination of computer Software​
    7·2 answers
  • Bullet points on a slide should be limited to _____. 2 4 8 10
    15·2 answers
  • Because it is important not to disrupt the normal business function, joint application design (JAD) sessions should be held at a
    11·1 answer
  • Modern car odometers can record up to a million miles driven. What happens to the odometer reading when a car drives beyond its
    8·1 answer
  • The local emergency manager has the responsibility for coordinating emergency management programs and activities. A local emerge
    7·1 answer
  • DOUBLE POINTS!! PLEASE HELP QUICKLY!!!!!
    15·2 answers
  • Have you heard about Gold Opinions?<br><br> It is a new product that just came out.
    6·1 answer
  • Which is the first computer brought in nepal for the census of 2028 B.S​
    6·1 answer
  • What is the name for the base-2 system used by computers to represent
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!