1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
3 years ago
12

Drag the tiles to the correct boxes to complete the pairs.

Computers and Technology
1 answer:
Monica [59]3 years ago
8 0

Answer:

refers to how much black or white color contains: value,defines a range from dark (0%)to fully illuminated (100%):lightness, Express the brightness or dullness of a color:intensity ,stands for a pure color:hue

HOPE THIS HELPS

You might be interested in
What is the boundary folding method?
Romashka [77]

Answer:

 Boundary folding method is basically used in the java algorithm and in the hash table. In the hash function, the left and the right value are basically folded in the fixed boundary between the given center values by using the boundary folding methods.

There are basically two types of folding method in the hashing that are:

  • Folding shift
  • Folding boundary

In the folding boundary method the outside value are get reversed and the alternate values are get flipped at the boundary folding method.

4 0
4 years ago
Which of the following not a hardware componet​
erma4kov [3.2K]

Answer:

antivirus.......hope this answers your question

3 0
3 years ago
In the world of computing, _________ means acquiring or exchanging copies of protected digital creations without payment or perm
Sholpan [36]

Answer:

Piracy.

Explanation:

Piracy refers to copying or duplicating contents and then selling it to market at lower prices without the owners knowledge or permission. Let's assume I designed a software for company "A" at the price of $2500, but someone inside from the company created a copy of that software and sold it in market at price of $200 without my knowledge or permission. This is what we call piracy.

3 0
4 years ago
A cloud implementation engineer successfully created a new VM. However, the engineer notices the new VM is not accessible from a
Rina8888 [55]

Answer:

Option A.

Explanation:

Incorrect subnet is the most likely problem in this scenario.

4 0
3 years ago
A restaurant buys a pizza oven that is 4.5 feet long, 5 feet wide and 6 feet tall. What is the volume of the pizza oven?
torisob [31]

Answer:

135 as 4.5 times 5 times 6 gives you the volume and it =135

4 0
3 years ago
Other questions:
  • Which translator program reads small portions of a program at a time, translating them into machine instructions which are then
    12·1 answer
  • Exposing employee and customer personal data to an untrusted environment is an example of:
    9·1 answer
  • A url consists of a ____, a domain name, sometimes the path to a specific web page or location in a web page, and the web page n
    11·1 answer
  • Hen using presentation software, what do you do when you "compose a slide"?
    5·1 answer
  • I just want to ask if some one know an online school program that offer a live session and the cost of it not to expensive. for
    10·1 answer
  • Which feature of a blog allows an author to interact and get feedback from his or her readers? link pingback commenting TweetMem
    9·1 answer
  • Lazarus Consulting is a large computer consulting company in New York. Pete Lazarus, theà CEOà and founder, is well known for hi
    8·1 answer
  • Character positions in<br> arrays start counting with<br> the number 1.<br> True<br> False
    14·1 answer
  • Write a program that reads a file that contains only integers, but some of the integers have embedded commas, as in 145,020. The
    10·1 answer
  • Dunbar's number, 150, refers to the number of:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!