1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pantera1 [17]
3 years ago
14

The use of desktop computer equipment and software to create high-quality documents such as newsletters, business cards, letterh

ead, and brochures is called Desktop Publishing, or DTP. The most important part of any DTP project is planning. Before you begin, you should know your intended audience, the message you want to communicate, and what form your message will take. The paragraph best supports the statement that *
Computers and Technology
1 answer:
-Dominant- [34]3 years ago
5 0

Answer: the first stage of any proposed DTP project should be organization and design.

Explanation:

The options to the question include:

A. Desktop Publishing is one way to become acquainted with a new business audience.

B. computer software is continually being refined to produce high quality printing.

C. the first stage of any proposed DTP project should be organization and design.

D. the planning stage of any DTP project should include talking with the intended audience.

The paragraph best supports the statement that the first stage of any proposed DTP project should be organization and design.

This can be infered from the statement that "Before you begin, you should know your intended audience, the message you want to communicate, and what form your message will take".

You might be interested in
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
The small gear that is driven by the motor shaft of a rotisserie is called a?
Bumek [7]
The small gear that is driven by the motor shaft of a rotisserie is called a Pinion gear. A pinion gear is a type of linear actuator and comes with the rack gear. The pinion gear is the small circle running through the gear rack. It is like the wheels of the train running through the rail. So the answer to your question is letter D.
7 0
3 years ago
What type of traffic always goes to all devices in a subnet?
zmey [24]
There are three types of traffic in an IP network:
1. Unicast -  one-to-one traffic (traffic from one sender to one receiver) 
2. Multicast - one to many traffic (one sender and more receivers) 
3.Broadcast -  every device in the network will receive the packet
So, the broadcast traffic <span>always goes to all devices in a subnet. </span>
6 0
3 years ago
Charles sends Julia text messages every morning insulting her appearance and threatening to hurt her. He writes unflattering des
aalyn [17]
What is the question?
4 0
3 years ago
Read 2 more answers
The domain name system ________. Question 2 options: A) is a way to find a host's IP addresses if your computer only knows the h
ra1l [238]

Answer:

C) both a and b

Explanation:

13) The domain name system ________.

A) is a way to find a host's IP addresses if your computer only knows the host's host name

B) is a general naming system for the Internet

C) both A and B

D) neither A nor B

8 0
2 years ago
Other questions:
  • Information technology is the study of managing, processing, and retrieving information.
    5·1 answer
  • An expression that has correctly paired delimiters is called a(n)
    6·1 answer
  • Professional photography is a competitive job field. <br> true <br> false
    12·2 answers
  • Which of the following is a school-to-work program that provides the student with paid employment, school credit, and school gra
    7·2 answers
  • 5. How should you use LinkedIn Answers as a professional?
    8·1 answer
  • Which types of computers are used by large businesses
    10·1 answer
  • True or False: To create a function in python, you start with the keyword "def"
    5·2 answers
  • Which statement best describes the difference between a spreadsheet and a database?
    9·2 answers
  • Because all the IEEE WLAN features are isolated in the PHY and ____________ layers, practically any LAN application will run on
    11·1 answer
  • This is a glitch ? 


 










































    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!