Answer:
General purpose graphics primitives that contain 2D graphic library as, it is used in graphics processing unit which typically manage computation for computer graphics. Graphic primitives contain basic element such as lines and curves. Modern 2D computer graphic system that operate with primitives which has lines and shapes. All the elements of graphic are formed from primitives.
Answer:
a. file-naming conventions
Explanation:
File names need to follow certain criteria and constraints. Examples include:
- File names must not start with special symbols.
- File names can consist of letters,digits and special characters such as _.
- File name can contain an extension after a dot sign.
- File names must not be duplicates of an existing file.
Such constraints form part of file-naming conventions.
- file-path represents the complete path to the file in the directory structure.
- disk partition segments a hard disk into multiple volumes.
- file-path starts from the root directory and spans one or more subdirectories to the location of the actual file.
Answer: B webcast
Explanation:
A webcast is a technology that allows the live broadcast of an audio or video event on the Internet. It is also known as Web lecture, virtual meeting, etc. The major advantage is that it gives room for an event to have a larger reach. Webcast participation can be through PC, smart phones, tablets and other devices with quality Internet access.
Answer:
The advantage of the simulated link strategy are:
- It is easily able to provide the practical feedback to the customers and users while designing the whole system. It also determine the efficiency and the correctness of the design in the stimulated link strategy.
- In the stimulated link strategy, the sharing and delivering of the data and information is done efficiently without any occurrence of error and interrupt. It is also high flexible technique.
The disadvantage of the simulated link strategy are:
- The simulated link strategy is flexible but it is not standardization and also it required more good concept.
- This technique is expensive and it is not readily available as it always require validation process.
They may invade privacy rights of air space and be used for other unintended acts such a bombings and espionage