1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
3 years ago
11

While creating a digital portfolio, Harry wants to add documents that authenticate his skills, experience, and knowledge in digi

tal media design. Which items should he include in his portfolio to accomplish this goal?
A. objective statements
B. certificates
C. worksheets
D. images
E. references
Computers and Technology
1 answer:
Marina CMI [18]3 years ago
4 0

Answer:

Images

Because Digital Media

You might be interested in
What is the user requirements of an educational app
VARVARA [1.3K]
Ummmmm I don’t know but I wanna know now.....
7 0
3 years ago
What is APR?
omeli [17]

Answer:

APR is the Interest rate advertised by lenders.

Explanation:

APR is the annual percentage rate that is different from the interest rate. Interest rate is the rate of borrowing money. While APR is the rate which includes interest rate, processing fee and other cost that are involved in loan approving.

This cost is decided by lender, which may be equal to interest rate or greater than interest rate.

5 0
3 years ago
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
mars1129 [50]

Answer:

B. Symmetric key encryption

Explanation:

Symmetric key encryption is one in which a single encryption key is sent to the receiver so both sender and receiver share the same key. In this type of encryption, the sender uses a particular key to encrypt the data and sends the encrypted data (cipher data) to the receiver and then the receiver uses the same key to decrypt the data.

Public key encryption, or asymmetric encryption uses two keys - a private key and a public key. The public key is know to everyone while the private key is known only to those for whom the message is intended. An application of this type of encryption is in SSL (Secure Sockets Layer) -  a protocol for transmitting data privately on the internet.

Private key encryption is not exactly one of the encryption methods but rather, a private key and a public key are used in encryption.

The best option is therefore <em>symmetric key encryption</em>.

<em>Hope this helps!</em>

7 0
3 years ago
Michael is discussing various project needs with his team. Match Michael’s statement with the way project management can help th
Reika [66]

Answer:

get out there outside and get out and see what you do when you're ready for a workout or a day off and you're going through the

7 0
4 years ago
Define computer on the basis of model.<br><br>Brainliest answer giveaway.<br>​
avanturin [10]

I found that,

On the basis of Model, computer is classified as: XT Computer (Extra Technology): It cannot support GUI based operating system. Its processing speed is 4.77 MHz and Intel 8080, 8086, 8088 series of microprocessors is used. PS/2 Computer: It is a laptop computer which is rechargeable and battery based system.

7 0
3 years ago
Other questions:
  • The file containing the definitions of the member functions of class DateType is called the ______ file.
    6·1 answer
  • To type the letter address, _________ space from the dateline
    9·2 answers
  • A service provider, hardware, and web browser are needed to connect to __________.
    8·2 answers
  • Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
    10·1 answer
  • A grade of B is worth Grade points<br><br><br> A) 3.0<br> B) 80<br> C)2.0<br> D)4.0
    13·2 answers
  • Which of these is most closely associated with system control? (1 point) (Points : 1.5) boundary
    10·1 answer
  • My computer screen keeps flashing black, it's on a very low brightness level and I very rarely put it up to high level unless I
    13·2 answers
  • There are types of templates​
    5·1 answer
  • C
    5·1 answer
  • Implement one array of the English alphabet (26 characters). a) Create a function, getLetters() to cast and generate the array.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!