1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
3 years ago
15

Help! I’ll mark you brainly! Please help me.

Computers and Technology
1 answer:
nika2105 [10]3 years ago
4 0

Answer:

11. There are four main alignments: left, right, center, and justified

12. Symmetrical balance occurs when equal weights are on equal sides of a composition, balanced around a fulcrum or axis in the center.

13.  Asymmetrical balance results from unequal visual weight on each side of the composition.

14. White space

15. Most modern TVs are 16:9, which causes letterboxing when viewing 21:9 content, and pillarboxing when viewing 4:3 content such as older films or TV broadcasts, unless the content is cropped or stretched to fill the entire display. The Napoléon (1927 film) was released in 4:1 aspect ratio.

16. ??? im sorry idk

17. The Rule of Thirds is the process of dividing an image into thirds, using two horizontal and two vertical lines.

Explanation:

You might be interested in
Pls help me to answer this question ASAP
mariarad [96]
It’s about yourself. Answer the questions on how you’ve been experiencing them in your life
7 0
3 years ago
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
Martha is a healer, a healthcare provider, and an experienced nurse. She wants to share her daily experiences, as well as her 12
STALIN [3.7K]
The answer to the question is blog.
4 0
4 years ago
Read 2 more answers
What can you add to your presentation from the insert ribbon toolba?
stiks02 [169]

Answer:

anything you want

Explanation:

there are a lot of adons for powerpoint

7 0
3 years ago
When a web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is
OLga [1]
This practice is known as "ClickBait".
8 0
3 years ago
Other questions:
  • Edhesive silly questionsj
    8·1 answer
  • With ________, website programmers can import data from other sources to create new functions and features that we associate wit
    14·1 answer
  • Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
    6·1 answer
  • Which of the following is ideal for long distance communication ?
    5·1 answer
  • The file format that an application can always open a named collection of data on a storage medium such as a hard disk or usb fl
    13·1 answer
  • the default name for the small icon that represents a web site or page, and is displayed in the browsers, typically at the begin
    9·1 answer
  • In implementing Secunity Lfe Cycle:_______
    8·1 answer
  • What is the deck of a suspension bridge called​
    15·1 answer
  • _______ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.
    9·1 answer
  • write a program that computes an integer's checksum. to compute the checksum, break the integer into its constituent
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!