1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
3 years ago
6

What aspect should you consider before adding pictures to a document?

Computers and Technology
1 answer:
Vera_Pavlovna [14]3 years ago
3 0

Answer:

You should structure the text first before you search for a relevant picture.

Explanation:

When adding a picture or pictures to a text document, the structure of the text must be considered.

Structure as used in the above sentence means (but is not limited to), the headings, the layouts, the spacing, paragraphs and word formatting in the document.

In other words, the way the document is organized

<em>All these must be put in to place before one adds pictures into the document.</em>

You might be interested in
If html is used to specify the content of the webpage, then what do you use css for?.
alekssr [168]

Answer:

css for styling.. means for making websites looks beautiful and attractive

Explanation:

html is like skeleton which defines websites structure whereas css is like cover to the skeleon.. css is responsible for fonts, colors, position of elements, responsiveness of websites.. it makes websites looks beautiful and prettier by adding background colors, hover effects, animation, etc

6 0
3 years ago
Who should get the copyright credit for a piece of computer art: the CPU, the software, or the programmer? Explain your reasonin
yulyashka [42]

Answer:

The programmer.

Explanation:

The CPU (central processing unit or simply the processor) is the brain of the computer system, it processes data at a very fast rate depending on it's processing speed. But it only relates to speed of data processing and a link between components of the system.

A software is a program code at executes a task in the system. It a logical and follows an algorithm to solve a given task. Computer systems do not generate  lines of code by itself, but instead, A programmer writes the code to create the software used by the system.

6 0
3 years ago
Which instruction in this algorithm would be considered a loop structure? will mark u brainliest 25 points
Mazyrski [523]
I don’t know if I am right but I think it d am i right
6 0
3 years ago
Which term below refers to the overall design intended to convey an idea or feeling that is appealing to the site's target audie
xenn [34]

Answer:

What are the terms

Explanation:

6 0
4 years ago
How are companies protecting their users from internet assault
cluponka [151]

Answer: Companies and organization are taking several steps to secure their user from internet abuse  .The methods are mentioned as follows:-

  • Offering security technologies in the form of package along with the service so that the protection resource is not required to be installed or bought from elsewhere such as antivirus technologies.
  • Using the web servers that are available with high security features
  • Using the websites that persist the built-in feature of giving virus or malicious interruption warnings so that user can become alert
  • Making users aware about internet abuse and provide information so that they can identify such happening in the service.

4 0
4 years ago
Other questions:
  • The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos
    6·1 answer
  • Slack space most commonly contains visible data. True or false?
    15·1 answer
  • 1. ________ is often defined as using illicit (illegal) drugs, or when the drug is alcohol, tobacco, or a legitimate drug (presc
    13·1 answer
  • There are three required elements needed to connect to the internet: hardware, web browser, and __________.
    15·2 answers
  • What are the correct steps to find the system specifications such as the amount of RAM or system type?
    13·1 answer
  • Arrange the steps involved in natural language generation.
    9·1 answer
  • What happens when you run a program in Python? ​
    12·2 answers
  • Write a program to check whether the number is odd or even using 'if' statement in python
    13·1 answer
  • A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.
    14·1 answer
  • You work with alot of different documents in your internship with a software development company. What kinds of actions can you
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!