1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
muminat
3 years ago
12

A design tool helps you plan, evaluate, and explain your ideas to create a product. Some examples of design tools are outlines,

storyboards, idea webs, and sketches. *
4 points












True









False




An implementation tool carries out the task. We have already discussed implementation tools such as word processing, spreadsheet, and presentation applications. Other tools include skits, songs, posters, videos, websites, and speeches. *


4 points












True









False




_________show the logical flow of a written document. *


4 points












Outlines









Storyboards




A(n) ________ can be thought of as a visual outline, or in some cases a visual play-by-play, of a story. *


4 points












outline









storyboard




If you're creating something that's easier to construct by hand, instead of on the computer, you can draw it out and use a scanner (input device) to scan an image of your creation into your computer. *


4 points












True









False
Computers and Technology
1 answer:
Leni [432]3 years ago
8 0
I might be true and might not which chances are 50%
You might be interested in
Which of the following would be done outside of a control room?
LenKa [72]

Answer:

a

Explanation:

8 0
3 years ago
Read 2 more answers
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
Can't expand stack segment by 8 bytes to 524288 bytes.
aleksandrvk [35]
Try to clear your cashe its possible on a good computer but on a old its not possible for that hardware
3 0
3 years ago
Read 2 more answers
Describe the differences between instant messaging and text messaging?
allsm [11]

Answer:

Text messaging, or simply "texting," is a cellular phone service typically limited to 160 characters, whereas instant messaging is usually a computer session with a longer message size. ... When an instant messaging session is started, it remains connected until the session is ended by one of the parties.

Explanation:

8 0
4 years ago
Higher Order Functions used for simulations of dice rolls. Definition: An n-sided dice function takes no arguments and always re
tiny-mole [99]

Answer:

#include <iostream>

#include <time.h>

#include <string>

using namespace std;

int main(){

srand(time(NULL));

cout<<"Throw dice"<<endl;

int b =0;

int a=0;

a=rand()%6;

b=rand()%6;

for (int i =0;i<1;i++)

{cout<<"dice one: "<<a<<endl;}

for (int i =0;i<1;i++)

{cout<<"dice two: "<<b<<endl;}

if(a>b)

{cout<<"first dice won"<<endl;}

if(b>a)

{cout<<"second dice won"<<endl;}

else{cout<<"they are same"<<endl;

return main();

}

return 0;

}

Explanation:

/*best dice roll game just for you change it as you want but all necessary things are there/*

5 0
3 years ago
Other questions:
  • A table is a predesigned database that includes professionally designed database objects.
    12·1 answer
  • Mark lives in an area that is prone to tornadoes. If a tornado is headed his way, what is one thing Mark should do? A. Get in hi
    8·1 answer
  • If x window system is installed, linux users can use x11 forwarding to run __________ as they would on a windows computer. gui a
    11·1 answer
  • Do most of you agree on a primary interpretation? Why?
    14·1 answer
  • Consider the language S*, where S = {a ab ba}.
    13·1 answer
  • Give the Division Hashing function and the index it maps the key 2000 into, assuming a primary storage area array size of 61 ele
    6·1 answer
  • Discuss the 21 st century competencies or skills required in the information society and 4 ways you can apply it during supporte
    6·1 answer
  • In reference to computer communications, what does the term noise mean?
    8·2 answers
  • A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of cust
    15·1 answer
  • Missing only a few days of school will not impact your grades.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!