1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shalnov [3]
3 years ago
13

Which type of image is composed of lines, curves, and fills?

Computers and Technology
1 answer:
Nataliya [291]3 years ago
4 0
<h2>Answer: Vectors</h2>

Explanation:

You might be interested in
You must have an active ____ to test external links.
charle [14.2K]
Network & internet connection
4 0
3 years ago
In general, what is the leftmost point of a circle with radius r centered at (x,y)?
Semmy [17]

The answer is (x-r, y).

5 0
3 years ago
A type of cpu socket, used with modern intel processors, where the cpu itself has no pins but the contact pads of the cpu line u
yawa3891 [41]
<span>A type of cpu socket, used with modern intel processors, where the cpu itself has no pins but the contact pads of the cpu line up with socket pins on the motherboard, is known as LGA.  </span>The Land Grid Array (LGA<span>) is a type of surface-mount packaging for ICs (</span> integrated circuits)<span> that is notable for having the pins on the </span>socket<span> (when a </span>socket is used) rather than the integrated circuit.
3 0
3 years ago
Read 2 more answers
/ List the seven basic internal components found in a computer tower.
JulsSmile [24]
The 7 components found in a computer tower are the following:
Power supply unit
Central processing unit
Hard disk drive
Ram modules
Motherboard
Video card
Sound card
3 0
3 years ago
Read 2 more answers
We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
Rina8888 [55]

Answer:

D

Explanation:

All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.

Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.

To do this, ensure measures like

- Regular Program cleanup

- Patches management

- service pack installation

- service or usage policies

...among others.

Cheers

3 0
3 years ago
Other questions:
  • Write a program that reads a list of words. Then, the program outputs those words and their frequencies. The input begins with a
    13·1 answer
  • When should students practice netiquette in an online course? Check all that apply.
    14·2 answers
  • Human factors is the study of:
    5·1 answer
  • What is the decrypted binary
    9·1 answer
  • Questions Presscomion
    9·1 answer
  • It connects computers in different cities and different countries
    9·2 answers
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    13·2 answers
  • #done with school already
    14·1 answer
  • Match the following pls help
    5·1 answer
  • Which of the following is classified as a workgroup information system?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!