1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
8

Where is the third vanishing point in the three point perspective

Computers and Technology
1 answer:
Naya [18.7K]3 years ago
5 0

Answer:

The third vanishing point is placed under or above the horizon line

Explanation:

The third vanishing point in three point perspective is not placed on the horizon line. Instead the third vanishing point is placed under or above the horizon line. Often the bottom vanishing point is placed off of the picture plane.

You might be interested in
Which of the following payment types require you to pay upfront?
____ [38]
The answer is B. money orders and prepaid cards
5 0
3 years ago
Explain briefly how learning how to follow can make a person a good leader
Masja [62]

By  learning how to follow, one can  be a good leader because: Looking up to a leader and following them help to:

  • Keep one's ego in check and one can be able to be a good ego manager.
  • They create strong credibility.
  • They help use to focus our efforts for maximum impact.

<h3>How does being a good follower make you a good leader?</h3>

As a good follower, a person can be able to have the boldness and confidence to be able to respectfully talk about a lot of things with their leader if you see that you're not going in the right way.

Note that  one can trust your leader and this will boast up the spirit of your input and engagement in all.

Hence, By  learning how to follow, one can  be a good leader because: Looking up to a leader and following them help to:

  • Keep one's ego in check and one can be able to be a good ego manager.
  • They create strong credibility.
  • They help use to focus our efforts for maximum impact.

Learn more about good leader from

brainly.com/question/12522775

#SPJ1

3 0
2 years ago
Which of the following security policies can be implemented to prevent removable media from automatically launching potentially
il63 [147K]

The security policy that can be implemented to prevent removable media from automatically launching potentially harmful programs is Disable AutoRun.

<h3>Why should one disable AutoRun?</h3>

The Autorun is known to be a system function that often launches every time, and as such, it renders your system to be open to viruses, malwares, trojans etc.

Conclusively, The act of Disabling the autorun feature is one that can hinder malware from spreading in your system.

Learn more about computer from

brainly.com/question/24540334

4 0
3 years ago
Using a combination of symmetric and asymmetric key encryption, Sofia sent a report to her home office in Indiana. She received
photoshop1234 [79]

Group of answer choices.

A) the public key had been compromised.

B) the private key had been compromised.

C) the symmetric encryption key had been compromised.

D) the asymmetric encryption key had been compromised.

Answer:

C) the symmetric encryption key had been compromised.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Email encryption is the encryption and authentication of an email to protect the message therein from being read by any person other than the intended recipients. Thus, it protects the email from hacking or invasion by a third party.

Basically, when the message is signed with the sender's private key, the receiver can verify its authenticity using the sender's public key.

Also, encrypting the email message with the receiver's public key provides confidentiality.

In this scenario, the most likely explanation for this result is that the symmetric encryption key had been compromised.

3 0
3 years ago
And<br>Why the computer is called dilligent<br>Versatile machine?give long answer ​
WITCHER [35]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

"Why the computer is called diligent

Versatile machine"

Computer is called versatile machine because it is used in almost all the fields for various purposes.Because it can perform the task repeatedly without loosing its speed and accuracy for a long time.They are versatile because they can be used for all sorts of task.They can also do many of the same tasks in different ways.Computer is the electronic device which perform the logical and mathematical calculation.Computer is known as the  versatile machine because it is very fast in every field and its part of life without it was cannot imagine life.

It can do the work faster and in every field the computer is used for making their work faster.

It can perform the work fast so it is called versatile machine.

Advantages of versatile machine:

  • Computer are very fast due to which thousand of job can be performed within the short period of time.
  • Complex mathematical problems and logical operations can be solved by using this computer.
  • As computer is versatile device,multiple task like communication,graphics,documentation can be done.

Disadvantages of versatile machine:

  • Computers are machine hence they have no brain so they work according to the program instruction set inside it.
  • It is an electronic deice and it uses electronic sources to work,So it is very risk to store data and information on the computer independently because some electric and electronic damages may damage the data.So we have to make regular backup of the data.

5 0
3 years ago
Other questions:
  • Lindsay owns a candy store that typically makes all if its sales to tourists visiting a nearby zoo. Why might she decide to set
    14·2 answers
  • I need help someone please help
    6·1 answer
  • Which of the following is the MOST important consideration when planning your budget?
    7·2 answers
  • Banking, insurance, telecommunications, and education are examples of the type of knowledge industry that A. has information as
    12·2 answers
  • A construction company has an online system that tracks all of the status and progress of their projects. The system is hosted i
    10·1 answer
  • A customer asks you over the phone how much it will cost to upgrade memory on her desktop system to 16 GB. She is a capable Wind
    8·1 answer
  • The early success of Microsoft was cemented by the release of which software product:
    12·1 answer
  • Please, Help me with this question, I tried it but It always says #Value.
    5·1 answer
  • A firm has a huge amount of individual customer data saved in different databases. Which of the following can be used to integra
    11·1 answer
  • artefacto o servicio producido de manera artesanal o Industrial que puede satisfacer plenamente una necesidad o interés de la lo
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!