1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
5

Examples of applying successful visual design principles to bring a web page together are _________________. (Choose all that ap

ply)
Question 2 options:

a)

balance, contrast, and unity


b)

balance, contrast, and similarity


c)

gestalt, unity, and hierarchy


d)

gestalt, scale, and simplicity


e)

balance, control, and dominance
Computers and Technology
1 answer:
EleoNora [17]3 years ago
8 0

Answer:

I believe it's b

Explanation:

I'm straight

You might be interested in
1. Write a method to measure sortedness of an array. The method header is:
Licemer1 [7]
ㄴㄱㄷㅂㄷㅈ븟ㅈㅂㅈㅂㅈㄱㅅㄱㅈㅂㄷㅅㄷㅈㄱㅅㄱㅅㄴㅇㄴㅇㄴㅇㄴㅁㄴㅇㄴㅇㄴㅈㅂㅈㅂㅈㄱㅈㄴㅈㄴㄱㅆㅅㄱㅈㅂㄷㅅㅈㅂㅈㅅㄱ싲ㄱㅈㅂㄷㅂㅅㅇㄱㅇㄱㅅㅂㄷㅈㄱㅇㄱㅇㄱㄷㄱㅅㄱㅇㄱㄷㅈㄱㅇㅈㄱㅂㅈㅂㄷㅇㄷㅅㅆㄱㅇㄱㅅㅈㄱㅈㄱㅇㄱㅇㅂㅇㄱㅁㄱㅇㄱㅇㄱㅇㄱㅇㄱㅁㅋㅁㄱㅇㄱㅇㄱㅇㄱㄴㅁㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅁㄴㅇㄴㅇㄴㅅㄱㅈㄱㅈㅅ?...
7 0
3 years ago
HOW TO FREE UP RAM/MEMORY ON YOUR DEVICE?
Butoxors [25]

Well you can start by getting a app called CM Security Master....it frees junk files and stops viruses, etc.. If you want execive space get a SanDisk (SD) card with how ever much space you want.

7 0
3 years ago
Read 2 more answers
In a eukaryotic cell, DNA is found in
Nuetrik [128]
I think that DNA in a eukaryotic cell is found in a nucleus.

6 0
3 years ago
Read 2 more answers
A point is named by a lowercase letter. <br> a. True<br> b. False
Alik [6]
That is B False m8 that means mate btw xD please say thank you :P
4 0
3 years ago
Read 2 more answers
If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypte
Elza [17]

Answer:

The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.

Explanation:

A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.

Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.

In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.

4 0
4 years ago
Other questions:
  • Which of the following is a Microsoft solution that runs on a Microsoft Terminal Services server but appears, to end users, as i
    10·1 answer
  • . Dеclarе a onе-dimеnsional array of 30 doublеs (on thе stack) namеd rainfall
    11·1 answer
  • Can anyone help me with getting bash ubuntu on windows setup?
    15·1 answer
  • The business case for using grid computing involves all of the following except: speed of computation. cost savings. agility. in
    5·1 answer
  • CHALLENGE ACTIVITY 3.7.2: Type casting: Reading and adding values.
    10·1 answer
  • ¿Qué es el Internet? ¿Cuál es el protocolo de Internet?
    11·1 answer
  • It is important to know the terms of use of any website because why
    12·2 answers
  • Three reasons Why we connect speakers to computers
    15·2 answers
  • Helppppppppppp please
    5·2 answers
  • Q2: Mark True or False in the corresponding Answer sheet (0.5 point each)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!