1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
3 years ago
8

Stroke weight - ____ of the line around a shape or size of the point

Computers and Technology
1 answer:
Luden [163]3 years ago
5 0

Explanation: "A stroke is referred to as an outline, or instead, it describes the edges of a shape or a simple line. The stroke height can be modified by changing the settings in an appropriate panel. ... Flash uses the color panel to determine whether that color is for fills or strokes.

You might be interested in
¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones)
Andrei [34K]

Answer:

In which specific situations can counting techniques (particularly permutuations and combinations) be applied within computer science? for anybody trying to help

7 0
3 years ago
Pick 2 different operating systems and discuss how they can be used in daily operations.
Scilla [17]

Two different Operating Systems are

Windows 7

LINUX

Explanation:

  • Windows is an Operating System which was released by Microsoft to be used on Personal Computers.
  • They are used to manage software and perform various tasks.
  • LINUX is another type of operating system that is used on Super computers
  • Linux has been used in homes and organisation desktops in a great number.
  • It is used for great number of computing embedded tasks.
6 0
3 years ago
Cookies are to improve the access of internet information. Therefore for the sake of you own privacy and security you should not
lina2011 [118]
The answer is a. True
3 0
3 years ago
Read 2 more answers
OSI layer for HDLC??​
tresset_1 [31]

Answer:

HDLC is one of the most commonly used internet protocols (IP) in what is Layer 2 of the industry communication reference model called Open Systems Interconnection (OSI).

Explanation:

3 0
3 years ago
Which of the following describes a Trojan horse?
HACTEHA [7]

Answer:

the answer is

c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.

7 0
3 years ago
Other questions:
  • Are we too dependent on technology if yes then can you please explain?
    12·2 answers
  • What type of devices are the key board and the mouse?
    10·1 answer
  • When including multiple images in a report, it may help to create a _____ on each image so you can cross reference them througho
    11·1 answer
  • What is the turns ratio of the transformer T10261
    5·1 answer
  • Technology trends in education play a key role in a student’s
    15·1 answer
  • - A blacksmith is shoeing a miser's horse. The blacksmith charges ten dollars for his work. The miser refuses to pay. "Very well
    6·1 answer
  • Write a list comprehension that creates a list containing the numbers that result from the values 1 through 10 being multiplied
    15·1 answer
  • The process of sending a result back to another part of the program is
    14·1 answer
  • How does your ability to correctly count change affect the impression the customer has of you?
    8·1 answer
  • The scope of a temporary table is limited to what?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!