1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ki77a [65]
3 years ago
9

Examples of applying successful visual design principles to bring a web page together are _________________. (Choose all that ap

ply)
Question 2 options:

a) balance, contrast, and similarity


b) gestalt, unity, and hierarchy


c) gestalt, scale, and simplicity


d) balance, contrast, and unity


e) balance, control, and dominance
Computers and Technology
1 answer:
weqwewe [10]3 years ago
5 0
I think A & D but im note sure but I definitely think A is one of the options
You might be interested in
In a case where electrical current leakage from the circuit occurs,
Zielflug [23.3K]

Answer:

The GFCI shuts down the circuit when it senses a current leakage.

Explanation:

The ground of a circuit should truly be ground. But if the ground circuit is not truly ground, then someone could get shocked. The GFCI monitors the possibility of current flow to ground. If this occurs, then the GFCI stops all flow of current, for safety reasons.

It also monitors if the current flow is interrupted. Say you drop something that is plugged in, into a sink of water. The GFCI should note the current loss, and shut down the circuit.

GFCI stands for: Ground-Fault Circuit Interrupter

4 0
3 years ago
Read 2 more answers
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
2 years ago
True or False? Any edition or version of Windows can join a domain.
Veseljchak [2.6K]

Answer: TRUE! 100%

If I was helpful i would to be rated brainliest please thank you!

Explanation:

8 0
2 years ago
What is the different between information and data
Vika [28.1K]
Data is an individual unit that contains raw materials which do not carry any specific meaning. Information is a group of data that collectively carries a logical meaning.
7 0
3 years ago
PLEASE HURRY!!<br> Look at the image below
djverab [1.8K]

Answer:

The function usernameMaker.

Explanation:

strFirst is a local variable in the function usernameMaker since it is an argument that is passed into that function. This means that the scope of strFirst is the function usernameMaker, since it cannot be accessed anywhere else in the code.

Hope this helps :)

8 0
3 years ago
Other questions:
  • Emma has used copyright works of a number of artists in her photo album and cited all of them except one. She may be caught for
    6·2 answers
  • AW Computing uses a private sharing model for cases. A select group of five users need read/write access to all cases with a spe
    8·1 answer
  • Which statement is false? Classes are reusable software components. A class is to an object as a blueprint is to a house. Perfor
    6·1 answer
  • Which is the best practice for placing graphics on a slide?
    6·2 answers
  • An audit trail is a record of how a transaction was handled from input through processing and output
    10·1 answer
  • Assignment 1 is to write a program that will write the lyrics to "X number of beers on the wall". Use only the main method. Prom
    11·1 answer
  • Question 14. 14. PowerPoint assumes every new slide, except for a blank slide, has _____.
    13·1 answer
  • MR. Tom asked her students could they plant a flower and bring it to class. Sarah brought his flower and said it was a rose. Jam
    6·1 answer
  • 5. Javascript can be used for building apps and​
    7·1 answer
  • What is a use case of factorization in quantum computing?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!