1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
6

Type the correct answer in the box. Spell all words correctly.

Computers and Technology
1 answer:
KonstantinChe [14]3 years ago
5 0

Answer:

Aspiring illustrators can hone their talent and skills using Adobe Illustrator software.

Explanation:

  • By using this software we enroll graphics for out Television.Computer etc ..
You might be interested in
A representation of something by using a description, summary or image.
ANTONII [103]

Answer: Thumbnail

Explanation:

Thumbnail is a representation of something by using a description, summary or image.

Thumbnails are simply the versions of either pictures or videos that have been reduced and can be used as placeholder for a multimedia content. A thumbnail that is used by a company on the internet gives the first impression of the product of the company to the prospective customers.

3 0
3 years ago
What file format can excel save files as
hodyreva [135]

Answer:

.xlxs

but it supports pretty much any spreadsheet format.

5 0
3 years ago
Why do attackers tend to target public or private Wi-fi networks?
Anika [276]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

A free WiFi connection in a public space can seem like a lifesaver when you are on the go.But if you decide to use public WiFi just be aware that you could be making yourself an easy target for hackers and putting your information and more at risk.

one of the dangers of using a public WiFi network is that data over this type of open  connection is often encrypted and  unsecured ,leaving you vulnerable to a man in the middle attack.It when a cyber criminal exploits a security  flaw in the network to intercept data

  • Avoid connecting to public WiFi connection. i if you must use a public WiFi hotpots also use a virtual privater network to secure your connection.
  • Do not  log in to password protected websites that contains sensitive information when using a public WiFi connection for example banking and social networking sites or even email.
  • Keep your software patched and up to date and all your devices even your mobiles ones to avoid any potential infection by viruses or malware if you do use unsecured public WiFi.

5 0
3 years ago
HELP PLS QUICK TRUE OR FALSE QUESTION
dmitriy555 [2]

Answer: I think the answer is true but I don't fully understand it sorry if im wrong.

Explanation:

8 0
3 years ago
Read 2 more answers
An additional factor in how an element is rendered is that properties are passed from a parent element to its children in a proc
belka [17]

Answer:

style inheritance

Explanation:

What happens when a property on an element has no value supplied is governed by style inheritance. A property should inherit its value from its parent element, according to this specification.

6 0
2 years ago
Other questions:
  • Building relationships during your career exploration is called?
    5·1 answer
  • What is html?
    9·2 answers
  • ________ is used to store programs and instructions that are automatically loaded when the computer is turned on.
    14·1 answer
  • What are the most popular/up-and-coming social media applications?
    10·2 answers
  • Which of the following are examples of how a company might use consumer data it had collected? a To decide what types of product
    10·1 answer
  • Which option in Outlook allows a user to look at multiple calendars in a side-by-side fashion?
    14·2 answers
  • Using the Vigenere cipher, does the length of the key matter?
    8·1 answer
  • Help me guys plssssss​
    10·1 answer
  • A folder is a collection of related of data is true or false​
    10·2 answers
  • If userNum1 is less than 0, put "userNum1 is negative.\n" to output. If userNum2 is greater than 10, assign userNum2 with 0. Els
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!