1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
3 years ago
12

Explain drawing and painting package.​

Computers and Technology
1 answer:
Murljashka [212]3 years ago
8 0
Enhances drawing experiences, adds more features and adds better quality

You might be interested in
The pci express version 4.0 can provide up to what amount of throughput with 16 lanes for data?
netineya [11]

The PCL express version 4.0 can provide up to 32 gigabytes with 16 lanes for data.

<h3>What is PCI Express?</h3>

PCI Express, often known as PCIe or PCI-e, is a high-speed serial computer expansion bus standard that was developed to replace the previous PCI, PCI-X, and AGP bus standards.

Thus, it is correct to state that the PCL express version 4.0 can provide up to 32 gigabytes with 16 lanes for data.

Learn more about PCI Express:
brainly.com/question/13898111
#SPJ1

4 0
2 years ago
What are the main differences between photo and video formats?
horrorfan [7]

Answer:

Nothing just the video is series of photos together

Explanation:

8 0
4 years ago
1. Information integrity ensures that data can be modified only by appropriate mechanisms.
GrogVix [38]

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

6 0
4 years ago
Read 2 more answers
The quality of lacking a pattern or organization so that result are unpredictable is also known as?
Aloiza [94]
<h2>Answer:</h2>

The quality of lacking a pattern or organization so that result are unpredictable is also known as<u> Randomness.</u>

<h2>Explanation:</h2>

In the daily routine work, randomness can be defined as the apparent lack of pattern. Randomness occurs when there is no predictability in events. Thus a random pattern of events, steps or symbols often has no sequence and order so they lead eventually towards Randomness. Similarly when elements will not follow an intelligible pattern or a proper combination they will result in Randomness.

<h3>I hope it will help you!</h3>
3 0
3 years ago
Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his cre
mars1129 [50]

Answer:

I think it is email or password

3 0
2 years ago
Other questions:
  • Word processing software allows users to do which of the following: format text design pages share documents mail merge document
    14·2 answers
  • What are three new things in Microsoft Word 2016?
    5·1 answer
  • In Windows Vista, the Run command can be found in which application?
    6·1 answer
  • What are the most common types of cables in a network?
    6·1 answer
  • Write a Java program to encrypt and decrypt a phrase using two similar approaches, each insecure by modern standards. The first
    15·1 answer
  • Partes de la ventana principal de Microsoft excel 2013 con sus respectivas funciones
    14·1 answer
  • Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim
    15·1 answer
  • What is inputted into a computer system?
    7·1 answer
  • Cleo is new to object oriented programming. which type of action can be taken on on object?
    14·2 answers
  • Do you need a contractor to install nest thermostat
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!