1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
6

The ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator would be MOST beneficial to which

career
A. Video Production Specialist
B. Graphic Designer
C. Game Designer
D. Digital Audio Producer​
Computers and Technology
1 answer:
NikAS [45]3 years ago
5 0
Answer: b
Explanation:
You might be interested in
In public-key encryption, the two keys–one for coding and one for decoding–are known as ________.
Feliz [49]
Public key and private key  - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known  by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.
5 0
3 years ago
Your sister wants to purchase Microsoft Office 2013 for her new laptop. She doesn't want to pay for a subscription, and she want
Pavel [41]

I would buy Microsoft Office 2013 Home and Business Pc License. Its better to purchase the product in all rather than a subscription.

5 0
3 years ago
Are DHCP messages sent over UDP or TCP? 2. What is the link-layer (e.g., Ethernet) address of your host? 3. What values in the D
maks197457 [2]

Answer:

1.) DHCP is sent over the message at UDP.

2.) The address of link-layer is Source: DellComp_4f:36:23 (00:08:74:4f:36:23)

3.) The message type of value to the discover message is 1, but the message type of value to the request packets is 3. This how you can be differentiate two.

4.) The Transaction ID in first four message is 0x3e5e0ce3

The transaction ID in second sets of messages is 0x257e55a3

The transaction ID is identifies if the message is a part of the set of the messages is related to the one transaction

Explanation:

DHCP is stands for the Dynamic Host Configuration Protocol which is the networks management protocol that is used on the UDP/IP networks where by the DHCP servers dynamically assign the IP address and the other networks configuration parameters to the each devices on the network so they can be communicate with the other IP network.

6 0
4 years ago
Daphne used to work in the city where she would take public transportation to work. However, she just took a new job in the subu
mr Goodwill [35]

Answer:

A need

Explanation:

Daphne has no choice but to get a car and a house immediately, she relocates. Anything that is a choice and gives you the desire to acquire it, but cannot, due to one reason or the other, is a want. A need, on the hand, is something that Daphne should have to survive. She will need a car and a house to stay alive and will obviously not do anything without them. A home and a car are physical needs that can be touched or measured while aspects like happiness and good health are subjective needs that we need as humans to survive.

4 0
3 years ago
What careers are most likely to require business skills
olchik [2.2K]

i would say maybe an accountant, entrepreneur, business reporter, or something like that.

8 0
3 years ago
Other questions:
  • To what extent do you think st. cyprian was effective in his efforts to bring inherited christian teachings to bear on the unpre
    10·1 answer
  • This type of connection uses radio waves to connect devices on a network.A) DataB) EthernetC) RouterD) wifi
    15·1 answer
  • You are a network consultant who has been asked to attend an initial meeting with the executive management team of ElectroMyCycl
    10·1 answer
  • What are the "..........." called leading up to a page number?
    14·1 answer
  • For this project, you have to write 3 functions. C++
    13·1 answer
  • Write a function named is_sub_dict that accepts two dictionaries from strings to strings as its parameters and returns True if e
    5·1 answer
  • What is a narrative?
    7·2 answers
  • What three actions happen when you cloak a folder or file?
    6·1 answer
  • True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P
    6·1 answer
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!