1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
2 years ago
13

Direction: Write True on the line if the statement is correct. Write False if the statement is incorrect. 1. All objects are com

posed of shapes and all other design elements are shapes in some way. 2. The color is the basic tool for combining colors. 3. Red violet and blue green are examples of tertiary colors. 4. The arrangement of furniture on each side of a dominant point is referred to as radial balance. 5. Color is the way one feels or perceives about a surface.​
Computers and Technology
2 answers:
Alex2 years ago
7 0

Answer:

1. False coz colour isnt a shape

2. True

3. True

4. True, I think

5. Can be true

Explanation:

jeyben [28]2 years ago
6 0
<h2><u>ANSWER</u><u>:</u></h2>

  1. <u>TRUE</u>
  2. <u>FALSE</u>
  3. <u>FALSE</u>
  4. <u>TRUE</u>
  5. <u>TRUE</u>
<h2><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u><u>_</u></h2>

<u>CARRY</u><u> </u><u>ON</u><u> LEARNING</u>

<u>CAN</u><u> </u><u>YOU</u><u> BRAINLEST</u><u> ME</u><u> PLEASE</u>

You might be interested in
A malware-infected networked host under the remote control of a hacker is commonly referred to as:
natali 33 [55]

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

7 0
3 years ago
Read 2 more answers
What is the use of consonant in QBASIC ? Answer me in short and easy answer.​
Digiron [165]

Answer:

See Explanation

Explanation:

I'll assume the question is about the use of constants in QBasic because consonants do not have any special function or usage in QBasic.

In simple terms: In QBasic, constants are used to represent elements that do not change in value during program execution.

Take for instance, you intend to use \pi in your program.

Its value is \pi = 3.142

So, 3.142 will always be a constant in your program. One of the ways it can be used in a program is:

10 LET PI = 3.142

<em>The above represents a numeric constant. QBasic also have string constants.</em>

3 0
3 years ago
How does the game Clash Royale keep players continuously active and engaged?
lana [24]

Answer: a

Explanation: because they have to beat and check the players to move on

4 0
3 years ago
A(n) ___ converts between digital data the computer understands and analog signals that are transmitted over telephone or cable
zhannawk [14.2K]
A modem is probably what you are looking for.
3 0
2 years ago
Abigail is writing an email to Justine Swenson, a friend of her best friend, Jane, inviting her to a get-together. Which is the
joja [24]
Use the subject box then write the details in the message box
4 0
2 years ago
Other questions:
  • A Narrative Statement illustrates how your life will look when you reach a goal.
    15·2 answers
  • To have the most impact when using email, you should structure your messages so that
    5·1 answer
  • If you cause a car accident, which type of insurance will require you to pay the least out of pocket?
    5·2 answers
  • Click cell C6 in the Data worksheet and insert a column. Type Series Name in cell C6. Click cell C7 in the Data worksheet and in
    9·1 answer
  • Which of the following is most likely to be considered plagiarism? Using materials from a source without proper citation. Adding
    5·1 answer
  • An administrator is helping a user connect a smartphone to a tablet via Bluetooth. What should the administrator do first?
    6·1 answer
  • In what other game can kids line up in a row
    6·1 answer
  • Simplify 0.2×0.03055 to 3 decimal places​
    15·2 answers
  • Write a method called removeHighPrice that will go through a provided ArrayList called prices and removes the first price that i
    6·1 answer
  • Which feature allows you to copy attributes of
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!