1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
15

Select the correct text in the passage.

Computers and Technology
1 answer:
Ratling [72]3 years ago
6 0

Answer:

a dry, earth colored backround

Explanation:

The definition of value contrast is the the difference between light and dark and the areas in between

You might be interested in
How many types of sharing of Google Forms are possible?
scoray [572]

Answer:

Open a form in Google Forms.

In the top right, click More .

Click Add collaborators.

Under "Invite people," type the names or email addresses of the people you want to work with.

Click Send.

8 0
4 years ago
Different project management steps are initiating, planning, executing, monitoring and controlling, and closing a project. Which
ser-zykov [4K]

Answer:

All steps of project management until the closure of the project are very critical and important for the success of the project.

Explanation:

The steps that are very critical and important for the success of the project.

Initiation:

This is a very beginning step of any project in the project management practices. In this step, mainly, project feasibility is carried out and drafted. at this step, management takes decisions that this project would be profitable or not for the organization. If proper measure and future prediction do not measure properly then this stage would affect the project success criteria. Because, if the base of any project is built on the wrong steps and measures, will lead to failure. At this stage, management takes the decision based on a feasibility document and business case document to ensure if it feasible or profitable to the organization.

Planning:

This is a very crucial step of project planning, and mistakes in this stage will lead the project toward failure. after receiving the green signal at the initiation stage, the proper project plan is carried out in a documented form. This project plan will guide the project manager and all stakeholders of the project in making the project successful. So, a well-written project plan is very critical and important for project success than any other phase of project management. Because the project plan gives the direction to the team to carried out the project execution process smoothly, it helps in handling risk and mitigation strategies to solve the risk, finance management, task management and in achieving timely deliverables.

Execution:

The planning phase and execution phase are most commonly associated with project management. This phase of project management is all about building deliverables and ensure timely delivery to customers for their satisfaction.  Team leader and/or project manager make this happen by allocating the required resources to develop the deliverables and keeping team members focus on their assigned tasks. This phase relies on the project  planning phase.

Monitoring and Controlling:

Monitoring and controlling are sometimes combined with the execution phase of the project because they often occur at the same time and carried out parallel to each other. At this stage, team performance, progress, and other project-related matrices are carried out to track their own progress. In this stage, key performance indicators are calculated, track variation from allocated resources such as cost and time, etc. This stage is important for project success, because if you don't deliver the quality and timely work then you may linger the project that directly affects the project cost and time.

Closure:

The team closes the project as they finished the project and customers/stakeholders approve the project output i.e product and then release the resources. This step is not crucial for project success as other all of the previous stages. but at this stage, effective communication, document finalization, and lesson learned document are required.

6 0
4 years ago
Draw a flow chart except the principle, time and date from the user. and display the simple interest and amount as output.​
timama [110]

Answer:

See attachment for flowchart

Explanation:

The explanation is as follows

1. Start

2. Get input for principal, time and rate

3. Calculate Interest using Interest = Principal * Rate * Time/100

4. Print Interest

5. Stop

7 0
3 years ago
What is the cheapest type of printer to buy and run?
myrzilka [38]
It depends solely on how much you will use it. For example, laser printers are more suitable for offices, schools, and environments, where the printer is used almost constantly. If it's used a lot, you're probably looking at a laser printer, since the cartridges have a slightly higher price, but a much higher yield. If you can't afford a laser printer, and you're only going to use it at home, you're probably looking at an inkjet. If you need to print off something for school, ask your teacher, or someone that works at your school. Some secondary/high schools might allow you to use their printers at a lower price
7 0
4 years ago
Read 2 more answers
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
Other questions:
  • What data does Bittorrenting uses? Explain.
    5·1 answer
  • ZeroIt is a function that takes one argument and returns no value. The argument is a pointer to int. The function stores the val
    15·1 answer
  • What is the difference between paper size and page margins in Word?
    10·1 answer
  • C++ Language Use functions to solve all problems in the mentioned assignment
    12·1 answer
  • To override a method in a subclass, the method must be defined in the subclass using the same signature and compatible return ty
    12·1 answer
  • How tractors are controlled
    8·2 answers
  • when you sent email your email can be set to automatically keep a copy where do you find these copies​
    13·1 answer
  • What is the definition of shape
    14·2 answers
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • _____is used to organize and modify the properties of the current selection.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!