1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
2 years ago
13

How were these isometric letters created?

Computers and Technology
1 answer:
fomenos2 years ago
6 0

Answer:

Using the 3D Extrude & Bevel effect.

Explanation:

I just took the test, I got a 100.

You might be interested in
.Although SQL is a language, you don’t use it to write applications? (true, false)
Olin [163]

Answer:

The correct answer for the given question is true .

Explanation:

SQL is an Structural query language that is used for accessing the database basically it is an query language which is used for communicating with database by executed the query .

The following are the function of SQL  

SQL can insert the data into database

it can update the record into database

SQL can retrived the database.

We do not use SQL for writing application it is only used to accessing the database  

For create application we can use programming language Like PHP,ASP,JAVA ,PYTHON.etc.

3 0
3 years ago
Suppose you are given a text file. Design a Python3 program to encrypt/decrypt that text file as follows:
Allushta [10]

Answer:

Explanation:

Please find attachment for the Python program

Download docx
7 0
3 years ago
This method is employed in order to rapidly change the locations of the website in order to ensure that no one site us used long
tester [92]

Answer:

Fast-flux

Explanation:

The techniques that is used to shift the network without shutdown of website.

4 0
3 years ago
6. How can you encrypt an entire drive, including files and folders belonging to other users? a. EFS b. User Account Control c.
matrenka [14]

Answer:

A.

Explanation:

Encrypting File System (EFS) is a file system which enables you to encrypt files, thus making them unviewable by any account but your own.

6 0
3 years ago
What is output by the following code?
Naily [24]

Answer:

Sum = 3

Sum = 9

Sum = 18

Sum = 30

Look at the image for more information.

4 0
2 years ago
Other questions:
  • A four-year old laptop will not boot and presents error messages on screen. You have verified with the laptop technical support
    11·1 answer
  • A ____ is text and graphics that print at the bottom of every page.
    12·1 answer
  • Which of the following statements regarding EFT is false? EFT still requires the endorsement of a check EFT allows payment to be
    11·1 answer
  • What are the conditions for using still photos in a video program
    6·1 answer
  • PLEASE PLEASE PLEASE HELP!! WILL GIVE A BRAINLIEST IF UR RIGHT!!
    14·1 answer
  • Which model emphasizes the risk analysis phase of development
    12·1 answer
  • En que se diferencia el software y el hardware
    7·2 answers
  • Write a program to generate a square wave with 80% duty cycle on bit P2.7 Microprocessor.​
    7·1 answer
  • What are the steps to customize a slide show?
    10·2 answers
  • Creating a wedding website on the knot- how to make the text wide
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!