1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
3 years ago
15

a _____ is a recreation of a thumbnail in a desktop publishing software, also known as a "rough". a. proof b. digital draft c. l

ayout d. sketch
Computers and Technology
1 answer:
Dmitrij [34]3 years ago
6 0
D. It’s a sketch. That is, if you talking about, an art piece.
You might be interested in
Write some positive and negative impacts of computer in our daily life​
8090 [49]
Positive impacts are
1. Communicating with people
2. Daily update of what going on in the world
3. learn new things
Negative impacts are
1. Viruses
2. Private information shared
3. Less face to face conversations
3 0
3 years ago
Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?
Kipish [7]

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.

5 0
3 years ago
When both gears are the same size what will they produce
djverab [1.8K]

They produce a 1:1 ratio.  The input power is equal to the output power.

7 0
4 years ago
VLSI is the process of creating an integrated circuit (IC) by combing thousands of transistors into a single chip. There are two
STatiana [176]

Answer:

The process of choosing IC technology depends upon some factors that are as follows:

  • Size of Image
  • Size of Database
  • Transformation method complexity
  • Task after Transformation step

So, by considering the given scenario, first one will be chose that is FPGA.

FPGA stands for Field Programmable Gate Array. It is preferred because it has short design cycle. Moreover while prototyping in FPGA, development kits are present which add a lot to help.

A satisfied amount of speed, power consumption and area requirements are provided by Field Programmable Gate Array FPGA.

<h2>I hope it will help you!</h2>

6 0
4 years ago
1. ___________ ensures the integrity and security of data that are passing over a network.
allochka39001 [22]

Answer:

The correct answer to the following question will be Option D (Network-security protocols).

Explanation:

  • Methods and procedures for protecting network data from unwanted information retrieval are managed by network security protocols.
  • They are a network-style protocol that guarantees the protection and privacy of data in transit through a wireless connection. It describes procedures and techniques for protecting network data from every unauthorized effort to access or remove data material.

Therefore, Option D is the right answer.

5 0
4 years ago
Other questions:
  • What output is produced by the following code fragment int num = 1 max = 20 while num &lt; max?
    7·1 answer
  • Computers have become easier to use and more powerful over time.
    12·2 answers
  • Write a complete main method that does the following: 1. Takes any number, but at least two, command line arguments which are nu
    8·1 answer
  • What 2 major agricultural inventions did jethro tull create?
    10·2 answers
  • How would a top margin be set
    7·1 answer
  • escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. J
    10·1 answer
  • Which of these is a major mobile game developer?
    9·1 answer
  • The auto fill feature of excel only allows the user to fill cells with a series using the existing formatting options of the cel
    10·1 answer
  • The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and eac
    12·1 answer
  • You want to purchase a computer, and the salesperson refers to separate pricing for a system unit and for the software applicati
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!