1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
3 years ago
10

Create a Double complementary or tetradic colors (are a set of two complementary pairs of colors that form a rectangle on the co

lor wheel (such as red, orange, green, and blue) rendering of the landscapes using geometric shapes and other design elements found in nature. Student will be tasked to use a previous template or recreate a local beach or landscape using organic and geometric shapes?
Computers and Technology
2 answers:
mafiozo [28]3 years ago
7 0

Answer: (Remember, two colors are complementary if they are opposite each other ... colors are connected on the color wheel they form a rectangle.

Explanation:

best one i could find if worng am verys very sorry.

hjlf3 years ago
4 0

Answer:

(Remember, two colors are complementary if they are opposite each other ... colors are connected on the color wheel they form a rectangle.

Explanation:

best one i could find if worng am verys very sorry.

You might be interested in
Which of the following correctly declares an array:
AleksandrR [38]

Answer:

a.

Explanation:

6 0
3 years ago
Here is a super challenge for you if you feel up for it. (You will need to work this out in Excel.) In 2017 the Islamic month of
Ann [662]

Answer:

7/73

Explanation:

May has 31 days. 31 - 26 = 5. So there are 5 more days to the next month (June). June has 30 days. So Muslims fasted 35 days in total. 2017 had 365 days. 365 - 35 = 330 days were spent not fasting. So the fraction is 35/365. This fraction simplified would be 7/73.

4 0
4 years ago
Consider the following C program: int fun(int *i) { *i += 5; return 4; } 352 Chapter 7 Expressions and Assignment Statements voi
Musya8 [376]

Answer:

a. operands are evaluated left toright. 7

b. operands are evaluated right toleft. 12

Explanation:

a. operands are evaluated left toright. 7

b. operands are evaluated right toleft. 12

left to right

int fun (int *i) {

*i +=5; we add 5to x making x 8

return4; we return 4 tomain

}

void main ( ) {

int x = 3;

x = x + fun(&x); x starts at 3 in fun it ischanged to 8 but the 3 is already being used the 4 fromfun is added (3+4) to it making it 7

}

right toleft x starts at 3 in fun x gets changed to 8 and fun is returned as 4so we have 4 + 8 = 12

Paraphrasing

left to right it's is 3 + 4 =7 original value of x is used

right to left it is 4 + 8 =12 x is used as it was changed by fun, since fun was alreadyexecuted

4 0
4 years ago
What is the best way to protect computer equipment from damage caused by electrical spikes?
Nat2105 [25]
Plug equipment into a surge protector because that will take most of the spike of electricity. The plugging everything via USB will be okay if it is connected to a surge protector. Turning off the equipment when not in use will only make the battery live longer if it gets spiked while it is off it will still be messed up. Recharging equipment is only good for when you don't have any power and need to use this certain device. So now that i have gone over all of the options it should be clear that plugging your electronics into a surge protector is best out of all of the options.
4 0
3 years ago
Read 2 more answers
The various protocols in use on the Internet are said to operate in layers in which the protocol(s) at each layer solve one prob
PtichkaEL [24]

Answer:

What are you asking of us friend? I'd be glad to help.

Explanation:

8 0
4 years ago
Other questions:
  • Which of the following functions does a browser perform?
    5·1 answer
  • The index finger on your right hand types the _____.
    11·1 answer
  • The instructions for the OS provided by application software
    14·2 answers
  • Write any two rule of function​
    10·1 answer
  • Assume that name has been declared suitably for storing names (like "Amy" , "Fritz" and "Moustafa") Write some code that reads a
    13·1 answer
  • What does the action tool allow you to do in Microsoft power point?
    9·1 answer
  • Linux distributions automatically come with a native software firewall.TrueFalse
    13·1 answer
  • All the network nodes are connected to each other
    8·1 answer
  • During the first six months of his job, Enrique's boss gave him weekly feedback about his performance. What component of effecti
    9·1 answer
  • What is the output for the code below?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!