1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
3 years ago
8

When the animation and the graphic designs are used to sell products or services, it is known as multimedia advertising. The sta

tement is____________? *
true or false​
Computers and Technology
1 answer:
Aliun [14]3 years ago
3 0

\qquad \qquad\huge \underline{\boxed{\sf Answer}}

The Correct choice is " True "

When the animation and the graphic designs are used to sell products or services, it is known as multimedia advertising.

You might be interested in
Write the name of the tab, the command group, and the icon that you need to use to justify text
const2013 [10]

Answer and Explanation:

In order to use the justified text

The name of the tab is the Home tab

The command is

First select the data in which you want to justify

Than go to the home tab after that go to the paragraph tab and then click on the dialog box launcher after that choose the drop-down menu of alignment and set justified text

The shortcut key is to use it is Ctrl + J

4 0
3 years ago
Identify the data link trailer blocker
IRINA_888 [86]
What are ur possible answers
7 0
3 years ago
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
3 years ago
Meg[] elements = {new Lois(), new Stewie(), new Meg(), new Brian()}; for (int i =0; i
Stells [14]

Complete question is attached as snapshot.

Answer:

This will result in a compilation error.

Here's the inheritance hierarchy:

Meg -> Lois -> Brian -> Stewie

Now Meg has 2 public Fxns, a() and toString().

Lois inherits from Meg and all its public functions as well but, overrides the a() fxn of its super class.

So finally Lois has fxns a(), b() and toString().

Brian extends Lois and inherits all the above listed fxns of Lois, but overrides the b() and toString() fxns.

Stewie extends Brian and inherits all the fxns of Brian, but overrides the a() and toString() fxns.

In the Main driver fxn, we call a() and b() methods of all these classes but, the base class Meg has no b() and it is not extending any class so its not available in its scope.

This results in a compilation error.

Explanation:

7 0
3 years ago
Name a software program?​
Tju [1.3M]

Answer:

mathematica ,is a software program helps to solve maths equation ...

Explanation:

mark me as brainliest ❤️

6 0
3 years ago
Other questions:
  • Dell Computer purchases parts and resources for its computers from multiple suppliers that are spread across the world. This pra
    8·1 answer
  • Which of the following Office Online apps is most effective for creating multi-media presentations
    15·1 answer
  • What is the wave speed of a wave that has a frequency of 100 Hz and a wavelength of 0.30m?
    5·1 answer
  • Which statement does not describe the guidelines for the use of text in presentation programs?
    7·1 answer
  • Q) CITY column of a table contains information such as Bangalore , Bangalore-64 , Bangalore-56001 , Mumbai - 400002 etc in order
    8·1 answer
  • A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
    5·2 answers
  • When entering a expressway using a weave lane you must do what
    7·1 answer
  • Whois the person start programming​
    13·1 answer
  • When preparing a technical document, do all of the following EXCEPT:_______.
    12·1 answer
  • Which statement is true about biometrics as an authentication method?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!