1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
3 years ago
7

For his class project, Matt has to create an image in a color scheme that has shade or tint variations of the same hue. Which co

lor scheme should he use?
A.
achromatic
B.
monochromatic
C.
tetradic
D.
split-complementary
E.
square
Computers and Technology
1 answer:
Alex3 years ago
5 0

Answer:

B.Monochromatic

Explanation:

mono means one

You might be interested in
ou work as network administrator for an organization that has a Windows-based network. You want to use multiple security counter
kolezko [41]

Answer:

The three components used by defense in depth strategy are:

1) Physical controls

2) Technical controls

3) Adminstrative controls

Explanation:

Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.

If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.

Defense in depth strategy uses three components which are:

* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.

* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.

* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.

8 0
3 years ago
Which set of symbols encloses an if-then code block? Choose the best answer.
Colt1911 [192]

Here's some code that might help, assuming that you are using JavaScript.

e = "Hello"

if(e === "Hello"){

    alert(":D")

}else{

    console.log("Um.")

}

I think that the answer is curly brackets.

8 0
3 years ago
What is a music composition copyright?
Anestetic [448]
For copyright<span> purposes, there is a difference between </span>MUSICAL<span> COMPOSITIONS and SOUND RECORDINGS. A </span>Musical Composition<span> consists of </span>music<span>, including any accompanying words, and is normally registered as a work of performing arts. The author of a </span>musical composition<span> is generally the composer and the lyricist, if any.</span>
3 0
3 years ago
Read 2 more answers
What is the proper citation for a video source? A. Video: Hank Aaron. Dir. Don Donto. VidCassette. 1985. DVD. Home Video, 1986.
VashaNatasha [74]
The answer it had to be B
6 0
3 years ago
Grenstall Inc., a software development firm, has adopted a new job evaluation system in which managers are asked to objectively
rosijanka [135]

Answer:

Grenstall is most likely using the point system

Explanation:

The point system is a method of job evaluation system that involves measuring performance of workers in an organization and allocating points to identifiable factors such as skills, efforts, training, knowledge and experience based on its performance. It does not focus on entire job functions. The allocated points enables the organization to determine the compensation that is commensurate for a particular position.

Greenstall Inc uses the point system technique of job evaluation system for its managers as their jobs were broken down based on their skills, mental and physical efforts, training, and responsibility with points being allocated to each of these factors which are then summed up.  

7 0
3 years ago
Other questions:
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • Select the proper ergonomic keyboarding techniques.
    15·2 answers
  • Which of these planets has the coldest surface temperature?
    6·2 answers
  • Which of these sites would need additional investigation to check for reliability?
    8·2 answers
  • Ng/ Computer Applications - Office 2016 - EL3520 A
    13·1 answer
  • Describe safe motherhood​
    9·2 answers
  • Write a program that lets the user enter a nonnegative integer then uses a loop to calculate the factorial of that number. Displ
    11·1 answer
  • Think about some of the most memorable and forgettable games ever created. They can be games that were discussed in this unit or
    10·1 answer
  • Where do you interact with databases on a daily basis?
    10·2 answers
  • Suppose a packet is 10K bits long, the channel transmission rate connecting a sender and receiver is 10 Mbps, and the round-trip
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!