Microsoft paint and adobe illustrator are examples of ____ software.

Answers

Answer 1

Microsoft Paint and Adobe Illustrator are examples of graphic design software.

Graphic design software is used to create, edit, and manage visual artwork and designs. Microsoft Paint is a simple raster graphics editor that has been included with all versions of Microsoft Windows. It provides users with basic tools for drawing, painting, and editing images. On the other hand, Adobe Illustrator is a sophisticated vector graphics editor used by professionals to create and manipulate vector-based illustrations. Unlike raster graphics, which are made up of pixels, vector graphics are composed of paths, which makes them scalable without loss of quality. Both types of software play a crucial role in fields such as digital art, user interface design, and web development. They allow users to exploit various tools, such as templates and grids, provided within the software to align and arrange graphical elements meticulously, enhancing the overall visual composition.


Related Questions

NEED HELP PLEASEE!!!

Answers

                                                   Start
                                                  Guess
     Incorrect                                                                   Correct
-------------------------              Computer                    ----------------------
- displays incorrect               ------------                    - Displays "Well done"
- displays try again            counts number              - Informs the number of
                                           of guesses                     guesses



hope this helps

make 3 lines down from the start bubble, and do "IF- Then"


What is it called when a psychology major chooses to focus on forensic psychology?

Answers

it is called specialization

Answer:

it is called specialization

Explanation:

Which of the following definitions describes a chemical hazard?

Answers

a chemical that can harm ones body

Answer:

You didn't give any options, but here is a definition:

Chemical hazards are chemical contaminants, their residues, or degradation products to unacceptable levels in food.

Chemical hazards include natural toxins (ciguatoxins, paralyzing, neurotoxic, amnesic and diarrheal toxins, among others), microbial toxins (mycotoxins), toxic metabolites of microbial origin (histamines), pesticides, herbicides, toxic inorganic contaminants, antibiotics, anabolic, additives. and toxic food aids, lubricants, paints and disinfectants, pesticides, cleaning products (detergents and sanitizers, for example), heavy metals and a large amount of products that may come into contact with food.

Which of the following should you use to change the text size, color, and font face to make a section label stand out

A. Overtype

B. Heading styles

C. Text wrapper

D. Footnote

Answers

The options that should be used to change the text size, color, and font face to make a section label stand out are heading styles. The correct option is B.

What are heading styles?

Headings draw attention to text and aid in document scanning. Using heading styles is the simplest method for adding headings.

You may rapidly create a table of listings, rearrange your document, and reformat its layout by using heading styles instead of manually changing the text for each heading.

We should employ font, size, and style when updating the spreadsheet's format so that the user can read it easily. When colors are utilized with great contrast, separating the groups of data using borders or shading aids in in-group identification.

Therefore, the correct option is B. Heading styles.

To learn more about heading styles, refer to the below link:

https://brainly.com/question/2619778

#SPJ6

What is done to prevent a plan from becoming confusing because of too much detail

Answers

when providing instructions or rule to follow, it is important to make them as clear as possible. Simple commands follow by an example (when possible) are basic steps to deliver a precise massage. 
Another thing is to bare in mind who is receiving the instruction. The receptor should be apt to the plan knowing vocabulary, structures, etc. 
Last but not least, check if the receptor understood the plan, double check if you think it is necessary 

To prevent a plan from becoming confusing due to an excessive amount of detail, the strategies are

Clear and Concise ObjectivesPrioritize Information

What is the strategies

Clearly state the goals of the plan in a brief way. The goals should be clear, able to be measured, something that can be realistically achieved, related to the situation, and have a deadline (SMART). This helps to stay focused on the goal without adding unnecessary details.

Focus on the most important information and put it ahead of everything else when making a plan. Figure out which information is necessary to comprehend and carry out the plan successfully. Non-important or too much information can be removed or put in extra papers or materials for further reading.

Read more about  plan  here:

https://brainly.com/question/24864915

#SPJ6

Which two statements about using leased lines for your wan infrastructure are true? (?

Answers

The following statements are true: 1. Leased lines require little installation and maintenance expertise. ( A high service quality is offered by point-to point system) 2. Leased lines provide highly flexible bandwidth scaling. (This Allows a Constant availability)

Mr. Olgesandravich is proctoring students working at their own pace in an online class. He is generating a spreadsheet that shows both the amount of the course that is complete as well as when the students are expected to finish. Which two formats is Mr.Olgesandravich most likely using?

percentages and date
percentages and currency
currency and accounting
date and accounting

Answers

Answer: Percentages and date

The percentage column stores the amount of the course that is complete.
The date column stores the expected date of completion.

(tco 7) explain the concept of function overloading. provide a c++ program segment that illustrates an overloaded function.

Answers

Function Overloading is the Process Of creating a lot of functions with the Same name But the difference in the signature ( function return type or  number of Parameters or even type of parameters )

when calling the function , the compiler will choose the correct one up on the arguments you sent .. 


When you include javascript in a web application, the language is run by the javascript engine of th?

Answers

web browser.





__________________________

Answer:

Web Browser, sometimes, if there's in error, like games, JavaScript will not run, and any other things that are free, to use in browser, is a type of JS

Some languages from JS template.

Angular.JSNode.JSVanilla JS

What ribbon contains the option to edit a font, including underlining?

Answers

Final answer:

To edit font attributes like underlining in Microsoft Word, use the Home ribbon, as the Review ribbon is for tracking and reviewing changes, not initial font formatting.

Explanation:

To edit a font in Microsoft Word, including options like underlining, you would need to use the Home ribbon. This ribbon contains a variety of options for formatting text, such as changing the font type, size, color, and adding text effects like bold, italic, or underline. When you select text and apply such changes, they will be immediately visible in your document.

If you are using the Review ribbon, this primarily deals with tracking changes, adding comments, and reviewing edits made to the document. Edits made by others will appear in red or with a red strikethrough for deleted text. However, this ribbon is not where you would go to make initial font formatting changes.

Final answer:

In Microsoft Word, font editing options like underlining are located in the Home ribbon, which is where you can change text formatting such as bold, italics, and color.

Explanation:

The option to edit a font, including underlining, can be found in the Home ribbon of Microsoft Word. This ribbon contains a section for font customization where you can select the text you want to modify and apply various text formatting options such as font type, size, color, bold, italics, and underline. Also, when you make direct edits to your document, added text often appears in red or, if text is deleted, in red with a strikethrough.

What is the packet called where a web browser sends a request to the web server for web page data?

Answers

The Answer is: HTTP GET

Which button on the desktop do you click to examine your existing folder and file structure?

Answers

I am going to say file explore. Hope this helps. (ノ◕ヮ◕)ノ*:・゚✧

Answer: File Explorer

Explanation:

File Explorer is application that is found in computing system for management and navigation of files.It helps in extracting the content of file, tracks recently opened folder and file, arranges file in a folder etc.Graphical user interface(GUI) is used by File explorer so that is can access and manage and organize file system.File Explorer is launched by Microsoft corporation for exploring structure of files and folder

When using a spreadsheet package to answer "what if" questions, the user must change:?

Answers

When using a spreadsheet package to answer "what if" questions, the user must change a selected variable to see the outcome of the change.

Today due to the advanced technology and rising demand of computer technology we find different and many types of spreadsheet software packages, to write a few:

MS Excel

Google Sheets

Numbers

Easyoffice

Smartsheet

The colors red, blue, and yellow are known as the primary colors because they cannot be made by mixing other colors. when you mix two primary colors, you get a secondary color: when you mix red and blue, you get purple. when you mix red and yellow, you get orange. when you mix blue and yellow, you get green. design a program that prompts the user to enter the names of two primary colors, one at a time. if the user enters anything other than "red," "blue," or "yellow," the program should print "you didn't input two primary colors." otherwise, it should print something in the format: "when you mix red and blue, you get purple." (assuming the user entered "red" and "blue”.)

Answers

The Python program prompts the user for two primary colors, checks the input validity, and prints the resulting secondary color if valid, or an error message otherwise.

Below is a Python program designed to prompt the user for two primary colors and provide the corresponding secondary color based on the user input:

def mix_colors(color1, color2):

   if color1 not in ["red", "blue", "yellow"] or color2 not in ["red", "blue", "yellow"]:

       print("You didn't input two primary colors.")

   else:

       if color1 == "red" and color2 == "blue" or color1 == "blue" and color2 == "red":

           print(f"When you mix {color1} and {color2}, you get purple.")

       elif color1 == "red" and color2 == "yellow" or color1 == "yellow" and color2 == "red":

           print(f"When you mix {color1} and {color2}, you get orange.")

       elif color1 == "blue" and color2 == "yellow" or color1 == "yellow" and color2 == "blue":

           print(f"When you mix {color1} and {color2}, you get green.")

# Prompt the user for input

color1 = input("Enter the first primary color (red, blue, or yellow): ").lower()

color2 = input("Enter the second primary color (red, blue, or yellow): ").lower()

# Call the function to mix colors

mix_colors(color1, color2)

This program takes user input for two primary colors, validates the input, and then prints the corresponding secondary color based on the combination.

Which one of these is the most different? javascript php ruby python mysql?

Answers

The one that differs most from the others that are mentioned is MySQL.
All other, Javascript, PHP, Ruby and Python are web programming languages, which means are used for writing codes for developing websites.
MySQL on the other hand is not a programming language. It is a Database Management system. SQL stands for Structured Query Language.
MySQL is written in the programming language C and C++.

Answer:MySql

Explanation:

Amonng them, MySql is a data base

Why is it important to identify where privacy data resides throughout your it infrastructure?

Answers

One of the key elements in reducing the attack surface of an IT enterprise is to determine the location and sensitive nature of all data, especially privacy data which if compromised, could result in litigation, financial loss, or customer confidence loss. Additionally, this information is part of the foundation of when drafting a Disaster Recovery or Business Continuity plan.

List three functions that you can perform with a database that you cannot perform with a spreadsheet.

Answers

There are some function which can be performed with database but not with a spread sheet, these functions include: 
1. Enforcement of data type.
2. Support for self documentation.
3. Defining the relationship among constraints in order to ensure consistency of data.

Usually the storage device and storage medium are two separate pieces of hardware (that is, the storage medium is ____). question 8 options: 1) procurable 2) static 3) removable 4) configurable

Answers

Storage media are typically removable. This gives the user the ability to change out for a larger or newer piece of equipment if and when it is needed or the equipment fails. The device itself can be taken out of the medium (i.e., a caddie or some similar holding compartment.)

Write a short java method that takes an integer n and returns the sum of all the odd positive integers less than or equal to n.

Answers

public int add2n( int n )
{
    int total;
    if( n % 2 == 0 )
        total = n--;

    while( n > 0 )
    {
        total += n;
        n -= 2;
   }
   return( total );
}

Do you think the rise of Pinterest indicates a turning point for the world of social media?

Answers

Yes because Pinterest sort of controls the internet with most apple phones using pinterest

Answer: yes, because Pinterest is influencing a great number of people and with this new style of social media, more and more people will be attracted to it.

When santo is formatting the text in his wordart text box, he discovers that by default the text box is formatted with _______ text wrapping?

Answers

When Santo is formatting the text in his Wordart text box, he discovers that by default the text box is formatted with In Line With Text text wrapping. In order to change the text wrapping you should click the File Tab, then Word Options and then Advanced.

When Santo is formatting the text in his WordArt text box, he discovers that by default the text box is formatted with In Line with Text text wrapping.

WordArt in Microsoft Word is a feature that allows users to create stylized text with various special effects, such as textures, shadows, and outlines. When you insert WordArt into a document, it typically comes with a default text wrapping setting. Text wrapping determines how text will flow around the WordArt object in the document. The default setting, 'In Line with Text', means that the WordArt will be treated like a piece of text, aligning it in line with the rest of the text on the page. This setting can be changed to others such as Square, Tight, Through, Top and Bottom, Behind Text, or In Front of Text, according to the desired layout of the document. Understanding text wrapping is helpful when arranging visual elements in a Word document to ensure that the placement aligns with the overall layout and design goals.

An operating system cannot run from an external drive. true or false

Answers

This is false. An operating system CAN run from an external drive.

the banner over the finish line of a race is 400 cm long and 85 cm high. what is the area of the banner?

Answers

The area of the banner in cm squared is 400x 85 or 34000 sq cm but a less cumbersome number is 400cm = 4m (100 cm to 1 metre) and 85 cm = 0.85m so 4m x 0.85m= 3.4 sq metres for the area of the banner in manageable units.

______ is the software that protects your computer from harmful files, trojan horses, and worms.

Answers

The software that protects your computer is an antivirus

Answer:

Antiviruse

Explanation:

The software that protects your computer is an antivirus

What does a converter do?

Answers

Generally, a converter converts either alternating current to direct current, or vice versa

Write a short java method, ismultiple, that takes two long values, n and m, and returns true if and only if n is a multiple of m, that is, n = mi for some integer i.

Answers

public boolean ismultiple( long n, long n )
{
    return( n % m == 0 );
}
Final answer:

The ismultiple method checks if a number is a multiple of another number using the modulus operator in Java.

Explanation:

To check if a number n is a multiple of another number m, we can use the modulus operator (%) in Java. The modulus operator returns the remainder when n is divided by m. If the result is 0, it means that n is divisible by m and hence, n is a multiple of m. Here's the implementation of the ismultiple method:

public class Main {
 public static boolean isMultiple(long n, long m) {
   return n % m == 0;
 }

 public static void main(String[] args) {
   long n = 10;
   long m = 5;
   System.out.println(isMultiple(n, m)); // Output: true
 }
}

Experienced computer users who need information on advanced topics are likely to need a ____.

Answers

Brainly account. that sure was an easy question.

What command can the current users execute to show a list of commands previously entered? explain the utility of this command?

Answers

For Linux systems, we have a command called history. This command will display all the commands entered by you in the terminal. Just type history and press enter then you get what you want. For Windows systems just use the arrow up to toggle through the command prompt.

__________ ensure that hardware and software produced by different vendors work together.

Answers

Hi!

Standards are what help ensure that hardware and software made by different vendors can work together.

Hopefully, this helps! =)

What does ‘‘negotiation’’ mean when discussing network protocols? give an example?

Answers

Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

Final answer:

Negotiation in network protocols is the process where communication parameters are established between entities to facilitate data exchange, similar to how business negotiations aim to reach agreements, albeit with cultural variations that impact the approach and success of the negotiations.

Explanation:

Negotiation in Network Protocols

When discussing network protocols, ‘negotiation’ refers to the process in which the entities involved in a communication establish the parameters of their connection and data exchange. This involves a set of precise rules that outline the sequence of who will transmit data first, the expected responses, and subsequent actions, thus facilitating a cooperative “conversation” between different devices or applications over a network.

An example of negotiation can be seen when a client and server determine the best encryption algorithm to use during the starting phase of a secure HTTPS session, ensuring both parties support and agree on the chosen method for securing data transmission.

In the business world, negotiation also plays a vital role. The process can be culturally dependent, as negotiation styles vary across different societies. For instance, Western cultures may view negotiation primarily as a business activity with a focus on concrete outcomes and efficiency, while other cultures, such as in Brazil or China, may prioritize building trust and respecting social norms and indirect communication styles when negotiating.

The context and cultural nuances can greatly affect the outcome and process of negotiation, making it crucial for negotiators to understand and adapt to the cultural expectations of their counterparts.

Other Questions
In the diagram, m < ACB = 65.m < ECA = A. 180B. 115C. 65D. 90 During the 1500s, Spanish explorers explored which area of the United States? The longest side of an isosceles obtuse triangle measures 20 centimeters. The other two side lengths are congruent but unknown.What is the greatest possible whole-number value of the congruent side lengths?A.9 cmB.10 cmC.14 cmD.15 cm Please help me with History!!! 1. Egypt's economy was mostly:agriculturalurbansuburbanindustrial2. Egyptians made "paper" from:papyrus reedscuneiform reedsag reedsdry reeds3. Who owned everything in Egypt?shahPharaohpeoplevizier4. Egypt was ruled by a vast:common marketbureaucracyhordecongress5. The threefold division of Egyptian society was:(NOTE: FOR THIS YOU CAN SELECT AS MANY AS YOU WANT AS LONG AS THEY ARE CORRECT)royaltyaristocracymerchantsmiddle classgentrylower class6. The key to deciphering Egyptian script was the Stone. (Pyramid, Ancient, Pharaoh, or Rosetta) 7. Egypt was the first in literature because they were the first to have it for its own sake rather than for religious or utilitarian value.TrueFalse8. The earliest extant Egyptian literature are The Texts. (Pyramid, Ancient, Pharaoh, or Rosetta) 9. Four main Egyptian art forms include:(NOTE: FOR THIS YOU CAN SELECT AS MANY AS YOU WANT AS LONG AS THEY ARE CORRECT)sculpturebas-reliefpotterypaintingtracingjewelry making10. Polytheism is the belief in god(s). (many, one, two, three) 11. Match the following items (For example, 1 and a) 1. the sun god2. the god of the Nile and fertility3. the goddess of naturea. Osirisb. Rac. Isis What mass of ammonium chloride should be added to 2.45 l of a 0.165 m nh3 in order to obtain a buffer with a ph of 9.50? complete a prime factorization of 54 and write it as a product of primes In "A Cub Pilot" why does the author say Mississippi is "Fickle"A. The river is constantly changingB. He is angry at the mississippi for floodingC. He often finds the occupation of a riverboat pilot frustratingD. The relationship among pilots seems difficult HELP!! Given f(x)=5x squared and g(x) = x squared + 2x squared - 5x, what is F (x) * g(x)? Does the federal government equally serve majority and minority interests today? When I add two to my number and then multiply it by five, I get thirty. What is my number? Mr woods is going to fence his garden, His garden is rectangular shaped with the length being 13 1/2 feet and the width 8 1/4 feet how many feet of the fence should mr woods buy to fence in his garden? Explain how you would find the sign of the quotient 32 divided by -2 divided by -164 Through any three noncollinear points, there is exactly one plane containing them. Points W, X, and Y are noncollinear. As an unenrolled tax preparer, Daryl is subject to: What does it mean to think outside the box? Kim multiplied 8 by 0.952 and got 76.16 how can you estimate to show that Kim's answer is incorrect What are the factors of the trinomial x^2+6x-7 Justin and Tyson are beginning an exercise program to train for football season. Justin weighs 150 lb and hopes to gain 2 lb per week. Tyson weighs 195 lb and hopes to lose 1 lb per week. A. if the plan works, in how many weeks will the boys weigh the same amount? B. what will that weight be? what is 0.42 as a fraction in simplest form? A farmer pulls on his obstinate mule with 250 N of force to the right. The ground exerts a reaction force to the mules resistance of 250 N to the left. What is the net force on the mule system? What is the mules acceleration? Steam Workshop Downloader