melissa created a brochure for fashion fabrics with this image. wich design elements are significant in this image

Melissa Created A Brochure For Fashion Fabrics With This Image. Wich Design Elements Are Significant

Answers

Answer 1

Answer:

Texture is very prominent in the image. The other elements are

_Shape_ and _Color_.

Explanation:

If we were to look through our choices, space doesn't make sense as there is no clear distinction between foreground, middle ground, and background. It's not form because the image shown shows no manipulation of light that would make the subject of the image look realistic.

- 2021 Edmentum

Melissa Created A Brochure For Fashion Fabrics With This Image. Wich Design Elements Are Significant
Answer 2

Texture stands extremely prominent in the image. The other features exist

Shape and Color.

What are the significant elements in the image?

Texture stands extremely prominent in the image. The other features exist

Shape and Color.

If we were to look through our choices, space doesn't create sense as there exists no clear difference between foreground, central ground, and background. It's not constituted because the picture shown delivers no manipulation of light that would cause the subject of the picture to look realistic.

According to each line style (fiber, natural fiber, cotton, recycled plastic, silk), you can design various clothes and styles. Harmony happens when the overall design, garment, or ensemble performs visible unity.

To learn more about significant elements in the image

https://brainly.com/question/13581860

#SPJ2


Related Questions

Assume that Student, Employee and Retired are all extended classes of Person, and all four classes have different implementations of the method getMoney. Consider the following code where_______ indicates the required parameters for the constructors:
Person p = new Person(...);
int m1 = p.getMoney(); // assignment 1
p = new Student(...);
int m2 = p.getMoney(); // assignment 2
if (m2 < 100000)
p = new Employee(...);
else if (m1 > 50000)
p = new Retired(...);
int m3 = p.getMoney(); // assignment 3

Refer to above code The reference to getMoney() in assignment 1 is to the class:________
a. Person
b. Student
c. Employee
d. Retired
e. This cannot be determined by examining the code

Answers

Answer:

a. Person

Explanation:

The reference getMoney() is a method that is part of the Person class. This can be proven with the code since subclasses can access methods from the parent class but a parent class cannot access methods from the child classes. Since Student, Employee, and Retired are all child classes that extend to the Person parent class then they can access getMoney(), but unless getMoney() is in the Person class, then a Person object shouldn't be able to access it. Since the first object created is a Person object and it is accessing the getMoney() method, then we can assume that the getMoney() method is within the Person class.

Which type of query enables a user to move, append, or update matching records in a table?
action query
select query
static query
parameter query

Answers

Answer:

the query that allows these things is called an action query

Answer:

The answer is A-action query just finshed the review on edg 2021

Explanation:

lasses give programmers the ability to define their own types.

a. True
b. False

Answers

Answer:

TRUE.

Explanation:

How can getchar function be used to read multicharacter strings?​

Answers

69696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V6969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V6969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V69696969696969969696969696966969696969696

Which of these is a good thing to consider when naming variables?
The name should be readable and make sense
Keep it short, less typing
Use only letters
O Sentences are Tood variable names.

Answers

Answer:

The name should be readable and make sense

Explanation:

Aside the rules involved in naming variables, there are also some good tips which should be considwred when given names to our variables. These means there are some variables which are acceptable by our program but may be avoided in other to make our codes easier to read by us and others and it also makes debugging easier when we run into errors. Using short variables are acceptable on code writing as far as the rules are followed. However, it is more advisable to use names that are descriptive and readable such that it relates to the program or code being worked on. This ensures that we and others can follow through our lines of code at a much later time without making mistakes or forgetting what the variable stands for.

Code in Python

Write a while loop that prints user_num divided by 2 until user_num is less than 1. The value of user_num changes inside of the loop.

Sample output with input: 20
10.0
5.0
2.5
1.25
0.625


Note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds and report "Program end never reached." The system doesn't print the test case that caused the reported message.

My code, it only passes one test with correct outputs
what am I forgetting?

Answers

You're setting the value of user_num to 20. Doing this won't allow the other test cases to run. Simply delete that line and your code should work. This is the code I wrote:

user_num = int(input())

while user_num>=1:

   user_num/=2

   print(user_num)

I wrote my code in python 3.8. I hope this helps.

What does the following code print?
public class { public static void main(String[] args) { int x=5 ,y = 10; if (x>5 && y>=2) System.out.println("Class 1"); else if (x<14 || y>5) System.out.println(" Class 2"); else System.out.println(" Class 3"); }// end of main } // end of class.

Answers

Answer:

It throws an error.

the public class needs a name.

like this:

public class G{ public static void main(String[] args) {

   int x=5 , y = 10;

   if (x>5 && y>=2) System.out.println("Class 1");

   else if (x<14 || y>5) System.out.println(" Class 2");

   else System.out.println(" Class 3"); }// end of main

   }

if you give the class a name and format it, you get:

Class 2

Explanation:

By the 1970s, the acceleration of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics of the Middle Ages, fears that were confirmed beginning in the 1970s by the worldwide spread of:________
a. the Zika virus.
b. the HIV infection
c. severe acute respiratory syndrome (SARS)
d. the Asian flu virus
e. Ebola

Answers

Answer:

b. the HIV infection.

Explanation:

Around the 1970s, an increase in the use of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics such as tuberculosis, leprosy, smallpox, trachoma, anthrax, scabies, etc., that were evident during the Middle Ages, fears that were later confirmed by the worldwide spread of the HIV infection, beginning in the 1970s in the United States of America.

STD is an acronym for sexually transmitted disease and it can be defined as diseases that are easily transmissible or contractable from another person through sexual intercourse. Thus, STD spread from an infected person to an uninfected person while engaging in unprotected sexual intercourse. Some examples of STDs are gonorrhea, chlamydia, syphilis, HIV, etc.

HIV is an acronym for human immunodeficiency virus and it refers to a type of disease that destabilizes or destroy the immune system of a person, thus, making it impossible for antigens to effectively fight pathogens.

Generally, contracting STDs has a detrimental effect to a patient because it causes an opening (break) or sore in the body of the carrier (patient) and as such making them vulnerable to diseases that are spread through bodily fluids e.g human immunodeficiency virus (HIV), Hepatitis, staphylococcus, AIDS, etc.

Suppose data is available for an on-line music distributor. This data includes: song title, artist performing the song, date song purchased, amount charged for the song. Using only the information available in the distributor's data (song title, artist performing, date purchased, amount charged), which of the following can be determined using database or spreadsheet software?

a. The number of songs by a particular artist that were purchased on a given date.
b. The amount of money charged on the first day of any given month.
c. Whether the amount charged is the same for each song title.

Answers

Answer:

The answer is "Option a".

Explanation:

In this question, the only choice "a" is correct because in the question it is declared that it includes: your track title, the performance artist, the date their track is bought, the fee for the track. Its number of music purchased by a given artist on a particular date is based only on details available on the distributor's song title, performing, date purchased, the sum paid.

which one of the following can be used in a Document name,when saving?
1.Numbers
2.Semi-colon
3.Forward dash
4.Question mark​

Answers

Answer:

3. forward dash would you like an explanation?

Only number can be used in a Document name.

File names are shown in alphabetical order in the folder structure. It is critical to also include the zero for numbers 0-9. This helps to maintain the numerical order when file names contain numbers.

Most software packages are case sensitive, so use lowercase wherever possible. Instead of using commas and underscores, use a hyphen.

So, Option "1" is the correct answer to the following question.

Learn more:

https://brainly.com/question/17429689?referrer=searchResults

How do I find error corrections in an EAN-8 barcode?

Answers

Answer: I am not sure if I remember but I believe if the single digit matches the last digit on the barcode then the barcode is correct or valid.

But, If the digit is different from the one on your computer then their is an error. I recommend In order to check for error is to remove the received check digit and recalculate it based on the 12-digit identification code. (This I use for EAN-13 but since Ean-8 is basically short version of 13 try it)

How do you write a poem on the topic 'I am good at singing'? answer and get 100 points

Answers

Answer:

ur mom

Explanation:

Which of the following was most likely used to apply red background and font to some of the cells in column D?

Answers

Answer:

d. conditional formatting

Explanation:

The option that would most likely be used to accomplish this would be conditional formatting. This is an option in which, if a condition is met, the cell is given certain format changes. In this scenario, the condition would be if a cell is located in column D, then apply a red background and specific font. This would be automatic throughout the entire document so that if any new cell is created in column D it would automatically be formatted according to the conditional formatting that was used.

Therese would now like to preview her slide show to make sure everything is working. She should___.
• switch to Normal slide view
•click on the first slide in the slide pane
• switch to Slide Show view
• click on Slide Show layout in the side pane

Answers

Answer:

c

Explanation:

how computer user interact with an application programs​

Answers

Answer:

computer users interact with their programs and applications through external devices called hardware, which allow the user to issue commands to computer programs, while also allowing these programs to issue responses to those commands. Thus, for example, the user interacts with the computer through the keyboard, by means of which he sends commands to certain programs that in turn respond, for example, through the monitor or the speakers.

The following implementations of the method reverse are intended to reverse the o rder of the elements in a LinkedList.

I.
public static void reverse (LinkedList alist)( LinkedList temp = new LinkedList (); while (aList.size ()>0) temp.addLast (aList.removeFirst ) aList.addFirst (temp.removeFirst ) while (temp.size ()> o)
II.
public static void reverse (LinkedList alist) while (aList.size () >0) while (Itemp.isEmpty 0) QueuecSomeType> temp new LinkedList 0: temp.add (alist.removeFirst ()): aList.addFirst (temp.remove ():

IlI.
public static void reverse (LinkedList alist) while (aList.size ()>0) while (Itemp.isEmpty()) Stack temp new Stack ( temp.push (aList.removeLast ()) aList.addFirst (temp.pop ());

Which of the choices above perform the intended task successfully? Why?

a. I only
b. Il only
c. Ill only
d. Il and Ill only
e. I, ll, and IlI

Answers

Answer:

c. Ill only

Explanation:

All of the code snippets provided are missing small details such as brackets in the correct places and '=' to signal an assignment. These are crucial when coding in Java and the code will not run without it. Regardless, the only implementation that is correct in the options would be implementation III. It is the only code snippet that is correctly structured to reverse the order of the elements. It will still need debugging in order to get it to work.

IlI.

public static void reverse (LinkedList alist) while (aList.size ()>0) while (Itemp.isEmpty()) Stack temp new Stack ( temp.push (aList.removeLast ()) aList.addFirst (temp.pop ());

The probability that the price of a commodity is increasing is 0.62 and the probability that the price is decreasing is 0.18 . What is the probability that the price of the commodity remains constant. Solved numerically​

Answers

bahug ka itlog hduxuwlowv heusuowjdd

to copy and paste the image in MS Word the dash option is used​

Answers

ur answer hope this will helps u

Explain why robots are better at some jobs than human workers are.

Answers

Answer:

Because humans have human minds meaning there are chances of errors, and or mistakes. and they do the same thing over and over with precise precision

Explanation:

hope this helps :)

what is the different between information and data

Answers

Answer:

Information is the act of imparting knowledge and data is the recorded observation that are usually presented in a structured format

¿sharpness or unbreaking people?​

Answers

Really hard decision, but ultimately, it depends on your personal prefrence. I would choose un breakin, however, for some people if you want to kill mobs quicker, than sharpness would be the way to go.

what is the mean of debugging​

Answers

Answer:

the process of identifying and removing errors from computer hardware or software

Explanation:

Essentially just fixing programming errors, mainly in coding or software

Which of the following is not a way to build customer loyalty

Answers

Answer: are there option choices? If not I would say

1. not giving back enough change

2. Being rude

3. not giving the right prices

4. Not answering questions

Explanation: hope this helps, have a great day!!

Let ∑ = {a,b}, and let L be the language over ∑:
L ={ w € ∑+ |w is even, and w contains at least one a in the first half and exactly one b in the second half }
Give a context-free grammar (CFG) for L, and briefly explain how it works to correctly represent the language. There are no additional requirements for your solution other than what is stated here, except the usual guidance to make sure your answer is clear and understandable and avoids too much unnecessary complexity. In particular, there is no credit for the grammar being unambiguous (if possible.)

Answers

Answer:

Explanation:

From the information given, By applying a CFG for L:

Because each state generates two symbols or null, the length will be equal and even.

1st Condition:

throughout the first half, at least one (a)

2nd:

exactly one (b) within the second half

Dear Student, there is a technical error that occurred when submitting this question. This makes us unable to submit the complete solution to the question but curb that effect, we've attached an image below that shows the complete algorithm and a detailed explanation of the question.

Best Regards.

Suppose that you are asked to modify the Stack class to add a new operation max() that returns the current maximum of the stack comparable objects. Assume that pop and push operations are currently implemented using array a as follows, where item is a String and n is the size of the stack. Note: if x andy are objects of the same type, use x.compareTo(y) to compare the objects x and y public void push String item ) { [n++] = iten; } public String pop { return al--n]; } Implement the max operation in two ways, by writing a new method using array a (in 8.1), or updating push and pop methods to track max as the stack is changed (in 8.2). Q8.1 Implement method maxi 5 Points Write a method max() using Out) space and Oin) running time. public String max() {...} Enter your answer here Q8.2 Update push() and popo 5 Points Write a method max() using On) space and 011) run time. You may update the push and pop methods as needed public void push {...} public String pop() {...} public String max() {...}

Answers

Answer:

Following are the code to the given points:

Explanation:

For point 8.1:

public String max()//defining a method max

{

   String maxVal=null;//defining a string variable that holds a value

   for(int x=0;x<n;x++)

   {

       if(maxVal==null || a[i].compareTo(maxVal)>0)//defining if blok to comare the value

       {

           maxVal=a[i];//holding value in maxVal variable

       }

   }

   return maxVal;//return maxVal variable value

}

For point 8.2:

public void push(String item)//defining a method push that accepts item value in a parameter

{

       a[n]=item;//defining an array to hold item value

       if(n==0 || item.compareTo(maxVals[n-1])>0)//use if to comare item value

       {

               maxVals[n]=item;//holding item value in maxVals variable

       }

       else

       {

               maxVals[n]=maxVals[n-1];//decreasing the maxVals value

       }

       n++;//incrementing n value

}

public String pop()//defining a method pop

{

       return a[--n];//use return value

}

public String max()//defining a method max

{

       return maxVals[n-1];//return max value

}

In the first point, the max method is declared that compares the string and returns its max value.In the second point, the push, pop, and max method are declared that works with their respective names like insert, remove and find max and after that, they return its value.

what is a web client ​

Answers

Answer:

Web client:

it is an application(web browser,program etc ) that requests for service from a web server.

stay safe healthy and happy

what are the events?

Answers

Answer:

a thing that happens or takes place, especially one of importance.

A database designer wants to create three tables: Supplier, Product, and Country. The Supplier table has a Countryld column with values that must appear in the Country table's Countryld column. The Product table has an auto-increment column.
Which table's CREATE TABLE statement(s) must specify a FOREIGN KEY?
a. Supplier
b. Product
c. Country
d. Supplier and Country

Answers

Answer:

(a) Supplier

Explanation:

In database design, two tables are linked together using a FOREIGN KEY. A foreign key is formed from one or more columns of one table that reference or match another key (often called a primary key) in another table. In other words, when a column or a combination of columns on one table points to a primary key of another table, the column(s) will specify the foreign key.

PS: A primary key is used to make each entry of a table unique.

In the given tables - Supplier, Product, Country -  since the Supplier table has a column called CountryId referencing the CountryId column of the Country table, then CountryId is a primary key in Country table but a foreign key in Supplier table.

Therefore, the CREATE TABLE statement(s) of the Supplier table must specify a foreign key.

A database management system often reads and writes data in a database, and makes sure there is consistency and availability. The supplier table's CREATE TABLE statement(s) must specify a FOREIGN KEY.

The database system often guards data when a lot of transactions is taking place.   it often hinders multiple transactions with the same data at the same time.

The Select SQL statement does not alter any database data. A supplier database is made up of different list of service, product or materials providers who can meet orders quickly.

Learn more from

https://brainly.com/question/15281828

I bring my _____ computer to work
a. in box
b. ebook
c. attachment
d.blog.
e. delete
f. document
g. download
h. ebook
I. email address
j. file
k. inbox
l. keyboard
m. laptop
n. link
o. online
p. password
q. sign in​

Answers

Answer:

I think it's laptop or sign in

hope this helps

have a good day :)

Explanation:

Pick which one you think is the best choice

In the following cell, we've loaded the text of Pride and Prejudice by Jane Austen, split it into individual words, and stored these words in an array p_and_p_words. Using a for loop, assign longer_than_five to the number of words in the novel that are more than 5 letters long. Hint: You can find the number of letters in a word with the len function.

Answers

Answer:

Explanation:

Since the array is not provided, I created a Python function that takes in the array and loops through it counting all of the words that are longer than 5. Then it returns the variable longer_than_five. To test this function I created an array of words based on the synapse of Pride and Prejudice. The output can be seen in the attached picture below.

def countWords(p_and_p_words):

   longer_than_five = 0

   for word in p_and_p_words:

       if len(word) > 5:

           longer_than_five += 1

   return longer_than_five

Other Questions
What is the capital of Kenya? What stand did the new Republican Party take on the issue of slavery? Find the sum of 5/8 + 3/10 * The PO2 and PCO2 of blood leaving the lungs is kept remarkably constant. This homeostasis is maintained by adjusting the magnitude, or volume, of respiration. Thus, it follows that changes in the magnitude of respiration are influenced by changes in P_O2 and P_CO2 in the body.Of these two gases, changes in ____(1)___ are the most important in regulating the magnitude of ventilation. A rise in the partial pressure of this gas triggers the body to __(2)____ the magnitude of ventilation. Which of the following statements correctly describes the major mechanism by which this has is monitored?(1) PO2 or PCO2(2) decrease or increaseA. Peripheral chemoreceptors in the carotid arteries monitor changes to CO_2 levels in the arterial blood.B. Peripheral chemoreceptors in the carotid arteries monitor changes to P_CO2 levels in the arterial blood.C. Central chemoreceptors in the medulla monitor changes to H^+ levels in the extracellular fluidD. Central chemoreceptors in the medulla monitor changes to CO_2 levels in the extracellular fluid. Find the missing value for the parallelogram Given AB CD find the value of X hello please help ill give brainliest:) Can somebody please help me out please my grads are bad Which structure provides a link between the nervous and endocrine systems?A. pituitary glandB. hypothalamusC. adrenal glandD. thyroid gland how am i Invisible???????????????/ Find the coordinates of T' after the given translation.O a. T' (-5,-3)O b. T' (-3.4)O c. T'(-5, -1)O d. T' (-4,2) What was Governor Eugene Talmadge's argument against the New Deal?A. The New Deal represented an attempt by the federal government to reduce states' rights.B. The New Deal represented an attempt by the federal government to increase military spending.C. The New Deal represented an attempt by the federal government to distract from the war effort.D. The New Deal represented an attempt by the federal government to cover up widespread corruption among politicians. Roberta invested $600 $ 600 into a mutual fund that paid 4% 4 % interest each year compounded annually. Write an exponential function of the form =() y = a ( b ) x to describe the value of the mutual fund then use that function to determine the value of the mutual fund in 15 15 years. A student flips a coin 58 times. How many times can she expect the coin to land on heads? 7 Dara is preparing to perform open heart surgery on a cardiac patient. She makes sure to remove her wedding ring before vigorously scrubbing her hands and fingernails with special soap. Dara then puts on gloves to perform the surgery. Since Dara is wearing gloves during the surgery. what Is MOST likely the reason for taking off her wedding ring? so that the anesthesiologist does not know she is married OB. so that the ring does not come off Inside the patient . so that any bacteria or germs present on the ring do not contaminate the field OD. There is no reason for Dara to remove her ring if she wears gloves Reset Next How did the concept of separate but equal & Jim Crow Laws impact the culture of the South? It is important to have ________________ in a first aid kit. A. flash light B. socks C. assorted sized bandages D. paper to write down the problem What is the vertex of the graph of the function f(x) = x^2 + 8x - 2? PLS HELP ASAPWhat percentage of the human body is made up of water?A) 10%B) 30%C) 50%D) 70%E) 90% Which of the following is a subsurface event that takes place during the rock cycle? Deposition Erosion Weathering Plate tectonics