vector graphics are composed of solid __________,curves and other __________ shapes​

Answers

Answer 1

Answer:

Lines; geometric.

Explanation:

Graphic design can be defined as an artistic process used for the creation of art works such as logos.

In the creation of various graphic files such as in 2-D or 3-D we can use a variety of software applications or programs such as Blender basics, Adobe photoshop, illustrator, Coreldraw, etc.

Graphic design involves the use of vector graphics, bitmap graphics or raster graphics.

Vector graphics are composed of solid lines, curves and other geometric shapes that are typically defined by series of mathematical instructions. Thus, vector graphics can be scaled to a smaller or larger size without any change in its quality.


Related Questions

classified Computer by their age​

Answers

Answer:

The answer is below

Explanation:

Classification of computers by age are the following:

First generation from 1940 to 1956. For example, ENIAC using a vacuum tube

Second generation from 1956 to 1963. For example, IBM 7070 using transistor

Third generation from 1964 to 1971. For example, this type of computers use an Integrated circuit

Fourth generation from 1972 to 2010. For example, IBM 5100 using a microprocessor.

Fifth-generation from 2010 to present For example IBM Watson, using Artificial intelligence.

PHOTOSHOP IS A GRAPHICS EDITING PROGRAM CREATED WITH IMAGES KNOWN AS________ ​

Answers

Answer:

Adobe

Explanation:

Your colleague developed a function, which is supposed to reverse an array of integers, e.g., {1, 5, -10, 7, 23} => {23, 7, -10, 5, 1}. Test cases show that the function does not work correctly. Please look at the following code and identify all the troubles. Please specify which part(s) of the code will not work and explain why not.

void ReverseArray(int arr[], size_t elements_no) {
size_t i = 0; int x = 0; for (i = 0; i <= elements_no; i++)
{ x = arr[i]; arr[i] = arr[elements_no - i]; arr[elements_no - i] = x; }

}

Answers

Answer:

The parts of the code which makes the program not to work properly is:

1. for (i = 0; i <= elements_no; i++)

2. arr[i] = arr[elements_no - i];

3. arr[elements_no - i] = x;

The correction of the above lines are:

1. for (i = 0; i <= elements_no/2; i++)

2. arr[i] = arr[elements_no - i-1];

3. arr[elements_no - i-1] = x;

Explanation:

It should be noted that the code end up not reversing the array. This happens because the programmer iterates through all the array elements.

i.e.

1. for (i = 0; i <= elements_no; i++)

This will result in the original array.

To solve this problem, the iteration has to stop at the middle element and the correction is:

1. for (i = 0; i <= elements_no/2; i++)

Also, to swap the individual elements 1 has to be subtracted from each array index. So, the following lines:

2. arr[i] = arr[elements_no - i];

3. arr[elements_no - i] = x;

is corrected to:

2. arr[i] = arr[elements_no - i-1];

3. arr[elements_no - i-1] = x;

See attachment for complete corrections

Define the html code to insert a heading
and
paragraph about yourself using head
ing and paragraph.​

Answers

Answer:

okay so,bruedbure

Explanation:

yedhuji r4uh 4tuh t4gyi gu4h gtuh4tgr

1- In MIPS, all operation codes (op-codes) use ______ only.

A- 5 bits
B- 8 bits
C- 6 bits
D -32 bits

Answers

Answer:

the answer is -32

Explanation:

The answer is D -32bits

(Find the number of days in a month) Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if the user entered month 2 and year 2000, the program should display that February 2000 has 29 days. If the user entered month 3 and year 2005, the program should display that March 2005 has 31 days. Sample Run 1 Enter a month in the year (e.g., 1 for Jan): 4 Enter a year: 2005 April 2005 has 30 days Sample Run 2 Enter a month in the year (e.g., 1 for Jan): 2 Enter a year: 2006 February 2006 has 28 days Sample Run 3 Enter a month in the year (e.g., 1 for Jan): 2 Enter a year: 2000 February 2000 has 29 days

Answers

Answer:

Follows are the code to this question:

m= int(input("Enter month: "))#defining a m variable that takes months value

y= int(input("Enter year: "))#defining a y variable that takes years value

if m in [1, 3, 5, 7, 8, 10, 12]:#use if block that check m value is in list

   n_day = 31#defining a variable n_day that holds a value  

elif m in [4, 6, 9, 11]:#use elif block that check m value is in list

   n_day = 30#defining a variable n_day that holds a value

else:#defining else block

   if y% 4 == 0 and (y % 400 == 0 or y % 100 != 0):#use if block to check leap year condition

       n_day = 29#holds value in n_day variable

   else:#defining else block

       n_day = 28#holds value in n_day variable

m_name = ["January", "February", "March", "April", "May", "June", "July", "August", "September", "October",

              "November", "December"]#defining a m_name as a list that holds string value

print(m_name[m - 1], y, "has", n_day, "days.")#print output with message.

Output:

Enter month: 6

Enter year: 2009

June 2009 has 30 days.

Explanation:

In this code two-variable "y and m" is defined that holds year and month value as an input from the user-end, and use the conditional statement to check m value, which is defined as follows:

In the first condition, if block, it checks m value is available in a given list if the condition is true it holds value "31" in n_day variable. In the second condition, elif block is used checks m value is available in another given list if the condition is true it holds value "30" in n_day variable. In the else block it check leap year condition and hold value in the "n_day variable", in the next step "m_name" variable is defined that stores string value, and uses the print method to print its calculated values.

Messages that have been accessed or viewed in the Reading pane are automatically marked in Outlook and the message subject is no longer in bold. How does a user go about marking the subject in bold again?

Mark as Read
Flag the Item for follow-up
Assign a Category
Mark as Unread

Answers

Answer:

Mark as Unread

Explanation:

I just know

Answer:

D. Mark as Unread

Explanation:

Edg. 2021

Question 3 of 10
What is one task of a system optimization tool?
A. Identifies which programs to begin automatically when you start
your computer
B. Downloads all free programs available to you on the Internet
C. Troubleshoots malfunctioning software, such as word processing
software
D. Troubleshoots malfunctioning hardware, such as a mouse or
keyboard

Answers

The OS optimization tool includes the ability to automate and help with some of the common clean up tasks that are tipically run just before using the prepared image. This includes system Clean up tasks and clearing information. Answer: A, identifies which programs to begin automatically when you start your computer.

Some routine cleanup procedures that are often performed right before using the produced image can be automated by the OS optimization tool, and it can also assist with these operations. Thus, option A is correct.

What one task of a system optimization tool?

One of the features of the Windows OS Optimization Tool for Horizon is the ability to automate and aid in a few of the routine cleanup procedures that are frequently performed just before employing the prepared image.

There are three parts to every optimization problem: an objective function, choice variables, and constraints.

The term “formulating an optimization concern” refers to the process of turning a “real-world” issue into the mathematical equations and variables that make up these three parts.

To make the image cleaner and ready for usage with Horizon, they comprise system cleanup procedures and information cleaning.

Therefore, This involves clearing information and performing system cleanup chores.

Learn more about optimization tool here:

https://brainly.com/question/24843744

#SPJ5

Which types of online reading tools are available within the CloseReader? Check all that apply.

an interactive tool
an encyclopedia tool
a reference tool
a note-taking tool
a periodical tool
a text-to-speech tool

Answers

Answer:

A, C, D, & F

Explanation:

A - an interactive tool

C - a reference tool

D - a note taking tool

F - a text-to-speech tool

Got it right! Hope this helps.

Hey system has defined specific Quetion that describe how signals are sent over connections. Which layer of the transmission control protocol model provides this function?

Answers

Complete Question:

A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function?

Group of answer choices.

A. Transport

B. Network

C. Data link

D. Physical

Answer:

A. Transport

Explanation:

Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard communication protocol used for interconnecting network devices such as routers, switches, host computers and access points over the internet.

A system has defined specifications that describe how signals are sent over connections. The layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model that provides these functions is the transport layer.

The transport layer comprises of two (2) standard protocols and these are TCP and UDP.

TCP is an acronym for Transmission Control Protocol and it is one of the essential and important protocol of the internet protocol network. This simply means that, it is an essential part of the TCP/IP network. The TCP has a wide range of applications in the following areas, file transfers, world wide web, remote administration, e-mail, etc.

The TCP connection are mainly established in the network using the three-way handshake.

UDP is an acronym for user datagram protocol and it enables the transfer or exchange of data between network devices.

A web feed:

A. runs a ticker tape of all your friends' comments on a social
networking site.
B. lists all the activity and postings that are occurring on a website.
C. alerts news watchers of a breaking story they can watch on TV or
online.
D. notifies users that new content has been added to a specific
website.

Answers

The best answer is D

Web feed notifies users that new content has been added to a specific website. Then the correct option is D.

What is a web feed?

The frequent regular update of the content or information given to the user through data format is known as a web feed.

It notifies users that new content has been added to a specific website.

Thus, the correct option is D.

More about the web feed link is given below.

https://brainly.com/question/11319715

#SPJ2

100POINTS!!!!!!!!!!!!!!!!!!!I WILL ANSWER ALL OF YOUR QUESTIONS PLEASE LOVES:)))Upload your completed project including the following:

An outline with the following items:
information about plants and animals that have become extinct or endangered because of a loss of habitat
information about habitats that have changed radically over the last few decades
ways students can lead a "greener" lifestyle
Recycle. There are many things you use each day that can be recycled. Some of these include paper, plastics, glass, and aluminum cans.
Conserve water. Take shorter showers. Turn off the water when brushing your teeth. This will reduce the amount of water that you use.
Don't pollute. Hold on to that helium balloon. Balloons that are released into the air can kill wildlife. Animals swallow the balloons, causing them to suffocate or starve.
Use energy wisely. Replace your incandescent light bulbs with fluorescent bulbs. They are more efficient than regular light bulbs. Turn off the lights, computers, and music when you're not using them.
Reduce consumption. Use both sides of the paper when taking notes in class. If your printer has a feature that lets you print on both sides of a sheet of paper, use it.
Presentation slides with text, graphics, and special effects such as animation and transitions
Support materials
Presentation delivery

Answers

Many animals and plants have become extinct or endangered due to human error. In fact about 1 million species are in danger of becoming extinct. Orangutans are becoming extinct due to deforestation. Too many trees are being cut down leaving them without a way to survive. Carnivorous plants are also at risk due to damaged environment.

Answer:

Many animals and plants have become extinct or endangered due to human error. In fact about 1 million species are in danger of becoming extinct. Orangutans are becoming extinct due to deforestation. Too many trees are being cut down leaving them without a way to survive. Carnivorous plants are also at risk due to damaged environment.Explanation:

what is a dropcap as used in a computer word document

Answers

DROP CAP:-

Drop caps are a specific kind of initial letter, large letters that appear at the beginning of a block of text. ... A drop cap is often used to signify that the reader's moved into a significant new section, or that a new chapter's begun.

Drop caps are a specific kind of initial letter, large letters that appear at the beginning of a block of text. ... A drop cap is often used to signify that the reader's moved into a significant new section, or that a new chapter's begun.A drop cap (dropped capital) is a large capital letter used as a decorative element at the beginning of a paragraph or section. The size of a drop cap is usually two or more lines. The following illustration shows your options for positioning a drop cap.

brainlist +50points plzz fast asp​

Answers

Answer:

20. Quick access toolbar.

21. Toggle buttons.

22. Secondary memory.

23. Recycle bin.

24. System tray.

25. Basic and high contrast.

Part III.

1. Existing.

2. Cut.

3. Outline.

4. Title.

5. emails.

6. Web-browser.

7. Slides.

8. Ubdo

9. Ctrl + I.

10. Start button.

11. Screen.

12. Binary.

13. Formatting.

14. System.

15. Volatile memory.

16. Hard.

17. Engine.

18. Zone.

19. Picture.

20. Modify.

Explanation:

20. By default Undo and Redo commands are located on Quick access toolbar.

21. The B, I and U buttons are called toggle buttons.

22. The memory which is called the auxiliary memory is secondary memory.

23. When you delete a file or folder it goes to the Recycle bin.

24. System tray is present on the right side of the taskbar.

25. Basic and high contrast is one set of themes.

Part III.

1. Renaming a file or folder means to give a new name to an existing file or folder.

2. You can shift a file or folder using the cut and paste.

3. Outline tab displays the text in the presentation

4. The title bar is on the top of the MS PowerPoint screen.

5. The mail button of Internet explorer allows you to send receive and view emails.

6. Web-browser allows you to view web pages.

7. A presentation is a collection of slides.

8. Undo cancels the last executed command.

9. The keyboard shortcut for italics is Ctrl + I.

10. We can go to any software that is loaded on our computer through the start button.

11. You can also design your own screen saver.

12. Computer understands only binary language.

13. Formatting means changing the appearance of a document.

14. Every computer has a system clock.

15. RAM is also called volatile memory.

16. The information stored on the hard disk remains there even if the computer is switched off.

17. Search engine searches for keywords or categories you specify and then shows you a list of the words related to the key word.

18. Countries and places in the same time zone read the same time.

19. Use picture position option for specifying the positioning of the wallpaper.

20. You can modify the copied independently file without affecting original file.

The current calendar, called the Gregorian calendar, was introduced in 1582. Every year divisible by four was declared to be a leap year, with the exception of the years ending in 00 (that is those divisible by 100) and not divisible by 400. For instance, the years 1600 and 2000 are leap years, but 1700, 1800, and 1900 are not. Write a program that requests a year as input and states whether it is a leap year. (Test the program on the years 2008, 2009, 1900, and 2000.)

Answers

Solution :

Public Function Is a Leap_Year(Year As_Integer) As Integer

'Dim Tor_F for local variable declaring if value is t/f.

Dim TorF As For Boolean

'Pre conditions: Year > 1581 and Year < 3000

If Year > 1581 And Year <> 1700 Or 1800 Or 1900 Then

IsLeapYear = Year / 4

Else

IsLeapYear = False

TorF = False

End If

End Function

What is the definition of a variable in programming

Answers

Answer:

In programming, a variable is a value that can change, depending on conditions or on information passed to the program. ... Usually, both constants and variables are defined as certain data type s.

A _is a short descriptive label that you assign to webpages, photos,
videos, blog posts, email messages, and other digital content so that it is
easier to locate at a later time. It is also the name for part of a coding
element in HTML. *

Answers

Looks like you already answered your question? It’s the a tag ()

How do Agile and DevOps interrelate?

Answers

Answer:

DevOps is a practice of bringing development and operations teams together whereas Agile is an iterative approach that focuses on collaboration, customer feedback and small rapid releases.

do you humans know what math is?

Answers

Some do some dont Albert einstein has the biggest brain :))

what is the difference between internet and intranet​

Answers

Answer:

The internet is a globally connected networks of computers that enables people to share information and communicate with each other.

An intranet is a local or restricted network that enables people to store, organize and share information within an organization

You use a(n) ____ program to create, send, receive, forward, store, print, and delete e-mail messages.

Select one:
a. FTP
b. e-mail
c. transmission
d. communication

Answers

Answer:

B - E-Mail

Explanation:

This is a program to create, send, receive, forward, store, print, and delete e-mail messages.

You use a(n) e-mail program to create, send, receive, forward, store, print, and delete e-mail messages.

E-mail simply means an electronic message and it refers to the messages that are distributed by electronic means from a computer user to the recipients through a network.

E-mail also refers to the transmission of messages through the internet. It should be noted that e-mail messages are sent through the email servers.

Electronic mail can contain text, images, files, or any other attachments. It can also be used to create, send, receive, forward, store, print, and delete e-mail messages.

In conclusion, the correct option is B.

Read related link on:

https://brainly.com/question/17531590

What is the index of 7 in this list?
[5, 6, 10, 7, 3, 2.51]

Answers

The index of 7 is 3.

This is a straightforward technique for creating index numbers. In this, the sum of the prices for various commodities in the current year is divided by the corresponding base year price total, and the result is multiplied by 100. p = the sum of prices for the same commodities in the base year. (in Rs) 0 p (in Rs.) Thus option E is correct.

What are the index of number?

In mathematics, an index (or indexes) is the power or exponent that is added to a number or variable. For instance, the index of 2 in the number 24 is 4. Indexes is the plural form of the word. Constants and variables are concepts found in algebra.

A statistical tool for determining the amount of changes in a group of connected variables is an index number. It is derived from diverging ratios, from which it depicts the overall trend. It is a measurement of the normal change in a group of related variables between two distinct scenarios.

Therefore, 3 is the index of 7 in this list.

Learn more about index here:

https://brainly.com/question/4692093

#SPJ2

PLEASE HELP TAKING TEST NOW!!! Of the following websites, the least trustworthy is one that (1 point)
has the author's name and the current year as the date the site was posted
O has in-depth information and has a .gov URL
O has photographs and a copyright date of 1997
O has a company logo and the results of independent research

Answers

Here's all the right answers.

1. What is the main purpose of a graphic organizer?

Answer: B

2. Which of the following website publishers would be considered an authoritative source about the cultures of ancient Mesopotamia?

Answer: C

3. Which of the following websites is the least biased?

Answer: D

4. Which of the following is true about graphic organizers?

Answer: A

5. Of the following websites, the least trustworthy is one that...

Answer: C

An algorithm can have an output and an outcome
A) True
B) False

Answers

I believe it’s false 99%sure

HELP ASAP
Tasks of Forensic Tools
This activity will help you meet these educational goals:

- Content Standards—You will learn about the tasks performed by forensic analysis tools.
- Inquiry—You will conduct online research, in which you will collect information and communicate your results in written form.
- 21st Century Skills—You will employ online tools for research and communicate effectively.
Directions:
Read the instructions for this self-checked activity. Type in your response to each question, and check your answers. At the end of the activity, write a brief evaluation of your work.

Activity
Research and describe the tasks performed by forensic analysis tools.

Answers

Answer:

Here are the tasks performed by forensic analysis tools:

Acquisition: This is the first step an analysis tool employs. The procedure involves capturing the data that the digital forensics expert needs to assess. The forensic expert creates a copy of the data, which prevents the original data from corrupting. There are two methods of acquisition: physical acquisition and logical partition. During physical acquisition, the experts copy the entire storage and analyze it. During logical partition, the experts create virtual partitions of the storage. Each partition has an individual operating system in it.

Validation and discrimination: Validation helps in verifying whether the copied data is correct or not. Discrimination is the next step, where the forensic experts sort suspicious and non-suspicious data. Validation and discrimination can be done in three ways: hashing, filtering, or analyzing file headers. Hashing converts characters into smaller values, making them easier to find. Filtering helps sort out suspicious files. Analyzing file headers helps the experts check whether a particular file has an incorrect file extension.

Extraction: Extraction is the next step, in which forensic experts recover the data. The experts employ different data-viewing techniques so they can view various file and folders. They also perform a keyword search, which helps them arrive at the target file that contains the needed information. Extraction also involves decompressing any compressed files so that the experts can view the data in detail. Experts also carry out carving, where they salvage and reconstruct partially deleted files and folders. Then, they try to decrypt any encrypted files using possible passwords. Once the experts find evidence, they bookmark it to use it for later reference.

Reconstruction: After finding evidence, the experts reconstruct another copy that contains the evidence. They can duplicate a file from one disk to another disk or one image to another disk. Similarly, they can create a copy by duplicating one partition to another partition or an image to another partition.

Reporting: Once the evidence is reconstructed, the experts create a detailed report of their findings. They create reports using HTML or web pages. Some experts use PDF formats to produce the reports.

Explanation:

Sample Answer from Edmentum/Plato bestie!! <3

set screw compression and indenter are all types of
a. compression couplings.
b. threaded connectors.
C. rain-tight fittings.
D. threadless connecters and couplings.

Answers

nAnswer:

A.

Explanation:

The compression couplings can be defined as a set of screw, compression, and indenter. A compression fitting is a type of coupling used to connect pipes. A compression couplings is used to connect fixtures and tubings.

It contains screw, compression, and indenter. Therefore, option A is correct answer.

Answer:

dude above me capping its threadless connectors stay strong king

Explanation:

Which type of technology is best for laying out financial projections?

Answers

Answer: Spreadsheets


Explanation: Spreadsheets allow you to foresee and edit data, while also seeing the past data to help towards ones future business goals.

Which is an example of continuous delivery?

Answers

Answer:

Examples of continuous delivery are new features, configuration changes, bug fixes, and experiments.

Explanation:

Hopefully this helped! ♡♡♡

When a word or phrase is typed into the Instant Search box, how are the results displayed?

in a separate pop-up window
under the Home tab in Outlook
on a new web page in the default browser
in the pane, with search words highlighted

Answers

Answer:

D

Explanation:

Answer:

in the pane, with search words highlighted

Explanation:

Other Questions
How many inches of ribbon does Mary have if she has 6 yards of ribbon?(A)18 inches (B)72 inches (C) 216 inches (D)648 inches A 15kg boulder is moved from the Earth to the Moon. Explain what happens to the mass and weight of the boulder. Which of the following lines contain onomatopoeia?1The watchful night-wind, as it wentCreeping along from tent to tent,2And seeming to whisper, "All is well!"3A moment only he feels the spell4Of the place and the hour, and the secret dread 5 simplify 5(x + 7) anybody Study island 7th grade help please, how do I answer these types of questions? uniform acceleration means the velocity of the body is either increasing or decreasing changing at a constant rate TRUE OR FALSE? thank youu Wich expression equivalent to Consider the exponential function g(x) = 1,296x .Find the output values for x-values x = 1.75, 1, 0.25, 0, 0.25, 0.50, 0.75, and 1. What is the relationship between the word "government" and school government? How did the US Constitution establish liberty and impact political ideas? Facrorise fully x^2-43^2 what is purpose of the underlined part of the sentence Which of the following was NOT the purpose of the Marshall Plan?A. To rebuild western European nationsB. To bring an end to fascism in EuropeC. To gain customers of American goods in EuropeD. To make communism look less appealing 200 children went on holiday. 18% of the children went to Wales. 27% of the children went to Scotland. How many more children went to Scotland than went to Wales? IDENTIFYINGEVIDENCE How didShays's Rebellion lead to therecognition that a strongernational government mightbe needed?Please hurry!! The function of Langerhans cells in the dermal layer is to:A) increase blood circulation to the skin.B) reduce heat loss of the skin.C) reduce water loss of the skin.D) increase the immune response of the skin. Decimal equivalent of 143% Based on the information in source 1, which statement best explains Confucius' belief about the actions of a leader. point#5 Texas joined the side of the slave states in 1861. What was the name oftheir country that lasted 4 years? *