What space is space surrounding the area around the main subject.

Answers

Answer 1

Answer:

Positive space refers to the subject or areas of interest in an artwork, such as a person's face or figure in a portrait, the objects in a still life painting, or the trees in a landscape painting. Negative space is the background or the area that surrounds the subject of the work.

Explanation:

- The emptiness around and between the shapes or forms are called the negative spaces or ground. We often call it the background but it is more than that.


Related Questions

Rodney, a user in the research department, reports that he is experiencing blue screen errors while using his Windows computer. You ask Rodney if anything has changed on the computer recently. Rodney explains that he recently installed a TV tuner board in an expansion slot. Now he has to reboot the computer every time he loads the TV tuner application to watch TV. You need to fix Rodney's computer and prevent Rodney from using the TV until you can install an updated driver. What should you do?

Answers

Answer:

Remove the tuner board from the expansion slot. That way he can't use it to watch TV and you likely will eliminate the source of BSODs.

If you want to be sure that the tuner board is the cause of BSODs, check the stop code on the BSOD, or debug the minidump file that is auto generated by Windows whenever it crashes. Or, if you configure windows for a full memory dump, you can wait for another crash and then analyze the full dump instead.

Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use a footer element as a ______ of the contact information.

Answers

Answer:

Parent

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of a HTML document contains the contents or informations that a web page displays.

In this scenario, Roger wants to give semantic meaning (an element conveying informations about the type of content contained within an opening and closing tag) to a contact information placed at the bottom of a webpage. Thus, in order to do this, he should use a footer element as a parent of the contact information and as such all instance variables that have been used or declared in the footer class (superclass) would be present in its contact information (subclass object).

By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:

Answers

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

____ feet is used when the width of the material is not a factor. (6 letters)

Answers

Answer:

footin dhhdhdn bsbsbdb

What is the error in the following line: (1)

age=int(input("Enter your age:")

Answers

Answer:

14

Explanation:

What is a named bit of programming instructions?

Answers

Answer:

Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

[Plato] In A Soccer Game, You Want To Finish The First Half In Five Minutes. So, You Set The Match Duration To Ten Minutes. This Is An Example Of What Kind
Of Time Element?

A)Altered
B)Variable
C)Authentic
D)Player Adjusted

Answers

Answer: D. Player Adjusted

Explanation: The reason why the answer is player adjusted is because a player in the game is changing the time to 10 minutes.

Have a nice day!

(a) How many copies of the book titled "The Lost Tribe" are owned by the library branch whose name is "Sharpstown"? (b) How many copies of the book titled "The Lost Tribe" are owned by each library branch? (c) Retrieve the names of all borrowers who do not have any books checked out. (d) For each book that is loaned out from the Sharpstown branch and whose DueDate is prior to "September 1, 2018", retrieve the book title, the borrower’s name, and the borrower’s address. (e) For each book authored (or coauthored) by Stephen King, retrieve the title and the number of copies owned by the library branch whose name is "Central". (f) Retrieve all book titles that are available in "Sharpstown" branch but not in "Morristown" branch. (g) Retrieve book titles that are available in all library branches in the database.

Answers

Answer:

a) SELECT No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe' AND branchname = 'Sharpstown';

b) SELECT branchname, No_of_copies

FROM ((book JOIN book_copies) JOIN library_branch)

WHERE title = 'The Lost Tribe'

GROUP BY branchname;

c) SELECT Name

FROM borrowers B

WHERE cardno NOT IN ( SELECT cardno FROM book_loan)

d) SELECT title, name, B.address

FROM (((book JOIN book_loan) JOIN library_branch) JOIN borrowers B)

WHERE duedate = '09/01/2018' AND branchname = 'Sharpstown';

e) SELECT title, No_of_copies

FROM (((book JOIN book_authors) JOIN book_copies) JOIN library_branch)

WHERE authorname = 'Stephen King' AND branchname = 'Central';

g) SELECT DISTINCT title

FROM ((book JOIN book_copies) JOIN library_branch)

Explanation:

The SQL statements query's a book store database of seven relations using joins and subqueries to return results.

Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to

Answers

Answer:

She is referring to composite primary key

Explanation:

Composite primary key comprises of several columns with each having column having its own individual uniqueness.  

In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.  

…….. and ……...are called binary digits. (Computer Science)

Answers

Answer:

Explanation:

0 and 1 are called binary digits.

here is your answer..

The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register

Answers

Answer:

b. Memory-Management Unit

Explanation:

The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.

How will future space flights be different for NASA?

Answers

Answer:

Explanation:

NASA's future will continue to be a story of human exploration, technology, and science. NASA will continue to be a global leader in scientific discovery, fostering opportunities to turn new knowledge into things that improve life here on Earth. ... Artist's concept, NASA's gateway in lunar orbit.

Answer:

NASA's future will continue to be a story of human exploration, technology, and ... changes on the global land surface at a scale where we can separate human ... Exploring deep space and three-year missions to Mars pose new challenges: ...

Explanation:

NASA's Artemis program aims to land another man and the first woman on the moon by 2024 and eventually establish sustainable space travel by 2028. The Artemis program is NASA's stepping stone to their ultimate goal of landing on Mars.

pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE

Answers

Answer:

?

Explanation:

Lots of data can be transferred in short time, when we have,
a.High latency
b.Higher bandwidth
c.Lagging
d. Lower bandwidth

Answers

Answer: B. Higher Bandwidth

Thank you lord lord please thank you

write a program to calculate the area of rectangle​

Answers

Answer:

program by LET statement

Explanation:

CLS

REM to find the area of rectangle

LET L=40

LET B=20

LET AOR=L*B

PRINT "AOR=";AOR

END

                                                                                         Press F5

output

AOR=800

When attaching a file or files in outlook 365 you select the attach command and then select the files location

Answers

Answer:

When you click the attachment button a window pops up allowing you to select the file/s you want to upload

You can also drag and drop file/s this is an alternative method

Explanation:

Microsoft Outlook is a personal information manager software system from Microsoft.

Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia

You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them. Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location

Answers

Answer: Windows Configuration Designer (WCD)

Explanation:

The other software that will be needed to build the package which is vital in bulk enroll the devices through USB or network location is Windows Configuration Designer (WCD).

Windows Configuration Designer typically allows the configuration of several aspects of Windows devices such as Active Directory, Connect to WiFi, Device name, and install applications.

What is the definition of WLAN​

Answers

Explanation:

A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.

WLAN stands for wireless local area network. It is a wireless connection that connects two or more devices in LAN. WLAN uses access points and routers to make a connection between devices. Wi-Fi is an example of WLAN where devices are connected wirelessly within a limited range.

stay safe healthy and happy.

Select the correct answer.
Dina created a database related to essential oils and their uses. For every oil, she wants to enter a unique code number. Which data type would be suitable for entering this data?

A.
Boolean
B.
autonumber
C.
BLOb
D.
memo
E.
null

Answers

Answer:

Autonumber

This is because Autonumber is the only option out of the four that accepts random unique code numbers

Feel free to mark as brainliest :D

What is one similarity between compiled and interpreted programming languages? (5 points)

Both compiled and interpreted languages are translated one line of code at a time before moving to the next line.

Both compiled and interpreted languages can be shared with others while keeping the source code private.

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

There are no similarities between compiled and interpreted programming languages.

Answers

Answer:

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

Explanation:

The one similarity between compiled and interpreted languages is that they are both high-level languages.

A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.  

A high-level language can either be interpreted or compiled.

An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.

So, the similarity between both languages is that they are high level languages and translate code for a computer to understand.

Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest

Answers

Answer:

Motion sensor.

Explanation:

I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor

Match the elements used in web searches to their functions.

1. row
2. column
3. cell
4. worksheet

where data and formulas can be entered
a grid of rows and columns
a horizontal set of cells
a vertical set of cells

Answers

Row - horizontal
Column - vertical
Cell - where data and formulas can be entered
Worksheet - a grid of rows and columns

Answer:

where data and formulas can be entered - Cells

A grid of rows and columns - Worksheet

A horizontal set of cells - Row

A vertical set of cells - Column

Explanation:

I got it right on the Edmentum test.

What do you use the Pygame library for?

Answers

Answer:

Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language.

Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression

Answers

feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends

PLEASE HELP !!!! 40 POINTS BUT HELP

Write a python program to build a simple BMI calculator, where your program asks the user to input the height and the weight of the user then displays the BMI and statement stating the overall health of each user . All the data should be in variables , and no functions should be used.
The program should contain the following:
Welcome message- Display your full name, project name and give a small description on your project (definition of the BMI) [2 marks]
Variables :
height variable , input by the user [2 marks]
Weight variable , input by the user [2 marks]
Use a proper data type change function , int() or float() [2 marks]
Calculate the BMI by using the input variables of the height and the weight . [4 marks]
Display the BMI with statement based on the result of the BMI , refer to the below table [6 marks]
Critical thinking :
After running the code, don't stop the program and ask the user for a new input for a new calculation .(use loop , Break )
EXAMPLE :
Do you want to make a new calculation ? if no end the program , if yes start the code again .[2 marks]

Answers

Answer:

So in a way it is about a python calculation

what is file management?can please help me​

Answers

is the process of administering a system that correctly handles digital data. also i think it improves the overall function of a business workflow. but this could be totally wrong.
File Management includes common operations performed on files or groups of files, include creating, opening, renaming, moving or copying, deleting and searching for files, as well as modifying file attributes, properties and file permissions

When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices

Answers

Answer: implicit

Explanation:

When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.

Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

Answers

Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”

Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.

a) Realiza un esquema en planta del mecanismo.

b) Calcula n2 n3, n4. y la relación de transmisión.

c) Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.

Answers

Answer:

a. engranaje 1 → engranaje 2 → engranaje 3 → engranaje 4

     z1 = 10            z2 = 20              z3 =10            z4 = 20

b. n2 = 600 rpm, n3 = 1200 rpm, n4 = 600 rpm

   la relacion de transmision = 2

Explanation:

where z1 = 10, z2 = 20, z3 = 10, z4 = 20

and n1 = 1200 rpm

n2 = n1 * z1/z2 = (1200 * 10)/ 20 = 600 rpm

n3 = n2 * z2/z3 = (600 * 20)/ 10 = 1200 rpm

n4 = n3 * z3/z4 = (1200 * 10)/ 20 = 600 rpm

la relacion de transmision = z2/z1 * z3/z2 * z4/z3

= 20/10 * 10/20 * 20/10 = 2 * 0.5 * 2 = 2


What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit

Answers

Answer:

it's D

Explanation: i had this question before and i got it right :)

Answer:

D. An initial deposit

Explanation: Hope this helps :)

Other Questions
In what ways have high-speed rail services transformed travel in East Asia? DirectionsWrite your own sentence in Spanish. Remember, these sentences will be recorded.Use one impersonal expression to state the topic.Use one regular or irregular verb in the future tense to express one effect of cleaning or protecting the environment. Include at least three animals that will benefit from this effect.Use one regular or irregular verb in the future tense to express a second effect of cleaning or protecting the environment.Use one regular or irregular verb in the future tense to express a third effect of cleaning or protecting the environment. a man 1.30 m tall is on a top of a building. he observed a car on the road at an angle of 60 degrees if the building is 30 m high,how far is the car from the building? hii! ill give brainliest pls help pleaseeeeee helppppppppp What is the value of In e? Based on your understanding of nucleic acids, what type of bonds form between the CRISPR/guide RNA molecule and the target DNA Would you consider Unions successful? Why or why not? What does the speaker of the poem believe about conflict? A Conflict is more painful from a friend. B Conflict cannot be resolved with violence. Conflict is best ended by striking back. D Conflict is sometimes necessary for change. Which phrase from the excerpt is an example of verbal irony? Taking her to the Flower show will be a great birthday surprise. the gerund is... *A. will beB. to the Flower ShowC. TakingD. be A diver is currently at an elevation of -380 feet. Write an absolute value statement to express the diver's distance, in feet, from sea level. Then, interpret the result in this situation by explaining what this means for the diver. A star produces energy by:A: creating helium from hydrogen in its core.B: reflecting energy from nearby stars.C: absorbing and releasing the matter of other stars.D: rotating quickly on its axis. Dilate the figure by the scale factor. Then enterthe new coordinates.A(-2,4)K=3B(4,-1)A'([?],[])B'([10C'( 10 )C(-1,-2) Plz help me with these 2 questions Please write a story about a moment or situation this school year when you learn something new about yourself Find the probability that a randomlyselected point within the circle fallsin the red shaded area (Square).r = 4 cm42 cm[?]%Round to the nearest tenth of a percent.Enter IF YOU GIVE A LINK OR DON"T ACTUALLY ANSWER THIS QUESTION RIGHT JUST FOR POINTS I WILL REPORT YOUR ANSWER AND YOU (please help me i have an essay to write and its due date is in two hours from now )Are the needs of people ever more important than the needs of animals and the planet? COMPMention six characteristics of modern computers.i.ii.iv. sushmila is buying Mehdi supplies