Pre-made, copyright-free illustrations are called __________. apps clip art graphic design stock photos

Answers

Answer 1

Answer: clip art

Explanation:

The clip arts are graphic images that are pre-made illustrations for the purpose of creating any medium (designs or art). It has no restrictions to use them, it can be used by anyone, hence its copyright-free.It comes in both electronic and printed form.But mostly they are designed and distributed and used by a person in an electronic form.

Hence, the complete statement is "Pre-made, copyright-free illustrations are called clip art".

Answer 2

Answer:

B) clip art

Explanation:

I got this question correct


Related Questions

Assume the existence of a BankAccount class with a method, getAvailable that returns the amount of available funds in the account (as an integer), and a subclass, OverdraftedAccount, with two integer instance variables:

Answers

Answer: This is hard but I will research ok

Explanation:

what should i do after learning python? how can I make apps or gaming apps? IF YOUR ANSWER WILL BE GOOD I WILL MARK AS BRAINLIEST

Answers

Answer:

Here are some of the things that you can do after learning Python:

Learn a Web Development Framework

Learn Machine Learning

Start Teaching Python to Beginners (and earn some bucks)

These are the top three ways to proceed

Explanation:

Learn a web development framework

Write a function, sublist, that takes in a list of numbers as the parameter. In the function, use a while loop to return a sublist of the input list. The sublist should contain the same values of the original list up until it reaches the number 5 (it should not contain the number 5).

Answers

Answer:

Following are the code to this question:

def sublist(l):#defining a method list sublist that accepts a list

   val=[]#defining an empty list

   x=0#defining x variable that store value 0

   while(x<len(l)):#defining loop that check x is lessthen list length  

       if(l[x]==5):#defining if block that checks list value equal to 5

           break#using break keyword  

       val.append(l[x])#add value in val list

       x+= 1#increment the value of x variable by 1

   return val#return val

l=[3,4,7,8,5,3,2]#defining list l

print(sublist(l))#using print method to call sublist method

Output:

[3, 4, 7, 8]

Explanation:

In the above python code, a method "sublist" is declared that accepts a list, inside the method an empty list "val" and an integer variable x is defined that stores "0"  value. In the method, a while loop is declared that checks list length and define if block to checklist element value equal to "5". which the condition is true it will return before values. In the last step, a list "l" is declared that holds value and used the print method to call sublist to prints its return value.

Case-Based Critical Thinking
Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers. 43. Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
a. ​src.
b. ​loop.
c. ​controls.
s. ​preload.

Answers

Answer:

B. Loop

Explanation:

The use of loop which is a boolean attribute in HTML is an instruction that specifies a replay of the video once it has ended. It is inputted in this format;

<video controls loop>

<source src="dance.mp4" type=video/mp4">

</video>

To add a video to the HTML web page, the <iframe> element is used. the source would also indicate the video URL. The specification of the dimensions, that is the height and width of the video are also written. The code is now closed with the </iframe> element.

1. Who is the head of the family of the Lhops?​

Answers

This question is incomplete, here´s the complete question.  

Read 'Untrodden World of Lhops', by John Michael Chiramal

Who is the head of the family of the Lhops?​

Answer: the maternal uncle

Explanation:

The Lhops or Doyas are one of the smaller communities of Bhutan, isolated from the conventional rules of the Bhutanese society, they have the maternal uncle as the head of the family.  

Not only he has complete authority over the family´s everyday life, but he´s also in charge of the children´s upbringing and providing them with an inheritance of his property.

One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______.​ a. ​ check list technique b. ​ domain analysis technique c. ​ noun technique d. ​ brainstorming technique

Answers

Answer:

Coding is a skill where you take instructions (the steps in a task) and translate it into a languaage.

Explanation:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not communicate like humans. They communicate in a language called BINARY and

Which of the following statements is true? A. Ethernet connections allow the most mobility for users. B. Maximum advertised connection speeds are for Wi-Fi connections only. C. Every computer user can expect the same Internet connection speed. D. The actual speed of a network can differ from the maximum advertised speeds. E. Wi-Fi is the best option for intensive Internet users who have high data

Answers

Answer:

A

Explanation:

Ethernet connections allow the most mobility for users

Employees often have more than one laptop-so one or both of them are always handheld. For this cause, companies turn to the versatility and scalability of wireless networks. It is convenient to grant workers connectivity through a wireless network, which they can use to connect several devices. Tablets, smartphones and laptops can all be connected to the network, which enables employees to access

Answer: D. The actual speed of a network can differ from the maximum advertised speeds



Explanation:

just got it correct on the test

Instead of using the automatic toString() method with your classes, it is usually more useful to write your own ____ version of the toString()method that displays some or all of the data field values for the object with which you use it.
a. overloaded
b. static
c. protected
d. condensed

Answers

Answer:

The answer is "Option a"

Explanation:

The overloading is the most essential aspect in the java programming This function can achieve different features with the same method term. To obtain the required information fields or entity type, the toString() function is overloaded, and the wrong choice can be defined as follows:

In option b, It is wrong because it is a keyword.In option c, It is wrong because it is an access modifier.In option d, It is wrong because it is a type of programming.

Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers.
​Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
A. ​src
B. ​loop
C. ​controls
D. ​preload

Answers

Answer:

I think it's preload :P

Explanation:

But just be sure with some sources ok ! :♡

A user receives an email containing a co-workers birth date and social security number. The email was not requested and it had not been encrypted when sent. What policy does the information in the email violate

Answers

Answer:

PII

Explanation:

The information in the email violates the PII. That is Personally identifiable information. PII, are nothing but any data that could potentially be used to identify a person. Examples of which can be  a full name, Social Security number, driver's license number, bank account number, passport number, and email address, etc.

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
a) true
b) false

Answers

The correct answer is True

Explanation:

Computer security is a branch of security that focuses on the security of computer systems. This includes preventing cyber attacks that could steal the information or damage the software (programming code), as well as, preventing physical attacks or damage, this includes stopping unauthorized personnel from accessing the computers or devices and limiting the damages that might occur in situations such as fires, floods, etc. Additionally, computer security is now an important factor in most companies and organizations as relevant information is saved in computers, also, many functions rely on the use of computer systems.

According to this, the statement about computer security is true because this comprises the protection of hardware, software, and information in cases such as natural disasters, intrusions, etc.

"PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a ______."

Answers

Answer:  cookie

Explanation:

A cookie is a small welcome file contains the information in the form og letters and numbers.It is downloaded on to a computer when a website is visited.

Hence, if a company uses a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site to generate a personalized welcome message to its visitors. This small file is called a cookie.

if a person walks 10 metres due to south in 10 seconds 10 due east in the next 10 seconds and transmitted you're not in the next 10 seconds then he has Dash velocity​

Answers

Answer:

[tex]\frac{1}{3}\ m/s[/tex]

Explanation:

The computation of the velocity by using the following formula is

As we know that

[tex]Velocity = \frac{Displacement}{Total\ time\ taken}[/tex]

where,

Displacement is 10 meters

Total time taken is 30 seconds

Now placing these values to the above formula

So, the velocity of Dash is

[tex]= \frac{10\ meters}{30\ seconds}[/tex]

[tex]= \frac{1}{3}\ m/s[/tex]

We simply applied the above formula so that we can get the velocity and the same is to be considered

Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security

Answers

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

write some Drawbacks of the internet

Answers

Explanation:

Computer Virus can spread.

Data can be hacked.

It has made peoples lazy

It cannot work about electricity and mobile and computer like devices

..

Thank me if you like.. and follow me..

The internet is like a double-edged sword. It can be used as a study tool, and is full of an endless amount of information. Additionally, programs such as email allow the communication of ideas to be faster than ever before. The internet has increased globalization by a large amount. However, the internet can also be a huge distraction. Social media and games can make the younger generations more self conscious and wanting more instant gratification. Nonetheless, the internet is something that has forever changed both society as a whole and the way each person sees the world.

can a 0.90 GB storage left android phone download an app of 28 MB plsssss fast I will give you brainliest why and why not?

Answers

Answer:

Yes

Explanation:

0.9 GB = 900 MB. That is a plenty of space for a 28 MB app.

MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that you can save and use on many different devices. What are some of the personal preferences you can save to your user profile for a browser? Select all that apply.

Answers

Answer:

The personal preferences that can be saved are

A. Customize your bookmark bar

C Change your home page

D Enable safe browsing in your privacy setting

Explanation:

The Bookmark manager can be used for personal customization of the bookmarks in chrome

The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks

The personally preferred homepage can be selected under appearance category in the settings menu

The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.

Other than hard discs and flash discs, identify other three different storage media

Answers

Answer:

A storage media is any media that can store data.

1. USB flash memory

2. Memory stick

3. Floppy disk

Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use in an oral presentation including the length of the presentation, the size and layout of the room, and the available equipment. What is the last aspect?

Answers

Answer:

The answer is "audience aptitude and experience "

Explanation:

The presentation is the ability to provide a variety of audiences with successful and stimulating interactions. The main objective of an oral presentation is to talk formally to a live audience about a particular subject. You have to write an oral speech that engages the audience and fulfills your goals.

In this type of presentation, the Listener-centric concept is effective as the productivity of a speaker is enhanced by creating and presenting the speech throughout the proper manner.

Tom walks into the accounting department and walks into a mess! User A can't access the Internet, User B has forgotten her password, User C's system is overheating to the point of smoking and the administrator is worried there might be a virus on all the systems. Whose system should he address first

Answers

Answer:

User C.

Explanation:

As per the given details, the problem of user C's system must be addressed first due to the seriousness of his case. His computer is excessively overheating up to the smoking point and if his problem is not addressed soon, it will damage the vital parts of the computer or may also explode. The other users having the problem of inability to access the internet or issue of forgotten password can be addressed later as these are minor problems that do not have as such consequences. Thus, user C is the correct answer.

The variable dp is to refer to an array of double. Assuming the integer variable n has been assigned a value, declare dp appropriately, allocate an array of n doubles and assign the resulting pointer to dp.

Answers

Answer:

double × dp = NULL ;

int n;

n = <some value> ;

dp = new double[n]

Explanation:

According to the given question, the relevant data provided is as follows

Variable dp = Array of double

Based on the above information,

The allocation of an array for doubling n and assigned it to dp is here below:

double × dp = NULL ;

int n;

n = <some value> ;

dp = new double[n]

Hence, the above is the answer

Justify the statement "The same job title can have different job roles and different qualification criteria in different organizations." Compare job titles and their respective roles and qualifications from at least two organizations in different industries, and write a short essay explaining your reasoning.

Answers

Answer:

Below is an executive summary of this particular issue.

Explanation:

Each organization has differential requirements and preferences. This same employment opportunities rely heavily on either the structure of the company and indeed the amount of equipment that it possesses. Hence, whenever they recruit an individual on a specific job, their work description can differ based on the organization's needs including growth.

Answer:

In the classified section of a local newspaper, I came across job openings for the post of a network engineer in two different companies. One was from the airline industry, while the other was from the food and beverage industry.

The airline company required an applicant to have a bachelor's degree in network administration. The job posting specified that applicants with supporting CCENT or CompTIA Security+ certifications would be preferred. The company was willing to consider candidates with no prior experience. The job responsibilities included: maintaining security, DNS, IP routing, firewalls, and troubleshooting IT-related problems. The role also required skills to manage multi-site network operations, operating systems, and other software applications in public as well as private facilities. Another responsibility was to complete the time logs in the company's records to facilitate timely and accurate billing.

For the role of a network engineer in the food and beverage industry, the required qualification was any bachelor's degree in computer science with a minimum of one year of relevant experience. Certifications were an added advantage, but they were not a necessity. The job role required skills to troubleshoot network glitches, monitor network usage, install software and hardware infrastructure, provide technical assistance to users, and suggest improvements in the system.

Explanation:

B. Imagine yourself to be a tube light. Write a short paragraph about your life. (50 to 80 words)
plese help me​

Answers

Do you know LED light- I mean the tubelight that people perch and switch it on. It is used in offices, homes, schools and anywhere there are tube lights but I am something different. I am that light that shines on children’s head.

Ok, it is not actually a light in children’s head. It’s when they think of an idea so they are switching me on and they spread that means they are allowing me to shine. My head means the base is the brain that tells me that this idea is there so I shout and spread it.

Like that I was also a light in a boys head his name was Rahul. Rahul was a boy that when his mind is on studies he can top in his class but he was not understanding that he was only focusing on his sports.

One day in the classroom didi said that there is a problem that in our school there is a problem that out toilets are stinking and we need help from you children. All the lights around me were flickering because all the children were thinking of ideas. I was the only one of them who was not flickering. Rahul switched me on and let me shine, he spread it. I also know that he is not going to shatter me into pieces. He is going to persevere and he did it.

From that day, it was my daily life..on off..on off..on off..

The ___________ button represents the start of a hyperlink in Table of contents.

Answers

Answer:

An LS button

Explanation:

It appears on the (structure line 3)on the structure line, place your cursor in the white field to the right of the E button (Recall that the E button represent the entry test).

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud

Answers

Answer:

D) A private cloud

Explanation:

Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.

Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.

Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.

Using a material on the internet for your assignment without acknowledging the source is known as A. Plagiarism B. Piracy C. Ethical D. Copyright

Answers

Answer:

A. Plagiarism

Explanation:

Plagiarism is simply the act of representing an author's thoughts , ideas , expression , writings as one's own.

What is a path and how do you know that it is filled and selected

Answers

Explanation:

A path represents a selected editing area of an image, this feature is typically available when using Adobe Photoshop software.

For example, a photographer may select the entire face area of his subject as his path (work path). To know when it is filled the photographer observes to see when the colour changes or other changes are applied to the background layer of the selected path.

Asia pacific and Japanese sales team from cloud kicks have requested separate report folders for each region.The VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder. What should a consultant recommended to meet this requirement.

Answers

Answer:

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

Explanation:

Below are the options

A) Create grouped folders, keeping the top region folder sharing settings and limiting the sharing settings for the grouped folders for each region.

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

C) Create all new regional folders and move the reports to the respective region folder with subscribe access.

D) Create subfolders, keeping the top region folder sharing settings and limiting the sharing settings for the subfolders for each region

In order to required reports at one place and also wants to retain the visibility for each folder the consultant should suggest that all new regional folders should be created and afterwards it would be moved to their relevant region folders by involving the viewer access feature so that the VP should access it anytime

Hence, the correct option is B.

Based on the information given, the correct option will be B. Create all new regional folders and move the reports to the respective region folder with viewer access.

From the information given, it was stated that the VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder.

Therefore, it's important to create all new regional folders and move the reports to the respective region folder with viewer access.

Learn more about folders on:

https://brainly.com/question/20262915

A binary search function is searching for a value that is stored in the middle element of an array. How many times will the function read an element in the array before finding the value?

Answers

Answer: 1 time.

Explanation:

A binary function is also known as a half-interval search is a search algorithm to find the position of a given element x within a well-sorted array []. Binary search compares the target value to the middle element of the array.It ignores half of the elements just after one comparison. it compares x with the middle element.

So, the function read an element one time in the array before finding the value.

A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verifies the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select two.)
A. IPCONFIG /REGISTERDNS
B. IPCONFIG /FLUSHDNS
C. IPCONFIG /RELEASE
D. IPCONFIG /RENEW
E. IPCONFIG /ALL

Answers

Answer:

a

Explanation:

none

Other Questions
The quotient of a number and -5 has a result of 2. What is the number?Type the correct answer in the box. Use numerals instead of words. why do we need a universal language Seawater is highly saline, which means it contains large amounts of dissolved salt. When seawater freezes and icebergs form, the water in the iceberg doesnt take the salt with it. What effect will this phenomenon have on the concentration of salt in the water around the iceberg? According to the text, what are the factors contributing to global warming? Check all of the boxes that apply. increased use of nuclear power human activity greenhouse gases A mutation causes a sequence of DNA that has the nucleotides TTG to be changed to TCG. The resulting protein has a different sequence of amino acids. Which type of mutation is this? Compare the following pairs of decimals. Use to indicate their relationship. a. 0.7 _______ 0.52 b. .52 _______ .045 c. 0.49 _______ 0.94 d. 0.302 _______ .23 e. 0.9 _______ 0.6 f. 2.36 _______ 3.19 Describe how the water cycle moves water between the tree, the lake, and the sky in the picture below. Describe at least three of the water cycle processes you have learned about in the course. (10 points) Wallace Motors measures and evaluates the quality of its cars and services against the market leaders in the automobile industry. Wherever there is a gap, Wallace Motors tries to cover that gap by imitating the best practices of these market leaders. This is known as ROI and Residual Income: Basic Computations Watkins Associated Industries is a highly diversified company with three divisions: Trucking, Seafood, and Construction. Assume that the company uses return on investment and residual income as two of the evaluation tools for division managers. The company has a minimum desired rate of return on investment of 10 percent with a 30 percent tax rate. Selected operating data for three divisions of the company follow. Trucking Division Seafood Division Construction Division Sales $ 1,200,000 $ 750,000 $ 900,000 Operating assets 600,000 250,000 350,000 Net operating income 116,000 66,000 63,000(a) Compute the return on investment for each division. (Round answers to three decimal places.)Trucking ROI = Seafood ROI = Construction ROI = (b) Compute the residual income for each division.Residual income Trucking Seafood ConstructionNet operating income Minimum level Residual income Which elements of character analysis does this passage from "The Open Window" inform? A. physical description B. thoughts and feelings C. reactions of others D. speech and actions plzz help brainliest thanks and 20 points Look at the cups shown below (images are not drawn to scale): A cone is shown with width 2 inches and height 3 inches, and a cylinder is shown with width 2 inches and height 7 inches. How many more cubic inches of juice will cup B hold than cup A when both are completely full? Round your answer to the nearest tenth. 18.8 cubic inches 21.9 cubic inches 25.1 cubic inches 32.6 cubic inches question : Which sentence requires the personal a? answers: A. Fabin tiene ___ hermano. B. Marisol obedece ____ reglas. C. Dile ___ encargado. D. Tengo ____ amigos. E. Samuel mira ____ Pedro. Zn + 2 HCl --> H2 + ZnCl2 If 1.70 g of Zn are reacted, how many grams of ZnCl2 can be created? Show work and process and I will give brainliest help me please and thank u and if u help me u get 7,0000Look at these details from a paragraph about the same topic: Scientists wear goggles to keep chemicals out of their eyes. Goggles protect swimmers' eyes from the water. Skiers wear goggles to keep snow and ice out of their eyes.Choose the main idea that ties all the details together.A. It's important to follow safety rules at work.B. Construction workers wear goggles for safety.C. Goggles are worn to protect peoples' eyes during different activities.D. People use goggles when swimming and skiing. The president of Glamour Solutions sends his top chemist to its competitor's labs to steal its formula for shiny lipstick. The chemist gets caught and is sent to jail. Can Glamour Solutions be found to be criminally liable? In 1972, the Watergate scandal began with a break-in at the Group of answer choices Washington Post newspaper building. office of Daniel Ellsberg's psychiatrist. headquarters of the George McGovern campaign. offices of the Democratic National Committee. House of Representatives. Gelb Company currently manufactures 49,000 units per year of a key component for its manufacturing process. Variable costs are $6.25 per unit, fixed costs related to making this component are $89,000 per year, and allocated fixed costs are $78,500 per year. The allocated fixed costs are unavoidable whether the company makes or buys this component. The company is considering buying this component from a supplier for $3.50 per unit. Calculate the total incremental cost of making 49,000 units and buying 49,000 units. Should it continue to manufacture the component, or should it buy this component from the outside supplier PLEASE HELP ASAP. Drag each tile to the correct box (She knows) que necesito.Ella sabeElla conoceElla sabenElla conoces The first step in the seven-step decision-making model is__