Which of these is an advantage of having multiple layers in a drawing and enables you to make changes to one part of an image without accidentally changing other parts it keeps the file size small and manageable it makes it easier to open the data file in different drawing applications it makes the print out a higher quality

Answers

Answer 1

Answer:

enables you to make changes to one part of an image without accidentally changing other parts

Explanation:

Computer aided designs incorporate the use of multiple layers in drawings. The first layer is known as the layer 0, while the present layer the designer is working on is known as the current layer. The advantage of the incorporation of layers in designs include the following

1. It helps objects to be altered, grouped, hidden and moved as the designer wishes.

2. Layers can be grouped and worked on separated and common properties like color and line weight assigned to them.

3. Layers can be manipulated as the user wishes. They can be locked, frozen, turned off, etc.  Locking prevents accidental changes being made on objects.


Related Questions

helppp plzzz thanksss enjoy ur day ​

Answers

Answer:

D

Explanation:

I believe...

Answer:

the answer is b

Explanation:

you should check for spelling errors and correct punctuation before you mail the letter and/or submit the document. now I am starting to sound like my language teacher

hope I helped :)

Write a program that takes a String containing a text using the method signature

String useProperGrammar(String text)
Your method should replace the word ‘2’ with ‘to’ and return the updated text.

For example,

useProperGrammar("can you go 2 the store?")
should return

"can you go to the store?"
This method should also print out the number of grammatical errors that were fixed.

For example, for useProperGrammar("back 2 back 2 back"), the method would also print:

Fixed 2 grammatical errors:
In the main method, ask the user to input a String, and print the results of useProperGrammar using the user input.

Answers

import java.util.*;

public class MyClass {

   public static String useProperGrammar(String message){

       String newMessage = "";

       int count = 0;

       for (int i = 0; i < message.length(); i++){

           if(message.charAt(i) == '2'){

               newMessage = newMessage + "to";

               count ++;

           

           }

           else{

               newMessage = newMessage + message.charAt(i);

           }

       

       }

       System.out.println("Fixed "+count+" grammatical error(s):");

       return newMessage;

   }

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     System.out.println("Enter a string: ");

     String text = scan.nextLine();

     System.out.println(useProperGrammar(text));

   }

}

I hope this helps.

Write and test a program that accepts the user’s name (as text) and age (as a number) as input.

The program should output a sentence containing the user’s name and age.

Answers

name = input("Enter your name: ")

age = int(input("Enter your age: "))

print("Your name is",name,"and you are",age,"year(s) old.")

I wrote my code in python 3.8. I hope this helps.

Program description:

Defining header file.Defining the main method.In the next step,  the character array as "name" and an integer variable "age" is declared that uses the input method to the input value.After input value, a print method is declared that prints value with the message.

Program:

#include <stdio.h>//header file

int main()//defining main method

{

   char name[50];//defining character array as name

   int age;//defining integer variable

   printf("Enter name: ");//print message

   scanf("%s",name);//input name

   printf("Enter age: ");//print message

   scanf("%d",&age);//input age

   printf("Hi.. \%s",name); //print value with message

   printf(" your age is %d.",age);//print value with message

   return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/13160158

_______________ are distinguished from microcontrollers by their complexity and increased on-chip resources.A. Systems on a chip B. Systems on a driveC. Chip on a chip D. Device on a chip

Answers

Answer:

the correct option is (A)

Explanation:

According to the given scenario, the system on a chip is a chip that is different from the microcontrollers in terms of complexity and rise on the chip resources

The system on a chip is a circuit i.e. integrated most the computer things

hence, the correct option is (A).

Therefore the rest of the options are wrong

Answer:

a

Explanation:

Define persuasion. What would you like to persuade your parents to do or think? Explain which of the three goals of persuasive speech you would need to accomplish to achieve this.

Answers

Answer:

Persuasive communication is a form of interpersonal communication that aims to influence the communication partner. The primary goal of persuasive communication is to achieve changes in attitudes, but not understanding or exchanging information. Thus, basically, persuasion seeks to convince the receiver of the message of the idea emitted by the sender of the same.

In my particular case, I would like to persuade my parents to let me drive my father's car, which because it is a new car and of a quality model is restricted to me. To do this, I should use the argumentative and probative method, showing his false mistrust of me and proving that I can drive the car without problems.

Answer:

Answers will vary. Persuasion: – The act of convincing or influencing someone to act or think in a particular way. Answers will vary regarding what students would like to persuade their parent to do or think. An action or some change to beliefs, attitudes, values should be discussed. One of the three goals should be listed.

Explanation:

edge21

For a parking application that lets you pay for parking via your phone, which of these is an example of a functional requirement that would be listed for parking officers?

a
add and store payment information

b
displaying hourly costs

c
transact remote payment for parking

d
register a fine

Answers

Answer:

b. displaying hourly costs

Explanation:

Displaying hourly costs would be very useful for parking staff because it would allow customers to understand how the charge for the service was made, without the need for an employee to have to explain it. In this way, work becomes less stressful and more optimized.

Write a program that reads an integer and determines and prints whether it is odd or even.

Answers

num = int(input("Enter a number: "))

print(str(num)+" is even" if num % 2 == 0 else str(num)+" is odd")

I wrote my code in python 3.8. Best of luck.

Finish the code to search for a 7 in the array.
from array import *
myArr = array('f',[3, 5, 7.3, 10])
location = myArr.
(7)

Answers

Answer:

The complete code is as follows:

from array import *

myArr = array('f',[3, 5, 7,3, 10])

location = myArr.index(7)

print(str("7")+" is at position "+str(location+1))

Explanation:

I made corrections to the third line of the code and I added a line

This line gets the index of 7 from the array myArr using the index keyword

location = myArr.index(7)

This line prints the position of the 7 in the array

print(str("7")+" is at position "+str(location+1))

What is computer virus?​

Answers

Answer:

A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Explanation:

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

Simply, a computer virus is a harmful multiplying code that harms your computer and makes it slower, harder to use, and more vulnerable to other harmful unsafe software, apps, downloads and more.

How to get it?

You can get computer viruses just from going to unsafe websites downloading harmful files downloading harmful images downloading harmful videos clicking unsafe advertisements

and thats just a couple of examples, there's many many more but you get the idea.

Something that really sucks about computer viruses is that its hard to tell if something online is dangerous or not.

That's why people make specific softwares to protect your computer but even those can be unsafe or people could be trying to trick you.

Sometimes the computer will already have some sort of app or software to protect it from these harmful files, but make sure to pay attention when your on websites and check the urls and make sure it doesn't say anything along the lines of "unsafe" if it says that just simply exit the website and dont do anything further.

If your experiencing slowness, files you don't remember saving on your computer or extra files and apps that dont seem to belong, im sure there are places you can call online or in your local area to help with these issues.

Hope this helped!!

The add_prices function returns the total price of all of the groceries in the dictionary. Fill in the blanks to complete this function (python):def add_prices(basket): # Initialize the variable that will be used for thecalculation total = 0 # Iterate through the dictionary items for ___: # Add each price to the totalcalculation # Hint: how do you access thevalues of # dictionary items? total += ___ # Limit the return value to 2 decimal places return round(total, 2)groceries = {"bananas": 1.56, "apples": 2.50, "oranges": 0.99,"bread": 4.59, "coffee": 6.99, "milk": 3.39, "eggs": 2.98, "cheese":5.44}print(add_prices(groceries)) # Should print 28.44

Answers

Answer:

def add_prices(basket):

 

   total = 0

   for items in basket.values():

       total += items

   return round(total, 2)

groceries = {"bananas": 1.56, "apples": 2.50, "oranges": 0.99,"bread": 4.59, "coffee": 6.99, "milk": 3.39, "eggs": 2.98, "cheese":5.44}

print(add_prices(groceries)) # Should print 28.44

Explanation:

The python dictionary is a data structure that stores items of data as a key-value pair. The keys and values can be listed separately using the keys() and values() built-in function.

The program above uses a for loop statement to iterate over the values of the groceries dictionary to return the total sum of the values.

#include <iostream>
using namespace std;

// function prototypes
float get_Price();
int get_Type();
void tax(float, int);

// start main function
int main() {
float price = 0; // should > 0

int type = 0; // 1 -> Electronic
// 2 -> Sports & Outdoor
// 3 -> Vaccine

price = get_Price;
type = get_type();

cout << "Price before tax = " << price << "\n\n";
tax(price, type);
cout << "Total price after tax = " << price << '\n';

return 0;
}

// start new user-defined functions
void get_Price() {
float p = 0;

while (p < 0) {
cout << "Item price (RM): ";
cin >> p;
}

return p;
}

float get_Type() {
int t == 0;

do {
cout << "\n";
cout << "1 -> Electronic\n";
cout << "2 -> Sports & Outdoor\n";
cout << "3 -> Vaccine\n";
cout << "Item type (1,2,3): ";
cin >> t;
} while (t > 1 || t < 3);

cout << "\n";
return t;
}

// tax is based on item types as follows:
// 1 -> Electronic => 5%
// 2 -> Sports & Outdoor => 3%
// 3 -> Vaccine => 1%
void tax(float p, int t) {
float tax = 0;
switch (t) {
case 1: tax = p * 5 / 100; break;
case 2: tax = p * 3 / 100;
case 3: tax = p * 1 / 100;
}

cout << "Tax cost = " << tax << "\n";
p += tax;
}

What problem?​

Answers

Answer:

10⁶666666666666666666666666

vgggjhhii9

Explanation:

uyyyyyyyy6666y6666666666

Once you start designing the processing logic for each function of your software, you might end up throwing out your logical data model design and completely redesigning it.

a
False

b
True

Answers

Answer:

B. True.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

An incremental model refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

Hence, an incremental method typically involves developing a system through repeated cycles and smaller portions at a time, enhancing and evolving the system over time.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

Hence, once you start designing the processing logic for each function of your software, you might end up throwing out your logical data model design and completely redesigning it because each function would use a specific processing logic respectively.

How do you distinguish between misrepresentation and embellishment of one’s professional accomplishments on a résumé? Provide an example of an embellishment that would not be considered misrepresentation.

Answers

How do you distinguish, well misrepresentation and embellishment of one professional accomplishments

Click this link to view O*NET’s Work Styles section for Petroleum Engineers. Note that common work styles are listed toward the top, and less common work styles are listed toward the bottom. According to O*NET, what are some common work styles Petroleum Engineers need? Select four options.

reaction time
cooperation
integrity
sales
analytical thinking
dependability

Answers

Answer:

2 (cooperation )

3 (integrity)

5 (analytical thinking)

6 (dependability)

Explanation:

Good luck! Hope this helps.

According to O*NET, some common work styles which Petroleum Engineers need are:

2 (cooperation )3 (integrity)5 (analytical thinking)6 (dependability)

What is Integrity?

This is a positive quality of a person where he is considered to be dependable and trustworthy.

With this in mind, we can see that among the requirements from O'NET for the common work styles which Petroleum Engineers need, some things such as integrity, dependability, etc were mentioned.

Read more about integrity here:
https://brainly.com/question/1188458

For a parking payment app, what option would MOST likely connect a user to a third party/external gateway?

a
"Sign In"

b
"Rates"

c
"Pay"

d
"Time remaining"

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Almost all app that is doing online business integrated third party payment gateway and login/services. But some apps, don't integrate the third party login/signin services such as go ogle or face book login/sign in services.

But in the context of this question, for a parking payment app, upon reservation of parking space, the pay option connects a user to a third party/external gateway. This gateway will accept payment from the user and upon confirmation of payment, the parking space will get reserved.

so the correct option to this question is:

Pay

While the other options are incorrect because:

The sign-in option does not connect the user to a third pay/gateway in case if the app has self-registration and sign-in functionality. Rate and Time remaining are features of the app that does not force the user to connect third-party gateway.

A company has a hybrid ASP.NET Web API application that is based on a software as a service (SaaS) offering.Users report general issues with the data. You advise the company to implement live monitoring and use ad hoc queries on stored JSON data. You also advise the company to set up smart alerting to detect anomalies in the data.You need to recommend a solution to set up smart alerting.What should you recommend?A. Azure Security Center and Azure Data Lake StoreB. Azure Data Lake Analytics and Azure Monitor LogsC. Azure Application Insights and Azure Monitor LogsD. Azure Site Recovery and Azure Monitor Logs

Answers

Answer: B. Azure Data Lake Analytics and Azure Monitor Logs

Explanation:

There is a feature on Azure Monitor called Application Insights. This feature offers clients the ability to implement live monitoring of applications as well as detect anomalies.

With its analytics tools, clients can diagnose the issues reported by users as well as follow and understand the activities of users.

A Flash Translation Layer translates user data to a format that can be written on the NVM. tracks which physical block contains the most number of consecutive invalid pages. tracks which physical block contains only valid pages. tracks which physical block contains only invalid pages.

Answers

Answer:

tracks which physical block contains only valid pages.

Explanation:

Flash translation layer or FTL is a system made up of software and hardware that manages solid-state drive or SSD operations. It implements data concurrency techniques like striping, interleaving, and pipelining to generate a high throughput. It also performs logical to physical addressing amongst other functionalities.

The FTL also tracks which physical block in the memory that contains only valid pages by performing a bad block management process, isolating and discarding the blocks with no valid pages

What sum will amounts to Rs 1227 in 9 months at 6%
e emple Interest 2.​

Answers

Answer:

given us,

principal (p)= Rs 1227

Time(t)= 9

Rate(r)= 6./.

Here,

simple interest= P×T×R/100

= 1227×9×6/100

= 66258/100

= 662.58

Explanation:

by using simple interest formula

The principal investment required to get a total amount, principal plus interest, of Rs 227.00 from simple interest at a rate of 6% per year for 0.75 years (9 months) is $1,174.16

Given Data

Final Amount A = Rs 1227

Time = 9 months

Rate = 6%

Principal = ?

Equation:

P = A / (1 + rt)

Calculation:

First, converting R percent to r a decimal

r = R/100 = 6%/100 = 0.06 per year.

Putting time into years for simplicity,

9 months / 12 months/year = 0.75 years

Solving our equation:

P = 1227 / ( 1 + (0.06 × 0.75)) = 1174.1626794258

P = $1,174.16

Learn more about simple interest here:

https://brainly.com/question/2294792

REST Basics REST is a protocol and a set of operations that many web services conform to in order to exchange information and interact with each other. Which of the following are true?
a) REST is strictly a client-server interaction type meaning that the client performs requests and the server sends responses to these requests.
b) REST is a server-server interaction meaning that both sides can make requests and send responses to requests.
c) In REST protocol, properly designed access endpoints should not specify actions as a part of the resource URI. Instead, actions should be specified by the appropriate HTTP methods like GET, POST, PUT and DELETE.
d) REST responses are not capable of specifying any caching related information regarding the accessed resource. Caching must be resolved with other mechanisms.

Answers

Answer:

The answer is "Option A and Option C".

Explanation:

In choice a, it is true since a client-server design can be used for REST-application. A user is somebody who needs space and it doesn't deal with storing data on a central computer. A client is someone with the money, and the interface does not. Its server doesn't want to worry regarding core functionality on the ends of the server. The server does not have to know anything at all about the layer of UI used at the end of the server.

In choice c, it is true As just a Web app, services like corporate/employee resources must be organized, and HTTP verbs like the GET, Place, POST, DELETE must be used to modify these. It must be obvious, as a programmer, that what is required is clearly to look only at the interface or HTTP method used.

The options that are true about REST include:

A. REST is strictly a client-server interaction type meaning that the client performs requests and the server sends responses to these requests.C. In REST protocol, properly designed access endpoints should not specify actions as a part of the resource URI. Instead, actions should be specified by the appropriate HTTP methods like GET, POST, PUT and DELETE.

It should be noted that REST applications should possess a client-server architecture. Also, it's important for web applications to be organized into resources band then use HTTP verbs such as GET, POST, DELETE, etc.

Learn more about REST on:

https://brainly.com/question/24160573

Three PCs are on an Ethernet LAN, connected by a hub. Describe how the Ethernet protocol deals with collisions in this situation. How would the situation change if the hub were replaced by a switch?

Answers

Answer:

All the ports in a hub are in the same collision domain and a hub sends frames from one host to all other hosts in the network. This makes it prone to collision and poor network throughput. Just like a network switch, it uses the CSMA/CD protocol to detect collision in its network.

A network switch reduces its collision domain to just a port and sends frames from one host to another using its mac table as a route. This makes the network very efficient with high throughput. It also uses the CSMA/CD protocol to detect collision

Explanation:

Switches and hubs are used in networking to connect computer devices in a network. A hub is an obsolete device networking that broadcast a frame to all other ports or host in the network except for the send host port. This increases the rate of collision as all the ports in a hub share the same collision domain. A switch is an efficient frame switching device in a network, which uses its MAC table to decide and find a destination host.

CSMA/CD is a collision detection protocol used in a network to detect and prevent a collision. With this protocol, a host is able to listen, wait, send and resend frames to prevent a collision.

helppp pleassseeeee thank youuuu​

Answers

Answer:

C

Explanation:

Because You don't need indented letters

the {blank} view is the working window of a presentation.
A. Outline
B. Handout
C. Notes
D. Slide

Answers

The view which serves as the working window of a presentation is: D. Slide.

The types of view.

On Microsoft PowerPoint, there are three (3) main types of views and these include the following:

Slide sorter viewSlide show viewSlide (Normal) view

What is slide view?

Slide view is also referred to as Normal view and it can be defined as the main working window of a presentation when using Microsoft PowerPoint.

Under the Slide view, the slides are displayed on a computer monitor in full screen. Thus, it is a view which serves as the working window of a presentation.

Read more on slides here: https://brainly.com/question/26187618

#SPJ2

d. slide

cuz i said so lol.

type the correct answer in the box. Spell all words correctly. Which element of the presentation software can you use to add callouts and banners? using ____, you can add callouts and banners to a slide

Answers

Answer:

The element of the presentation software that can be used to add callous and banners is SHAPES

Using the INSERT TAB, you can add callouts and banners to a slide.

Explanation:

If you want to add callouts and banners to a slide, the presentation software that can be used is PowerPoint.

The element that is used to add it is called shapes and can be found in the Insert Tab.

Answer:

using shapes , you can add callouts and banners to a slide

Explanation:

A data structure to store trees with an arbitrary number of children at each node is: public class TreeNode / Integer data, TreeNode firstChild; TreeNode nextSibling / Write a recursive Java method to return the leaf node with minimum value given the root of the tree. All elements are unique and if there are no leaf nodes you should return null. Your method signature should be: _______

Answers

Answer:

TreeNode minimum(TreeNode root) {

   if (root != null) {

       if (firstChild == null && nextSibling == null) {

           return root;

       } else {

           TreeNode begin = minimum(root.firstChild);

           TreeNode last = minimum(root.nextSibling);

           if (begin == false && (last == false || begin.data < last.data)) {

               return begin;

           } else {

               return last;

           }

   } else {

       return null;

   }

}

Explanation:

The Java program defines a recursive method called minimum that calls itself twice with the first and last leaf of the treenode as the respective arguments. and returns the minimum value of the treenode if the root argument is not undefined.

You’re having trouble connecting to the Internet so you call your Internet service provider for help. They need to know the permanent unique identifier of your networking device to help them troubleshoot. What are they asking for?

Answers

answer: from when it stopped working?

What TCP message will be generated for an incoming SYN request for which is there no matching LISTENING port

Answers

Answer:

"Connection Refused"

Explanation:

This is the error message that is returned when the server is not listening on the correct port, or the server is offline.

Cheers.

The TCP message that will be generated for an incoming SYN request for which is there no matching LISTENING port is; “Connection Refused”.

TCP stands for Transmission Control Protocol and in the given situation in the question, the first step of the client application is to send the first packet with “SYN” flag.

Now, when the above situation happens, the server will listen on the specified port and give a response of SYN-ACK packet so that it c an acknowledge the “SYN”packet requested by the client application which will generate a reply with ACK packet response that will make the established connection to end.

Finally, for an incoming SYN request for which is there no matching LISTENING port, the connection will be rejected with an “RST” flag that gives output an error message named “Connection Refused”.

Read more about TCP at; https://brainly.com/question/24967184

Which of the following statements shows the relationship between cellular and wireless technology?
Brainliest to the right answer

Both use radio signals to communicate across distances.

Both were built using telephone infrastructure.

The two can be used together
to help people better communicate.

The two can be used together to drive down cost of service.

Answers

Answer:

The two can be used to help people better communicate.

Explanation:

Wireless technology doesn't use only radio signals, it uses Bluetooth, infrared, satellite signals and others.

They are both expensive.

Not that every wireless technology was built using telephone, like radio waves

HELLLP
Abigail’s supervisor asks for an iteration variable to be added to the program. Which of these lines of code will do that?
count = count + 1
variable = random
variable = count
count + 1 = count

Answers

[] Hello ! []

Answer:

C. Variable = Count

Explanation:

If you want to add something to the variable you will put in:

count + 1 = count

To start off the variable put in

Variable = (name of your variable) Then, (name of your variable) = (stat of your variable)

-------------------------------------------------------------------

I hope this helpedBrainliest appreciated!

+If this answer is wrong of displeases you, please tell me in the comments I would like to know+

Thank you for your time!

before the 20th century how did most people experience computing​

Answers

Answer:

   

Explanation:

Apply Decision Tree Algorithm on the following data:

Answers

Answer:

Sorry can you explain what the question ask

Other Questions
PLEASE HELP ME! Im begging you please X 2 x 2 -4 < x -2 -4 < , x, -2 -4 x -2 What is the domain of the function? ........ manages the function of all the hardware and other software used in the computer. why is gamma radiation difficult to detect Which commission or agency is responsible for preserving important US historical documents like the Declaration of Independence?A.Federal Trade CommissionB.Nuclear Regulatory CommissionC.Environmental Protection AgencyD.National Archives and Records Administration Please help me outplease show solvings tell me what among us is in french,sorry if u can't understand french but, Joyeux Nol! lol Explain why, even with computer models and data, weather predictions can be incorrect. Use complete sentences. (95 points) Find the solution of 6(2x+1)=54. sin^2(a+b)-sin^2(a-b)=sin(2a)sin(2b) Which is one of the characteristics of bullying Plzzzzzzz help In Scene 7, Scrooge orders Cratchit to put more coal on the fire. This detail What's the answer? I need help asap Select the best explanation why 1 and 2 are either congruent or NOT congruent.Math item stem image please help me on this! will give you brainliest, ty:, _____ (That) sndwich es grande.EseEsaEsteEsta What are characteristics of the setting of a story WILL GIVE BRAINLLIEST9 is 10% of what number what would you do if you had set out fireworks and the fireworks aim at you would you run and hide of stand there like an idiot and get hit by fireworks just to impress people. or do you have other thing to say 3.41 rounded to the nearest tenth please help Steam Workshop Downloader