Select the correct answer.

Which graphic design software is free?

A. Pixlr
B. Apple Aperture
C. Adobe Photoshop
D. Adobe Illustrator

Answers

Answer 1

Answer:

A. Pixlr

Explanation:

Pixlr is one of the many free options for a graphic design software.  Pixlr is mostly an online editor (used within a browser).  It is also available as an app for both iOS and Android platforms.

Apple Aperture was a commercial product selling for US$300, but has been discontinued in 2013.

Both Adobe products are also pretty expensive.  You can no longer buy them individually, you need to purchase a monthly/yearly subscription.

Answer 2

A.Pixlr

Because it has a lot creative artistic photoshop


Related Questions

Use this illustration to answer the question.


What will happen when switches S1 and S3 are both closed?

A. The resistance of the circuit will increase.

B. The light bulb will light up.

C. No current will flow and the light bulb won't light up.

D. Current flow in the circuit will decrease.

Answers

Answer:

B

Explanation:

Current will flow through the diode in this direction.

That happen when switches S1 and S3 are both closed is that C. No current will flow and the light bulb won't light up.

What is the resistance?

Resistance is a degree of the competition to present day go with the drift in an electrical circuit. Resistance is measured in ohms, symbolized with the aid of using the Greek letter omega (Ω). Ohms are named after Georg Simon Ohm (1784-1854), a German physicist who studied the connection among voltage, present day and resistance.

Current will flow from the diodes in alll the directions so  No current will flow and the light bulb won't light up.

Read more about the diodes  :

https://brainly.com/question/2254038

#SPJ2

Which printout will result from the snippet of code?

supplies = ["pencil", "notebook", "backpack", "pen", "calculator"]
print("These are the supplies in the list:\n", supplies)
[‘pencil’, ‘notebook’, ‘backpack’, ‘pen’, ‘calculator’]
These are the supplies in the list:
[‘pencil’, ‘notebook’, ‘backpack’, ‘pen’, ‘calculator’]
These are the supplies in the list: [‘pencil’, ‘notebook’, ‘backpack’, ‘pen’, ‘calculator’]
These are the supplies in the list:\n
[‘pencil’, ‘notebook’, ‘backpack’, ‘pen’, ‘calculator’]

Answers

Answer:

These are the supplies in the list:  

[‘pencil’, ‘notebook’, ‘backpack’, ‘pen’, ‘calculator’]

Explanation:

The line return (\n) character will be in the output (so there will be a change of line), but it will NOT be visible as it would have been interpreted as a special character.

So the output will be on 2 different lines, with no \n visible.

If the command would have been: print('These are the supplies in the list:\n', supplies), with single quotes (') instead of double quotes (") then then \n would have been printed but not interpreted as a special character.  At least in most computer language.  Since we don't know of which language the question refers to, we can't be sure at 100%.

Answer:

[‘pencil’, ‘notebook’, ‘backpack’, ‘pen’, ‘calculator’]

Explanation:

Which of the following is NOT a type of cable used in wired networks?a) Unshielded coaxialb) Coaxialc) Unshielded twisted-paird) Fibre-optic

Answers

Answer:

I think it is unshielded coaxial. Not 100% sure.

Explanation:

Unshielded coaxial is not a type of cable used in wired networks. The correct option is c.

What is wired network?

Network which basically is "wired": As we all know, a physical media that is "wired" is one that is comprised up of cables.

Options include copper wire, twisted pair, a s well as fiber optic cables. A wired network uses wires to connect devices, including laptops and desktop Computers, to the usual Internet or another network.

Four Different Networking Cable Types

Cable Coaxial Seldom is this system employed.Cable with shielded twisted pairs (STP). It is mostly utilized in commercial projects.Optical fiber cable. A central glass core is surrounded by many layers of protecting materials.Twisted pair cable that is not insulated.

Thus, the correct option is c.

For more details regarding wired network, visit:

https://brainly.com/question/28249651

#SPJ6

What is a slide master ?

A) the placeholder used to insert objects

B) The sequence of the slides in a presentation

C) The difficult design template in a presentation program

D) The formatting tall with a list of common commands

Answers

The answer is. C . It controls fonts layouts etc

Answer:

the answer is c

Explanation:

When you merge business letters, how many total documents will you have when you are finished with the merge process?

A. one – the merged document
B. two – the data source and the merged document
C. three – the starting document, the data source, and the merged document
D. unable to determine – you will have one letter for each recipient on the list

Answers

When a person merges business letters, then it is unable to determine the total documents that will a person have when he finished with the merge process.

What are the business letters?

The business letters are the formal letters that are used in the business organizations. A business letter is used to make the communication between two businesses and their consumers, clients, or other external parties.

The general tone of the letter is determined by the nature of the relationship between the persons involved. When a person merges business letters, it is impossible to know the number of total documents that he will have once the merging procedure is completed.

Therefore, option D is correct.

Learn more about the formal letters, refer to:

https://brainly.com/question/1480667

#SPJ2

True or false A thesaurus is a brunch of commands grouped together as a single command used to automate task

Answers

False a thesaurus are a list of synonyms or antonyms

What new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its important to start doing this right away.

Answers

Taking brakes every hour so your eyes don't start to strain.

When an attacker attempts to get credit card numbers using telephone and voice technologies, it's called
a. Vishing
b. Telephishing
c. Phreaking
d. Voicing

Answers

Answer:

A. Vishing

Explanation:

The term 'Vishing' is a combination of  'Voice' and 'Phishing'.

Phishing is to get personal or confidential information (like credit card numbers) by pretending to be a trusted and enticing unsuspected individuals to provide their information, believing they're dealing with a reputable institution.

The question states the hacker is using telephone and voice technologies... so it's a voice version of the phishing.

**81 points***

ok so does anyone have answers for connections acedemy grapghic design, if not well then um heres the test. if ya got the answers plz help

Answers

1 A

2 D

3 B

4 C

5 A

6 C

7 B

8 D

9 A

10 C

11 B

12 D

13 A

14 A

15 D

16 B

17 D

18 C

19 D

20 A

22 B

I HOPE THIS HELPS :)

A _____ is a web site that allows users to edit and change its content easily and rapidly.

Answers

The web site you are looking for is Wiki, web application that allows users to easily add and edit content on a web page.

Final answer:

A wiki is a website that enables easy and rapid content editing and collaboration among users, as part of the Web 2.0 era's focus on interactivity and user-generated content.

Explanation:

A wiki is a website that allows users to edit and change its content easily and rapidly. Registered users on such a site can create and share pages, or add to existing ones, by writing text, uploading images, or linking to videos and other websites. The process of editing a webpage on a wiki is usually intuitive, involving an edit button that reveals familiar word processing icons for tasks such as creating a link, adding a picture, and inserting a table.

These websites are part of the Web 2.0 era, which focuses on user-generated content and interactivity on the Internet. Social media platforms are also a part of this Web 2.0 trend, allowing users to create and share content, as well as participate in social networking.

While wikis like Wikipedia are great tools for collaboration and information sharing, users should exercise caution as their open nature means they can be edited by anyone, which can sometimes lead to inaccuracies.

A metaphor of human-computer interaction (hci) in which interacting with the computer, is much like carrying on a conversation is called ____.

Answers

Answer:

direct manipulation metaphor

Explanation:

The metaphor in which the man and computer interaction takes place in a computer conversation with a man is called a dialog metaphor. Ths that option D is correct.

What is a dialog metaphor?

A dialog metaphor or the metaphor HCI is when the computer interacts with a man as of its carrying out a conversation is called as a dialog metaphor.

The user asks the computer for something and it responds. the interaction is seen as a dialog between the two.

Fin out more infirmation about the metaphor.

brainly.com/question/9418370

Which of the following functions automatically counts cells that meet multiple conditions?

a. countif
b. count
c. countifs
d. sumif

Answers

Answer:

c. countifs

Explanation:

The key word in the question is "following functions automatically counts cells".  So, you can already eliminate answer D.

With COUNTIFS, you can specify multiple criteria based on as many range for consideration.

For example, count this cell, if the value in column D is bigger than 23 AND if the date in column E is lower than June 30, 2019.

It gives great power of filter and calculation to your sheet, almost as good as a database.

To insert text from a separate file into your Word document,

a. click Text in the Object group, and then click Text from File.

b. click the Object arrow in the Text group, and then click Text from File.

c. click Text Box in the Insert tab.

d. You have to open the file and copy the text, then paste it into the document.

Answers

Answer:

D) You have to open the file and copy the text, then paste it into the document.

Explanation:

Which of these statements about resistance is true?
A. Resistance is a material-independent property.
B. The resistance of metals increases with temperature.
C. The resistance increases as the current decreases.
D. The resistance of an insulator is less than that of a conductor.

Answers

Answer: The answer is B

Explanation:

I got the answer right

What is an alignment of text in which the text is evenly aligned on both the left and right margins

Answers

Final answer:

Justified alignment is the arrangement of text so that it's evenly aligned on the left and right margins. It is commonly used in newspapers and textbooks for a formal appearance. Other alignment types include left-aligned, centered, and right-aligned text.

Explanation:

The alignment of text in which the text is evenly aligned on both the left and right margins is known as justified alignment. Justified-aligned text distributes the words across the line so that both edges of the paragraph are flush with the margins, creating a block-like appearance. Justified alignment is often used in settings such as newspaper columns and textbooks where a clean, formal look is desired.

In contrast, left-aligned text is often the default setting in many word processing programs, providing a straight left margin but a ragged right margin. Right-aligned text is flush with the right margin but not the left, and centered text is equidistant from both margins but doesn't align with either side. Adjusting margins and orientation may be necessary to achieve proper page formatting, and this can be done from the Page Setup window in text editors.

Name two computer viruses that have caused tremendous damage to computer systems.

Answers

Answer:

1. The ILOVEYOU virus is considered one of the most virulent computer virus ever created and it’s not hard to see why. The virus managed to wreck havoc on computer systems all over the world, causing severe damage to computers.

2. ZUES Zeus is a Trojan horse made to infect Windows computers so that it will perform various criminal tasks. The most common of these tasks are usually man-in-the-browser keylogging and form grabbing. The majority of computers were infected either through drive-by downloads or phishing scams.

Answer:

Melissa or Mailissa was a 1999 virus that spread as an email attachment. On opening the attachment, the virus replicated and sent itself to the first 50 mail contacts in the unsuspecting victim’s address book. The virus wiped out information on hard drives and created a major increase in email traffic at that time, forcing many companies to shut down their mail services until the virus was handled.

SQL Slammer or Sapphire was a 2003 web server virus that spread via the Internet. It attacked computer systems, mainly affecting banking and airline servers. It also caused outages to emergency 911 services in some cities.

Explanation:

This is the sample answer for edmentum.

A chef writing up her famed recipe for beef stew realizes she has switched parsley and oregano everywhere in the recipe. The chef wants to change all occurrences of “parsley" to “oregano" and all occurrences of “oregano" to “parsley." The chef will use the fact that the word “thyme" does not appear anywhere in the recipe. Which of the following algorithms can be used to fix the chef’s recipe? First, change all occurrences of “parsley" to “oregano." Then, change all occurrences of “oregano" to “parsley." First, change all occurrences of “parsley" to “oregano." Then, change all occurrences of “oregano" to “parsley." Last, change all occurrences of “thyme" to “oregano." First, change all occurrences of “parsley" to “thyme." Then, change all occurrences of “thyme" to “oregano." Last, change all occurrences of “oregano" to “parsley." First, change all occurrences of “parsley" to “thyme." Then, change all occurrences of “oregano" to “parsley." Last, change all occurrences of “thyme" to “oregano."

Answers

Answer:

the last three sentences

Explanation:

first change all of the occurrences of parsley to thyme,

and then all of oregano to parsley

and then all of thyme to oregano

When using a wireless connection, the process of answer translates data into code so that it is protected?

Answers

Answer:

encryption

Explanation:

of course, data encryption is not unique to wireless connections.

What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct answer)




1. Through automated functional tests.



2. Through automated regression tests.



3. Through automated unit tests.



4. Through automated smoke tests.

Answers

Answer:

1. through automated functional tests

Explanation:

The answer is quite simple that when you write a code you should check it before give this program to your clients, the best way is to make some functional tests. Option A.

Further Explanation:

When We Write Code:

When someone wrote a code of some lines or some thousand line there should some mistakes remaining but human is a human. Mistake ar made by humans so when we write the code of a program there should be a chance of pressing other keys on keboard or sometimes missing the pressing of some keys.

By mistakenly:

When we write the code the semicolon is left unwritten which is a very important for the language of the programs. When we compile the code compiler also check that the syntax of code should be correct.

By running the code:

After the compilation one programmer should run the program by itself so that he can see that all the functions of program is running correctly and fulfills the needs of the clients. This is a very good habit that programmer runs his programs before giving the program to its client

Answer Details:

Subject: Computer and Technology.

Level: High School

Key Words:

When We Write Code:

By mistakes:

By running the code:

For further Evaluation:

https://brainly.com/question/5144573

https://brainly.com/question/112785

What are the features of the Outline view in Word? Select three options.
A) making it easier to deal with larger documents
B) manipulating headings
C) displaying text with Heading styles
D) changing data inside headings
E) inserting Table of Contents

ANSWER: A B C

Answers

Answer:

A,B,C

Explanation:

Answer:

making it easier to deal with larger documents

manipulating headings

displaying text with Heading styles

Why do you think flowers are a popular topic for macro photography? Do you think you’d like to photograph flowers?

Answers

Why do you think flowers are a popular topic for macro photography?

Macro photography is the part of photography that focuses on taking pictures of very small objects (or small parts of larger objects).  Popular subjects are insects, flowers and small mechanical parts.

Flowers are a very popular subject because they always have lots of interesting details no matter how close you zoom in, like insects.  Flowers however tend to be easier to photograph because they move a lot less than insects.

Do you think you’d like to photograph flowers?

Yes, because it's a new way to look at them.

Jimmy and his friends are creating a rock band and have decided to turn his garage into a recording studio. He wants to sell the song to a music producer and must ensure that the music is impeccable. Which electrical equipment will help him achieve the most accurate sound quality?

A.

a MIDI interface

B.

a MIDI keyboard

C.

a cable

D.

a studio monitor

Answers

Answer:

Studio Monitor

Explanation:

Just got it right

The electrical equipment that will help him achieve the most accurate sound quality is the studio master. The correct option is D.

What is a recording studio?

Studio monitors are loudspeakers in speaker enclosures created especially for use in professional audio production environments such as recording studios, filming locations, television, radio, and project or home studios, where correct audio reproduction is essential.

Since they have better-than-average audio quality, a flat frequency response that doesn't tint the sound in any way, and they reproduce sounds clearly without distorting it, studio monitors are primarily worthwhile for anyone interested in music production.

Therefore, the correct option is D. a studio monitor.

To learn more about the recording studio, refer to the link:

https://brainly.com/question/29395384

#SPJ5

A(n) ________ is an item you can individually select and manipulate within a document. style property border object

Answers

Answer:

An object

Explanation:

You can insert objects in Word or on any other Microsoft productivity tools by either linking or embedding them. Once inserted, they can be manipulated to various forms and offer data to support your document’s objectives and create visually pleasing layouts.

Which set of variables will make code easier to understand?
a, b, c
sum, price, count
xii, xix, xxi
x, y, z

Answers

Answer:

sum, price, count

Explanation:

Programmers should use significant names for the variables.

Not only it makes it easier for them to remember what kind of information is stored in each variable, but it also makes life simpler for anyone who would read the code later.

Names like sum, price and count are significant names ( assuming they actually hold this kind of data), and will make the re-reading of the program code much easier.

Answer:

B. Sum price count

where was the vacuum cleaner invented?

Answers

The first patent for an electric carpet sweeper was granted to Corinne Dufour of Savannah, GA in 1890. In 1901, Hubert Cecil Booth invented a large vacuum cleaner known as the Puffing Billy.

Final answer:

The invention of the vacuum cleaner was part of a broader wave of technological innovations aimed at improving domestic life in the late 19th and early 20th centuries. Moreover, the development of portable cordless vacuums, like the Dustbuster by Black & Decker, was significantly influenced by technology created for space missions, showcasing a unique intersection between space exploration and consumer product development.

Explanation:

The vacuum cleaner was invented during a period of significant technological innovation that spanned the late 19th and early 20th centuries. This era saw the emergence of numerous household appliances designed to improve domestic life, including the vacuum cleaner. The invention of the vacuum cleaner, alongside other appliances like radios, washing machines, and refrigerators, played a crucial role in transforming home environments. The creation of portable, motor-powered vacuum cleaners made it significantly easier to clean floors, thus contributing to the comfort of the middle class. Additionally, the advent of these labor-saving devices had a profound impact on society, especially for women who traditionally held primary responsibility for housework. Although these inventions were aimed at reducing the workload, they oftentimes increased it by raising the standards of domestic work.

Furthermore, the development of portable cordless vacuums was notably influenced by technology developed for space missions. Specifically, Black & Decker created a portable, self-contained drill for the Apollo space mission, which led to the innovation of the Dustbuster, a cordless miniature vacuum cleaner. This technology, initially developed to assist astronauts, was eventually adapted for consumer use, revolutionizing how cleaning tasks were performed in homes around the world.

How to write greater than or equal to in excel if function

Answers

Answer:>=

Explanation:3>=4

I

What could be one possible reason where the recipient is not guaranteed that the data being streamed will not get interrupted? The recipient is having an outdated error correction technique installed. The senders PC is using UDP protocol The Recipient PC is having the higher security settings in his internet The recipient is having a static IP connection with the Internet service provider

Answers

Answer:

The senders PC is using UDP protocol.

Explanation:

UDP is not like TCP. TCP assigns a sequence number for every byte of data and ensures complete delivery of the data as it passes "hands" until it reaches its destination. UDP has quicker communications but at the expense of ensuring that the data has had a complete successful delivery.

UDP may allow a connection to have continuous data communication but at the expense of ACK. What all of this means is that because UDP cannot guarantee complete data delivery due to it not having backup measures in place to ensure complete delivery has occurred, only TCP is capable of doing this since TCP does have countermeasures in place due to its sequence number check at every byte of data. Since TCP has countermeasures to ensure complete delivery, it is slower than UDP due to the additional checks which UDP does not have.

In the end, "The senders PC is using UDP protocol" when answering "What could be one possible reason where the recipient is not guaranteed that the data being streamed will not get interrupted". Well, based on the choices you provided anyways:

-The recipient is having a static IP connection with the Internet service provider

-The senders PC is using UDP protocol

-The recipient is having an outdated error correction technique installed.

-The Recipient PC is having the higher security settings in his internet

What are the features of the Outline view in Word? Select three options.
A) making it easier to deal with larger documents
B) manipulating headings
C) displaying text with Heading styles
D) changing data inside headings
E) inserting Table of Contents

ANSWER: A B C

Answers

Answer:

A,B,C

Explanation:

Outlines can be used in different ways:

1) to create the structure of a new document by manipulating Headings

2) Help to navigate across large document

3) Display the text or an abstract of the content with Headers

Which of the following is considered a white collar crime?

A. operating an illegal drug lab
B. drug trafficking
C. money laundering
D. elder abuse​

Answers

Answer:

The answer would be C if I am correct

Explanation:

The reason being is because white collar crimes are non-violent and usually are finance related and involves business or government things, so money laundering would make sense, i hope this helps

What type of printer heats toner to adhere it to the paper? inkjet . impact. 3D. laser.

Answers

Answer:

laser

Explanation:

These are well known printer types now.  Let's review how they work to determine in which does heat plays a role.

inkjet: inkjet printers are printer throwing ink at the paper in the form of little drops.  No heat involved here.

impact: That's the oldest technology, where a printing head is moving left and right to punch a printing ribbon and transfer ink onto the paper.  No heat involved.

3D: 3D printers don't usually use paper... as they use other materials to create a 3D representation of a model.  Heat is involved in the melting of the material before it's placed on the building model.  But no paper involved here.

laser: laser printers are working very much like a photocopier machine... memorizing the pattern to be printed, then transferring it onto paper... using heat.

A laser printer is a type of printer that uses heat to melt and adhere toner to paper, providing high-quality printouts efficiently and cost-effectively.

The type of printer that heats toner to adhere it to the paper is a laser printer. Laser printers operate by taking a dry black powder, known as toner, and applying a negative charge to it. This charged toner is attracted to the positively charged regions of a drum. A piece of paper is then given a greater positive charge than that of the drum in order for it to attract and pull the toner from the drum. Finally, the paper with the electrostatically held toner is passed through heated pressure rollers that melt and permanently adhere the toner to the paper's fibers. Laser printers are known for their high-quality output and are efficient for both home and office use, as they tend to be more cost-effective and operate faster than alternatives such as inkjet printers over the long term.

Other Questions
explain how different processes such as erosion, weathering, deposition and tectonic plate movement cause small and big changes in Earth's surface. Given the system of equations:2x y = 2x = 14 + 2yAnswer the following:A) What is the value of the system determinant?B) What is the value of the ydeterminant?C) What is the value of the xdeterminant?D) What is the solution to the system of equations?My mind is blank when I look at this, any help will be appreciated. The form he builds is 35 1/2 inches long, 20 inches deep, and 6 inches high. How much cement is neede to fill the form Answer this please I need help asap 2/3(1/4x2)=1/5(4/3x1) List some of the changes initiated by franois mitterrand's government in france. how successful were mitter- rand's socialist policies? Liza finished studying at half past 3. What time did Liza finish studying? Which of these is an example of government corruption:A. The Seizure of a citizens private property for public use.B. The Use of the power of public office for private gainC. An agreement between two political opponents D. A race between candidates for public office Which was the Egyptians chief god, who was said to be reborn with each sunrise? Which demonstrative pronoun best completes this sentence?Carla: Puedes pasarme los platos?Nicols: Cules platos?Carla: ______________ aqu.A. AqullosB. stasC. sasD. stos What is slope intercept form In which career or job role in business information management do you need to create and manage project plans, and also coordinate with team members? A. business analyst B. project manager C. marketing manager D. business development manager Find the length of side ab. hurry nowwwwwww which inequality and soulition represent the following situation? when 4 is subtracted from 10 times a number the result is greater than 1.5A)10b-4>1.5;>-0.25B)4-10b1.5;b>0.55D)4-10b>1.5b;>0.25 Please help with this question Using a directrix of y = 5 with focus at (4, 1), what quadratic function is created?f(x) = 1/4(x 4)2 3f(x) = 1/8(x + 4)2 3f(x) = 1/8(x 4)2 + 3f(x) = -1/4(x + 4)2 3 Restaurant managers establish practices to eliminate hazards by analyzing their food preparation processes. What is this practice called?A. preparation protocolsB. critical control pointsC. standardized controlsD. recipe standardizationE. critical recipe protocols SHOW YOUR WORKA quadratic equation is shown below:3x2 11x + 10= 0Part A: Find the vertex. Show your work.Part B: Solve for x using an appropriate method. SHOW THE STEPS OF YOUR WORK. Please help with this math question will give BRAINLIEST and 10 points identify the amplitude of the graph Steam Workshop Downloader