Which design principle is the subject of a photo or image?

A) Focal Point
B) Framing
C) Field of view
D) Space
E) Rule of thirds

Answers

Answer 1

Answer:

B) Framing is the answer to your question


Related Questions

Write a statement that stores a number, 55.0, in the last column of the last row in the array.

Answers

To store the number 55.0 in the last column of the last row in the array, you can use the following statement:

array[array.length - 1][array[0].length - 1] = 55.0.
Here are the details of the steps involved:
1. Determine the index of the last row in the array by using the expression `array.length - 1`. This will give you the index of the last row in the array since array indices start from 0.
2. Determine the index of the last column in the array by using the expression `array[0].length - 1`. This expression accesses the first row in the array (array[0]) and calculates the length of that row (number of columns) and then subtracts 1 to get the index of the last column.

3. Use the above calculated indices to access the last column of the last row in the array, which is `array[array.length - 1][array[0].length - 1]`.
4. Assign the value 55.0 to this specific element in the array by using the assignment operator (`=`).

This statement will assign the value 55.0 to the last column of the last row in the array.

To know more about array visit:-

https://brainly.com/question/31044154

#SPJ11

I really need this done Thank you!!

I really need this done Thank you!!

Answers

Answer:

10

Explanation:

the interval in the printed numbers is 10.

question 1: do all of the packets in your sent messages always follow the same path? if not, describe at least two different paths packets took.

Answers

No, not all packets in your sent messages always follow the same path. Packets take different paths based on the network topology and traffic conditions. Two different paths packets took are direct path and indirect path.

1. Direct Path:

If the recipient is connected directly to the sender's network, then the packets will travel directly to the recipient's network. This is the simplest and most efficient path for the packets to take. For example, if you send a message to a colleague on the same local network, the packets will travel directly to their device.

2. Indirect Path:

If the recipient is not connected directly to the sender's network, then the packets will travel through multiple routers and switches to reach the recipient's network. The packets take this indirect path to sent message because it is the only available path. The packets might have to travel through different networks and even different countries before reaching the recipient.

To learn more about packet: https://brainly.com/question/28180161

#SPJ11

Next

Emerging Network Technology - Cloud Computing: Mastery Test

Type the correct answer in the box spell all words correctly

Which type of virtualization de storage area networks (ANS) typically use?

SANs typically use

virtualization

Reset

Next

Answers

Answer:

SANs typically use block-level virtualization. Block-level virtualization involves creating virtual copies of physical storage devices, such as hard drives or solid-state drives, and presenting them to the host computer as if they were physical devices. This allows for the creation of multiple virtual storage devices on a single physical storage device, enabling the host computer to access and manage the virtual devices as if they were separate physical devices. Block-level virtualization is commonly used in SANs because it allows for the creation of multiple virtual storage devices with different performance characteristics, such as different capacity or performance levels, that can be tailored to the specific needs of different applications or workloads.

Explanation:

What are the main reason for incerasing cyber crime?​

Answers

Answer:

Let's explore three of the key factors that compromise cyber security and increase the likelihood of cyberattacks.

Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security. ...

System vulnerabilities. When cybercriminals spot a weakness, they pounce on it. ...

Assessing risk.

Answer:

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.please brainlist


Directions: To avoid early damage in the tools, how will you sanitize and store the

following tools in your kitchen. Write your answers in the activity notebook following

the given columns.

Tools Proper Sanitation Proper Storage

Answers

Answer:

1)sterilizing

2)use bleach and water

3)when you wash the measuring spoon,wash them using warm soapy water then rinse them in clear water

4)use a fresh solution of 1 tablespoon of unscented,liquid chlorine bleach per gallon of water

5)let it set in soapy water over night

6)set it in soapy water five minutes and scrub each potter

7)wash mixing bowl in hot ,soapy water to add it to a dishwasher load

8)use a ratio of one part bleach to 20parts of water

9)pour water on thr blender and add dish soap

10)wipe it using clean and smooth towel

Write a function that takes two arguments and returns their sum.
In the main part of your program (the part that isn't inside a function), call your
function to test it out.

Answers

Answer & Explanation #1

To answer your first query. You can write a function that takes two arguments and returns their sum like this:

#Python program to add two numbers using a function

def add_num(a,b): #function for addition

   sum=a+b

   return sum #return value

num1=25  #variable declaration

num2=55

print("The sum is",add_num(num1,num2)) #call the function

Answer & Explanation #2

As for your error, I believe it is an indent error in your first return statement. All you must do is indent the return statement.

Please help I have errors codes and don’t know that they are.
Please help thank You.

Please help I have errors codes and dont know that they are.Please help thank You.

Answers

Refresh, power off and repeat
Yeah ummmm about that

: 2.12 LAB 2.3: File I/O - CSV update
This program should
• get names of input and output files from command line (NOT from user input)
• read in integers from a csv (comma-separated values) file into a vector
• compute the integer average of all of the values convert each value in the vector to the difference between the original value and the average
• write the new values into a csv file #include

Answers

To read a CSV file, We will open the file using ' f stream ' or ' if stream ' C++ library. Then, we will read the file line by line using the get line() method as each line ends with a newline character.

The create operation is similar to creating a text file, i.e. input data from the user and write it to the csv file using the file pointer and appropriate delimiters(‘, ‘) between different columns and ‘\n’ after the end of each row. Read data from a file and compare it with the user input, as explained under read operation. Ask the user to enter new values for the record to be updated. Update row[index] with the new data. Here, index refers to the required column field that is to be updated. Write the updated record and all other records into a new file(‘reportcardnew.csv’).At the end of operation, remove the old file and rename the new file, with the old file name, i.e. remove ‘reportcard.csv’ and rename ‘reportcardnew.csv’ with ‘reportcard.csv’

To learn more about CSV file click on below link.

https://brainly.com/question/14492851

#SPJ4

write the algorithms for the problem How to post a letter ? you can put pictures for the steps ​

Answers

❖ Step 1: Start

❖ Step 2: Write a letter

❖ Step 3: Put in envelope

❖ Step 4: Paste stamp

❖ Step 5: Put it in the letter box

❖ Step 6: Stop

\(\frak{\fcolorbox{black}{pink}{Black Pink in your area$~$}}\) ~←(>▽<)ノ

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

You want to add a picture of a potential new office layout to the title page of a proposal. How can you adjust the size of the image without changing its proportions?

Answers

Answer:

You can adjust the size of an image without changing its proportion by holding down the shift key while adjusting one of the edges.

Windows is is the type of

Answers

Answer:

operating system

Explanation:

Windows is an operating system designed by Microsoft. The operating system is what allows you to use a computer. Windows comes preloaded on most new personal computers (PCs), which helps to make it the most popular operating system in the world

Create a template of a change request form. What sections did you include and why?

Answers

According to the information some sections included in the change request form: Request Information,  Description of Change, Impact Analysis, Proposed Solution, Benefits of the Change, Cost Estimate, Approval and Authorization, etc---Cttachments, etc...

What secctions do we include and why?Request Information: This section collects essential details such as the project name, change request number, date, requestor's information, and contact details for easy identification and communication.Description of Change: This section provides a clear and detailed description of the requested change, including the reasons behind it and any relevant background information. Impact Analysis: This section assesses and documents the potential impact of the change on various project aspects, suc´+Proposed Solution: Here, the proposed solution to address the requested change is described, along with any alternative options considered.Benefits of the Change: This section highlights the anticipated benefits or advantages that the change will bring to the project. It helps stakeholders evaluate the value and potential positive outcomes associated with the change.Cost Estimate: This section provides an estimate of the costs associated with implementing the change. It includes financial costs, resource requirements, and any additional expenses. Approval and Authorization: In this section, the approval process for the change request is outlined. It specifies the individuals or roles responsible for reviewing and approving the request. It also provides space for authorized signatures and dates to formalize the approval process.Attachments: This section lists any supporting documents or files that are relevant to the change request. It allows stakeholders to attach additional information, such as diagrams, specifications, or previous discussions, to provide a comprehensive understanding of the change.Review and Evaluation: This section provides space for project stakeholders or change control board members to review and evaluate the change request. Change Request Status: This section helps track the status of the change request, including submission date, review dates, approval status, and implementation status.

Learn more about template in: https://brainly.com/question/13566912
SPJ4

how to get off of supervised user

Answers

Answer:

On the Chromebook sign-in screen, select the profile you want to remove. Next to the profile name, select the Down arrow . Select Remove this user.

hope this helps

have a good day :)

Explanation:

Question 3 options: Abstractions in a BNF description that can have two or more distinct definitions, representing two or more possible syntactic forms in the language.

Answers

Abstractions in a BNF description that can have two or more distinct definitions, representing two or more possible syntactic forms in the language and this is known to be  Nonterminal symbols.

What are these symbols about?

Nonterminal symbols are known to be a kind of symbols that one can be able to replaced.

Note that they are often called simply syntactic variables and as such,  Abstractions in a BNF description that can have two or more distinct definitions, representing two or more possible syntactic forms in the language and this is known to be  Nonterminal symbols.

Learn more about Abstractions from

https://brainly.com/question/7994244

#SPJ1

the unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages.

Answers

It also supports symbols from a variety of other languages, including mathematical symbols, and other symbols used in various cultures.

The Unicode coding scheme is used to represent text in a variety of languages and scripts, as well as a wide range of symbols. It is the most widely used character encoding scheme in the world and is used to support a wide range of languages, including those for Chinese, Japanese, and Arabic.

Unicode also supports symbols for mathematics, technical symbols, and symbols from other cultures. Unicode is the standard for encoding text on computers and other digital devices and is used in many webpages, software applications, and databases.

Learn more about Unicode: https://brainly.com/question/5230447

#SPJ4

What is wrong with line 3 ?

What is wrong with line 3 ?

Answers

Answer:

i think you have to put "" or semicolon at the end

What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records?

Answers

The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

What is  an incomplete health record or a delinquent health record?

An  incomplete health record is one that is often open after a set period of time such as more than 30 days and if not complete, the health record is said to be delinquent.

Note that Nurses are mandated to carefully maintain patient records. Therefore, The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

Learn more about chief medical officer from

https://brainly.com/question/18696862

#SPJ1

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

customers=[
{
name:"John",
age:30,
city:"New York"
},
{
name:"Dave",
age:40,
city:"Los Angeles"
},
{
name:"Mary",
age:50,
city:"Miami"
},
{
name:"Anna",
age:30,
city:"Washington"
}
];

1.Collect all the names in an array and print them to the screen
2.Calculate the sum of the ages of the customers
3.Print the ages and cities of customers starting with the letter A
5.Write a function that creates a new customer and adds it to the list of customers when the name, age, city parameters are entered into that function.

Answers

Using the knowledge in computational language in python it is possible to write a code that  creates a new customer and adds it to the list of customers when the name, age, city parameters are entered into that function.

Writting the code:

String answer2;

String write;

String fileName;

ArrayList<String> names = new ArrayList<>();

ArrayList<String> ages = new ArrayList<>();

System.out.println("Do you want to write to a file? ");

answer2 = keyboard.nextLine();

do

{

}

while (answer.equals("no"));

do

{

     System.out.println("Enter your filename: ");

   fileName = keyboard.nextLine();

     

    try

   {

       PrintWriter outputFile = new PrintWriter(fileName);

       

             outputFile.println(names);

       outputFile.println(ages);

       

       outputFile.close();

   }

   

   catch (FileNotFoundException e)

   {

       //

       e.printStackTrace();

       break;

   }

}  

while (answer2.equals("yes"));

do

{

   System.out.println("Thanks for playing!");

   break;

}

while (answer2.equals("no"));

keyboard.close();

See more about python at brainly.com/question/18502436

#SPJ1

customers=[ { name:"John", age:30, city:"New York" }, { name:"Dave", age:40, city:"Los Angeles" }, {

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

How would you modify a search in an academic database to return all the results in the database that are primarily about a specific topic

Answers

Answer:

Replace terms that are too general or too specific. Increase the number of synonyms or alternatives for a term.

Explanation:


When protecting a book

You are not able to add a new sheet to the book, delete an existing sheet, or modify the title of the sheet.
true
false ??

Answers

false. maybe i honestly kind of think so

Which statement opens a text file so that you can retrieve the information it contains?

aFile = open("books.txt","r")

aFile = open("books.txt","s")

aFile = open("books.txt", "w")

aFile = open("books.txt", "a")

Answers

Answer:

Answered below

Explanation:

aFile = open("books.txt", "r")

This code uses the function open() which takes two parameters. The first parameter is the file name while the second parameter is the mode in which you are accessing the file.

The "r" mode opens the file in a reading state. That is, you can only read from the file. This code completes the reading process

aFile.read( )

The "w" mode opens the file so you can write to it and make changes.

The "a" mode opens the file so you can add contents to it.

The statement which opens a text file somthat you can retrieve the information it contains is; aFile = open("books.txt", "r")

Discussion:

The code above uses the function open() which requires two parameters.

First of which is the file name while the second parameter is the mode in which one is accessing the file.

On this note, the "r" mode opens the file in a reading state. This in essence means, you can only read from the file. This code completes the reading process

aFile.read( )

Post Script:

The "w" mode opens the file so one can write to it and make changes.

The "a" mode opens the file so one can add contents to it.

Read more on text file:

https://brainly.com/question/6962696

What is a decision tree

Answers

A decision tree is a diagram or chart that people use to determine a course of action or show a statistical probability.

What are the three parts of a camera

Answers

Answer: Camera lens, Film or sensors, and body.

Explanation: I researched it.

ning and e-Publishing: Mastery Test
1
Select the correct answer.
Which statement best describes desktop publishing?
O A.
a process to publish drawings and photographs on different media with a laser printer
B.
a process to design and produce publications, with text and images, on computers
OC.
a process to design logos and drawings with a graphics program
OD
a process to publish and distribute text and graphics digitally over various networks
Reset
Next​

Answers

Answer:

B

Explanation:

I dont no if it is right but B has the things you would use for desktop publishing

Answer:

the answer is B.

a process to design and produce publications, with text and images, on computers

Explanation:

Write a function named last_digit that returns the last digit of an integer. For example, last_digit(3572) should return 2. It should work for negative numbers as well; last_digit(-947) should return 7.

Answers

def last_digit(num):

   num = str(num)

   return int(num[-1])

print(last_digit(-947))

I hope this helps!

Python plese help 4.2 projectstem

it keeps saying error


pet=input("What pet do you have? ")

c=1

while(pet!="rock"):

print("You have a " + pet + " with a total of " + str(c) + " pet(s)")

pet = input("What pet do you have?")

c = c + 1

Python plese help 4.2 projectstemit keeps saying errorpet=input("What pet do you have? ")c=1while(pet!="rock"):
Python plese help 4.2 projectstemit keeps saying errorpet=input("What pet do you have? ")c=1while(pet!="rock"):

Answers

Answer: while(pet!="stop"):

Explanation:

here was my code for that lesson

pet = input("What pet do you have? ")

total = 0

while pet!="stop":

   total+=1

   print("You have one " + pet + ". Total # of Pets: " + str(total))

   pet = input("What pet do you have? ")

Other Questions
Can you answer which ones are impossible , unlikely , as likely as not , likely , or certain ? Look at the image below please help. diary entriesyour family is moving into a new house Derek will deposit $1,413.00 peryear into an account starting today and ending in year 8.00. Theaccount that earns 4.00%. How much will be in the account 8.0 yearsfrom today?SubmitAnswer format: Select the past participle(s) in the sentence: The cars stopped at the gate while the drawbridge was opened.-opened Among countries where mandatory voting laws are enforced, what is the MOST common form of punishment for not voting? The Louisiana Territory was:purchased from Napoleon Bonapartea,o b. purchased from the British monarchOc.acquired through war with Spainacquired through treaties with the region's indigenous peoplesOd.O e.acquired through war with Britain once a company has established a corporate social responsibility program, it is essential for the company to ______ The equivalent matrices are . Find the range of the function y=10x+7 when the domain is {-1, 0, 1}. square roots of 2 7/9 Why did European overseas voyage upset the Portuguese? Which set of ordered pairs represents a function?O {(-5, -9), (-7,-9), (-5, -7), (-8,6)}O {(-1,6), (0, -3), (5, -9), (-1,3)}O {(1, 2), (-6, 2), (3,9), (5,3)}O {(-3,9), (2, 7), (2, -4), (1,5)} List at least 5 features that can be used to format a report. help pleaseWrite the correct positive or negative command for the correct form and use object pronouns where possible.Read the books! (formal ud)Don't clean the house for us! (informal tu) The Little Town wastewater treatment plant discharges 4106 L/d of treated wastewater to the Meandering River. The treated wastewater contains 25mg/L of nitrate. Meandering Brook has a nitrate concentration of 5mg/L upstream of the wastewater treatment plant and flows at a rate of 20106 L/d. The Meandering River is 1 m deep and 20 m wide. The Big City, located 5 km downstream, uses the Meandering River as a source of drinking water. If there are no other sources of nitrate to the river, and if nitrate is degraded at a rate of 24 d1 in the river, will the water quality standard of 5mg/L be exceeded in Big City drinking water? Support your answer quantitatively. Which statement best explains the impact of the Education Improvement Act in South Carolina? A) It reduced the dropout rate as a result of the lowered requirements for high school graduation in the state. B) It forced South Carolina schools to be integrated for the first time as a result of civil rights violations. C) It reduced absenteeism, increased SAT scores, and increased the number of seniors headed to college. D)It allowed educators to cover more material within the time allotted by a shorter school year. Which of the following is displaced by 'Cu'? 1.Fe2+ 2.Ag+ 3.Zn2+ 4.Al3+ The slow growth model focuses on long-run economic growth. A key component of economic growth is saving and investment. An increase in saving and investment raises the capital stock and thus raises the full employment national income and product. The effects of an improvement in the state of technology can promote faster growth as an improvement in technology shifts the production function up, leading to an increase in output per worker for a given level capital per worker. What does "decentralize" mean?Blockchain is technically decentralized. How do you think thiswill affect the role of central banks in the digital currencymarket?