A DTP firm has published and printed fliers for an upcoming fundraising event. In which section of the flyer would you find the contact details of the DTP firm
A. Body
B. Credits
C. Navigation
D. Title

Answers

Answer 1
B.Credits at the end of the flyer

Related Questions

Who, in 1937 tried to build a computer with no gears, cams, belts, or
shafts?

Answers

Answer:

But we're getting ahead of our story. One of the earliest attempts to build an all-electronic (that is, no gears, cams, belts, shafts, etc.) digital computer occurred in 1937 by J. V. Atanasoff, a professor of physics and mathematics at Iowa State University.

Explanation:

hope this will help you

have a great day

please mark me as the brainliest

Answer: Atanasoff

Explanation: he was a doctor whom tried to built a computer to test the capacity of storing data

A mouse that emits and sense light to detect its movement is called an _______________ mouse.​

Answers

The answer is: “optical” mouse

Explanation:

optical mouse:

uses devices that emit and sense light to detect the mouse's movement

Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)

Answers

Answer:

can you explain more please I didn't understand

rocks created from compaction and cementation of sediments are called:

Answers

Answer:

Sedimentary Rocks

Explanation:

Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.

Answer:

A  sedimentary

Explanation:

hope this helps please mark as brainliest

you can use view the ______ file to view the hard drive details.

Answers

Answer:

/proc/partitions

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Certificate authority (CA) is simply known as a firm (entity) that has the sole aim for digital certificates.

Certificates often uses centralized third parties called certificate authorities such as x.509 certificates. There are several fields in x.509 and these certificates consist of several characteristics that is perculiar to them.

From the above, we can say that Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Learn more from

https://brainly.com/question/17956104

in 2014, what percentage of the world population has access to the internet?

Answers

Answer:

At that time 43.9% of people have access to the global internet.

what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage

Answers

Answer:

could have used a browser  but ok

Explanation:

The arrangement of various flash elements such as the tools panel control panel property inspector and windows is called the Workspace. Explanation: The workspace in a computer system makes us easy to navigate to different features and control options.

Which TWO are examples of the internet reducing the use of paper?

Answers

Answer:

Using word documents instead of paper can save lots of paper especially, when lots of people are doing that already. Using emails can reduce the amounts of letters being sent to people.

did someone really hang themselves on wizard of oz

Answers

Answer:

Yes they did

Explanation:

If you look closely in the back, in the part where they sing where off to see the wizard the wonderful wizard of oz. Just look behind dorothy's head and you will see a man hanging himself

A_______VPN connection is a private network that uses a public
network to operate.

A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site

Answers

Answer:

letter c. point to site po sagot diyan

What language do programmers use to communicate with a computer?

Input code
Linguistic code
Programming code
Virtual code

Answers

Answer:

I would say programming code

Explanation:

Since its a system of rules written in a particular programming language

The language that programmers use to communicate with a computer is called "Programming code".

The correct option is C.

Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.

Programming languages can be divided into two categories: low-level and high-level.

Low-level languages are closer to the binary code that computers use to execute instructions.

High-level languages are more abstract and easier for humans to understand and use.

Examples of high-level languages include Python, Java, JavaScript, and C++.

Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.

Know more about programming language,

https://brainly.com/question/23959041

#SPJ3

what must you ensure if your work involves the use of different types of smart card security tokens

Answers

Answer:

Avoid a potential security violation by using the appropriate token for each system.

What must you ensure if you work involves the use of different types of smart card security tokens? Avoid a potential security violation by using the appropriate token for each system.

what information most likely presents a security risk on your personal

Answers

An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.

A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.

Some of the social characteristics and details of an individual that are shared on social media websites include the following:

Date of birth.Occupation.Religion.Gender (sex).Location.Friends.

However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.

In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.

Read more: https://brainly.com/question/21765376

qbasic program to check whether the given number is odd or even​

Answers

Answer:

CLS

INPUT "Enter a Number: ", n

IF n MOD 2 = 0 THEN

PRINT "Input Number is Even"

END IF

IF n MOD 2 = 1 THEN

PRINT "Input Number is Odd"

END IF

END

Explanation:

CLS

INPUT "Enter a number:",N

IF N MOD 2=0 THEN

PRINT "given number is even"

ELSE

PRINT"given number is odd"

END IF

END

what is the answer ??​

Answers

= Option b Minicomputer ..........

Answer:

Minicomputer answer The HP 2100 is a series of 16-bit minicomputers that were produced by Hewlett-Packard (HP) from the mid-1960s to early 1990s. Bro please follow me we should help each other

Why do we collect feedback on the code we write?

Answers

Answer:

to improve our code

Explanation:

"To improve our code" we collect feedback on the code we write.

Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.

Thus the above answer i.e., "option a" is correct.

Learn more about feedback here:

https://brainly.com/question/1603365

What is the maximum number of guesses it will take to find a number between 1 and 1000? Explain your answer.

Answers

Answer:

The maximum number of guesses without binary search is 999 since we would be going sequentially and guessing the numbers. When we reach number 999 and find that is not the answer, we know it has to be 1000, and don't have to guess, so the number of max guesses is 999.

The maximum number of guesses to find a number between 1 and 1000 is 10, using a binary search algorithm. Each guess divides the search range in half until the number is found.

Given that,

The number we are trying to find is between 1 and 1000.

We are trying to determine the maximum number of guesses it would take to find this number.

To find the maximum number of guesses it would take to find a number between 1 and 1000, we can use a binary search algorithm.

In a binary search, we start by guessing the middle number, which in this case would be 500.

If the number we are looking for is higher than 500, we then guess the middle number between 501 and 1000, and so on.

If it's lower, we guess the middle number is between 1 and 499, and so on.

Using this approach,

As dividing the problem in half with each guess. Since we have 1000 possible numbers and we divide by 2 with each guess,

It would take a maximum of log base 2 of 1000 (or approximately 9.97) guesses to find the number.

Therefore, we can conclude that the maximum number of guesses it would take to find a number between 1 and 1000 using this binary search algorithm is 10.

To learn more about number system visit:

https://brainly.com/question/33311228

#SPJ3

PLS HELP ASAP ILL GIVE THANKS AND BRAINLIEST IF YOU GET THEM ALL RIGHT:

1. Software used to search a database using keywords or phrases entered by the user.
A) Navigation Tracking
B) Network
C) Search Engine
D) Ethernet Cable

2. This is used to mark a web pages structure using tags so that the web browser displays the content correctly.

A) Antivirus application
B) Ethernet cable
C) Computer virus
D) HTML

3. this is used to connect devices like printers, keyboards, external storage, and digital cameras to computers.

A) Modem
B) USB
C) Intranet
D) Desktop Interface

4. software that the owner maintains exclusive control over how it is modified and distributed

A) proprietary
B) navigation tracking
C) Spyware
D) operating system

5. set of principles that help users determine what is right or wrong in regards to computers.

A) modem
B) HTML
C) navigation tracking
D) Computer ethics

6. spyware that manages all of the installed applications and hardware on a computer or device.

A) Computer virus
B) operating system
C) citation
D) HTML

7. physical components of a computer system such as computer, mouse, or modem.

A) software
B) Network
C) browser
D) hardware

8. A malicious software program that spies on the user and share the information with a third-party.

A) antivirus application
B) malware
C) spyware
D) Desktop interface

9. icons and menus on the computer that allow the user to interact with the operating system.

A) Desktop interface
B) intranet
C) navigation tracking
D) Computer ethics

10. A tool that provides directions using satellites

A) asynchronous communication
B) navigation tracking
C) Ethernet cable
D) HTML

11. A restricted private network used by organizations to communicate.

A) asynchronous communication
B) navigation tracking
C) intranet
D) browser

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

Answers

This is a lot, but here goes!

1. C

2. D

3. B

4. A

5. D

6. B

7. D (these are technically peripherals or input devices.)

8. C

9. A

10. B

11. A

12. D

13. B

Just as a note, spyware is malware.

Tim has joined a new firm as a network engineer. Which three personal qualities will help him in his career? A. open-mindedness B. flexibility C. willingness to learn D. confidentiality E. ethnicity

Answers

Answer:

I would say A B and C

Explanation:

A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.

Answers

It means that thw operating system is up to date with all the lastest protection systems like an anti virus. An example is that the operating system has a built in ransomware protection system ib place.

Hope this help please give the brainliest award

how can an attacker execute malware through a script?

Answers

Answer:

An attacker can attach a script to a program that you download which then infects your computer.

you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?

Answers

When one is  typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.

Computer data storage can be regarded complex system, immediately a data is saved then;

The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers,

The hardware will record this saved numbers inside the computer.

These numbers are then  organized and transferred to temporary storage which be manipulated by programs, or software.

Therefore, data are been stored as 1s and 0s in the computer.

Learn more at:https://brainly.com/question/21571591?referrer=searchResults

a falsh movies consist of how many frame? ​

Answers

TV displays at almost 30 frames per second (fps), while motion pictures display at 24fps (the default frame rate in Flash is 24fps). Animation is controlled with the Timeline, which appears above the stage (WINDOW > Timeline): Flash movies begin as a single frame. To add movement, you must create additional frames.
TV displays at almost 30 frames per second (fps), while motion pictures display at 24fps (the default frame rate in Flash is 24fps). Animation is controlled with the Timeline, which appears above the stage (WINDOW > Timeline): Flash movies begin as a single frame. To add movement, you must create additional frames.

Which device do you think is the most important in the development of human civilization

Answers

Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.

Explanation:

Your welcome :)

____ describes the period of time in a twenty-four-hour period that is spent at work.

Answers

I believe "Work-Shift" should be in the blank

ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!


1. A means of giving credit to a source when their information is used.

A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi

3. A device that translates analog carrier signals to encode and decode digital information.

A) USB
B) Computer Virus
C) Intranet
D) Modem

4. A virus or Trojan horse designed to cause harm to computer or device.

A) Hardware
B) Malware
C) Modem
D) Antivirus Application

5. Software that is used to detect and eliminate computer viruses.

A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser

6. Transmits data through a cable television network as a means to connect a computer to the internet.

A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB

7. An application used to access websites on the internet.

A) Malware
B) Internet
C) Proprietary
D) Browser

8. Communication that does not happen in real time.

A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware

9. A network of computers that provides access to information on the web.

A) Phishing
B) Internet
C) Antivirus Application
D) Modem

10. The cable used to connect computers in a network.

A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware

Answers

Easy Peasy Lemon Squeezy

1. A means of giving credit to a source when their information is used.

A.) Citation

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.

B.) Phishing

3. A device that translates analog carrier signals to encode and decode digital information.

D.) Modem

4. A virus or Trojan horse designed to cause harm to computer or device

B.) Malware

5. Software that is used to detect and eliminate computer viruses.

C.) Antivirus Application

6. Transmits data through a cable television network as a means to connect a computer to the internet.

B.) Cable Internet

7. An application used to access websites on the internet.

D.) Browser

8. Communication that does not happen in real time.

A.) Asynchronous Communication

9. A network of computers that provides access to information on the web.

B.) Internet

10. The cable used to connect computers in a network.

B) Ethernet Cable

Answer:

your mom

Explanation:

how much did netflix pay dave chappelle for the closer

Answers

$24.1 million dollars

________ is the use of information technology to support the sharing of content among networks of users.

Answers

Answer:

The social media is the use of IT to support the sharing of content among network of users.

what is my assurance wireless account number and pin

Answers

Answer:

Call Assurance Wireless at 1-(888)-898-4888 to access your account number. Your PIN is the 6-digit (or 10-digit) number you created, which is located on your welcome letter. Your account number can be found in the top right corner of any bill or by logging into your online account. Do not enter any dashes or hyphens.

Explanation:

pls mark as brainliest and hope this helps

It should be noted that your assurance wireless account number can be found at upper right-hand corner of any bill, and the PIN is the 4 digits that was given to the carrier during the call in.

According to the question, we are to discuss how individuals can know his assurance wireless account number as well as the pin.

As a result if this we can see that the Account number can be obtained at  upper right-hand corner of bill as well as invoice, and the pin is usually 4 digit number.

Therefore, your assurance wireless account number upper right-hand corner of any bill.

Learn more about wireless account number at:

https://brainly.com/question/13162939

Other Questions
Uneven heating produces________ which occur every 30 latitude1) Winds2) The Coriolis Effect3) Pressure Belts4) Horse Latitudewhat do i fill it in with? PLEASE HELP MEA student bought 24 pencils for every 16 markers. The number of pencils bought is directly proportional to the number of markers.What is the constant of proportionality that relates the number of pencils to the number of markers?5/32/33/23/5 In order to have your intellectual property legally protected by copyright, you must file an application with the U.S. Copyright Office before anyone tries to use your work.Question 4 options:You do not have to apply for copyright protection with the U.S. Copyright Office in order for your work to be protected by copyright lawPeople who make enough money from the intellectual property must get copyright protection from the U.S. Copyright Office.This statement is falseThis statement is true find the measure of angle b (imagine below) Your salary is $105,000 per year.6. What is your gross monthly income? Info: Sorry, designs are down the bot was infiltratedFossils in which none of the original living material exists is a ____ fossil. Which set of ordered pairs does not describe a function? how to find a cow write a 4-5 sentence answer 1. Given sin B = 5/13 in QII, and (6.-8) is on the terminal side of a find the exact value ofsin(a + b). Why did ancient Egypt make mummies What is the rhyme scheme in these lines from "Jabberwocky" by Lewis Carroll? 'Twas brillig, and the slithy toves Did gyre and gimble in the wabe: All mimsy were the borogoves, And the mome raths outgrabe. "Beware the Jabberwock, my son! The jaws that bite, the claws that catch! Beware the Jubjub bird, and shun The frumious Bandersnatch!" Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.A group of volunteers build homes for those in need. The group consists of two teenagers, four men, and ten women. To decide who gets to pick the music for the day, the group spins a spinner with eight equal sections: one for the teenagers, two for the men, and five for the women. The probability of the spinner landing on the section assigned to the men is ______ ILL GIVE YOU BRAINLIEST!! Why was the French Revolutions idea of everyone having rights and being equal, a dangerous idea? *15 pointsIt encouraged rebellion in the coloniesIt gave more power to the KingIt created more slaves If y=x+2 then what is the slope and the y intercept? Priya will graph a line with the equation y = 3 4x - 4. She wants to know what the line will look like before she graphs the line. Describe the line Priya will draw, including the quadrants the line will pass through ANSWER ASAP GIVING BRAINLIEST AND OTHER STUFF!Please answer the following with 5 or more sentences:How does the velocity of a moving object depend on the choice of frame of reference? The Alps in Europe are an example of folded mountains. How do folded mountains form? O A. Magma rises to Earth's surface at a plate boundary. O B. Continental plates slip past each other. O O C. A block of crust tilts between two faults. O D. Crust buckles due to pressure of colliding plates.help plz A 12-pound bag weighs more than a 200-ounce bag. True or false For the data set below, which of thefollowing measures is greatest?(2, 2 , 2 , 4 , 6, 8 , 12 ,20) A . MeanB . MedianC . RangeD . Mode Is (4, 3) a solution of the graphed inequality?