23+ Composition refers to
A the amount of objects in focus
B how a picture is printed
c the placement and relationship of
elements within a picture

Answers

Answer 1

Answer:

c. The placement and relationship of  elements within a picture

Explanation:

Required

What composition means?

Literally, composition means the way the elements of a picture are presented. The elements in this case constitute all lines, shapes, dots, pattern and many more.

You will notice that some of these elements will be placed over one another, some side by side, some far from one another.

So, composition means the way these elements are displayed.

Hence, option (c) is correct.


Related Questions

Write an expression that executes the loop while the user enters a number greater than or equal to 0. Note: These activities may test code with different test values. This activity will perform three tests, with user input of 9, 5, 2, -1, then with user input of 0, -17, then with user input of 0 1 0 -1. See "How to Use zyBooks". Also note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds, and report "Test aborted."

Answers

Answer:

while ( num >= 0) { ... }

Explanation:

Required

Express to execute a while loop with the given condition.

The condition in the question is that: the user input must be greater than or equal to 0.

The statement for this is:

[tex]while[/tex] ( [tex]num[/tex] [tex]>=[/tex] [tex]0[/tex]) { [tex]...[/tex] }

Where num is the input variable

seven and two eighths minus five and one eighth equals?

Answers

Answer: 2.125

Explanation

1.               The smallest unit in a digital system is a​

Answers

Answer:

a bit

Explanation:

<3

Frames control what displays on the Stage, while keyframes help to set up

Answers

Answer: A keyframe is a location on a timeline which marks the beginning or end of a transition. So for example, you have a movie and it transitions to another scene, keyframes tell it when and where to start the transition then when and where to stop the transition.

What is the meaning of negative impact in technology

Answers

Answer:

the use of criminal thought by the name of education

which function would ask excel to average the values contained in cells C5,C6,C7, and C8

Answers

Answer:

=AVERAGE(C5:C8)

Explanation:

The function calculates the average of the values in the cell range C5:C8 - C5, C6, C7, C8.

As a CISO, you are responsible for developing an information security program based on using a supporting framework. Discuss what you see as some major components of an information security program.

Answers

Answer:

The CISO (Chief Information Security Officer) of an organization should understand the following components of an information security program:

1) Every organization needs a well-documented information security policy that will govern the activities of all persons involved with Information Technology.

2) The organization's assets must be classified and controlled with the best industry practices, procedures, and processes put in place to achieve the organization's IT objectives.

3) There should be proper security screening of all persons in the organization, all hardware infrastructure, and software programs for the organization and those brought in by staff.

4) Access to IT infrastructure must be controlled to ensure compliance with laid-down policies.

Explanation:

As the Chief Information Security Officer responsible for the information and data security of my organization, I will work to ensure that awareness is created of current and developing security threats at all times.  I will develop, procure, and install security architecture, including IT and network infrastructure with the best security features.  There will good management of persons' identity and controlled access to IT hardware.  Programs will be implemented to mitigate IT-related risks with due-diligence investigations, and smooth governance policies.

Write an application that inputs a five digit integer (The number must be entered only as ONE input) and separates the number into its individual digits using MOD, and prints the digits separated from one another. Your code will do INPUT VALIDATION and warn the user to enter the correct number of digits and let the user run your code as many times as they want (LOOP). Submit two different versions: Using the Scanner class (file name: ScanP2)

Answers

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 int n, num;

 Scanner input = new Scanner(System.in);

 System.out.print("Number of inputs: ");

 n = input.nextInt();

 LinkedList<Integer> myList = new LinkedList<Integer>();

 for(int i = 0; i<n;i++){

     System.out.print("Input Integer: ");

     num = input.nextInt();

     while (num > 0) {

     myList.push( num % 10 );

     num/=10;

     }

     while (!myList.isEmpty()) {

         System.out.print(myList.pop()+" ");

     }

     System.out.println();

     myList.clear();

 }

}

}

Explanation:

This declares the number of inputs (n) and each input (num) as integer

 int n, num;

 Scanner input = new Scanner(System.in);

Prompt for number of inputs

 System.out.print("Number of inputs: ");   n = input.nextInt();

The program uses linkedlist to store individual digits. This declares the linkedlist

 LinkedList<Integer> myList = new LinkedList<Integer>();

This iterates through n

 for(int i = 0; i<n;i++){

Prompt for input

     System.out.print("Input Integer: ");

This gets input for each iteration

     num = input.nextInt();

This while loop is repeated until the digits are completely split

     while (num > 0) {

This adds each digit to the linked list

     myList.push( num % 10 );

This gets the other digits

     num/=10;

     }

The inner while loop ends here

This iterates through the linked list

     while (!myList.isEmpty()) {

This pops out every element of thelist

         System.out.print(myList.pop()+" ");

     }

Print a new line

     System.out.println();

This clears the stack

     myList.clear();

 }

TP1. लेखा अभिलेखको अर्थ उल्लेख गर्नुहोस् । (State the mea
TP2. लेखाविधिलाई परिभाषित गर्नुहोस् । (Define accounting.
TP 3. लेखाविधिको कुनै तीन महत्वपूर्ण उद्देश्यहरू लेख्नुहोस्
accounting.)​

Answers

Explanation:

TP1. लेखा अभिलेख भनेको ज्ञानको त्यस्तो शाखा हो, जुन व्यवसायको आर्थिक कारोबारहरूलाई नियमित, सु-व्यवस्थित र क्रमबद तरिकाले विभिन्न पुस्तिकाहरूमा अभिलेख गर्ने कार्यसँग सम्बन्धित छ।

what is function of java​

Answers

Explanation:

Java is an object-orinted programming language used for software develpment.

Write a program that estimates how many years, months, weeks, days, and hours have gone by since Jan 1 1970 by calculations with the number of seconds that have passed.

Answers

Answer:

Explanation:

The following code is written in Java. It uses the LocalDate import to get the number of seconds since the epoch (Jan 1, 1970) and then uses the ChronoUnit import class to transform those seconds into years, months, weeks days, and hours. Finally, printing out each value separately to the console. The output of the code can be seen in the attached picture below.

import java.time.LocalDate;

import java.time.temporal.ChronoUnit;

class Brainly {

   public static void main(String[] args) {

       LocalDate now = LocalDate.now();

       LocalDate epoch = LocalDate.ofEpochDay(0);

       System.out.println("Time since Jan 1 1970");

       System.out.println("Years: " + ChronoUnit.YEARS.between(epoch, now));

       System.out.println("Months: " + ChronoUnit.MONTHS.between(epoch, now));

       System.out.println("Weeks: " + ChronoUnit.WEEKS.between(epoch, now));

       System.out.println("Days: " + ChronoUnit.DAYS.between(epoch, now));

       System.out.println("Hours: " + (ChronoUnit.DAYS.between(epoch, now) * 24));    

   }

}

Which of the following statement is False? 1 point Context free language is the subset of context sensitive language Regular language is the subset of context sensitive language Recursively enumerable language is the super set of regular language Context sensitive language is a subset of context free language

Answers

Answer:

Context-sensitive language is a subset of context-free language

Explanation:

Considering the available options, the statement that is considered wrong is "Context-sensitive language is a subset of context-free language."

This is because generally every regular language can be produced through the means of context-free grammar, while context-free language can be produced through the means of context-sensitive grammar, and at the same time, context-sensitive grammars are produced through the means of Recursively innumerable.

Hence, the correct answer in this correct answer to the question is the last option *Context-sensitive language is a subset of context-free langage

Aaron opens a bicycle store. Which of the
following gives the best example of how Aaron
uses the scarce resource of labor?

Answers

Answer: Aaron hired an employee to do bicycle repairs

Explanation:

Labor refers to the physical and mental effort put into production by human beings.

Since Aaron opens a bicycle store, he can hire an employee to do bicycle repairs. Therefore, in this case, labor will be put into productive use for the company.

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?
A) Application Layer.
B) Presentation Layer.
C) Session Layer.
D) Transport Layer.

Answers

Answer:

C) Session Layer.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Basically, each layer has its unique functionality which is responsible for the proper functioning of the communication services.

Session layer is the layer of an Open Systems Interconnection (OSI) model which describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.

Exercise#1: The following formula gives the distance between two points (x1, yı) and (x2, y2) in the Cartesian plane:
[tex] \sqrt{(x2 - x1) ^{2} + (y2 - y1) ^{2} } [/tex]
Given the center and a point on circle, you can use this formula to find the radius of the circle. Write a C++ program that prompts the the user to enter the center and point on the circle. The program should then output the circle's radius, diameters, circumference, and area. Your program must have at least the following methods: findDistance: This mehod takes as its parameters 4 numbers that represent two points in the plane and returns the distance between them. findRadius: This mehod takes as its parameters 4 numbers that represent the center and a point on the circle, calls the method findDistance to find the radius of the circle, and returns the circle's radius. circumference: This mehod takes as its parameter a number that represents the radius of the circle and returns the circle's circumference. area: This mehod takes as as its parameter a number that represents the radius of the circle and returns the circle's area. .​

Answers

Ddgdgdgdfdgdfdgdgdgdgdgdgdgdggdgdgdgdgg

whatis a node (or a device) that connects two different networks together and allows them to communicate.

Answers

Answer:

Router

Explanation:

A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

Hence, a router is a node (or a device) that connects two different networks together and allows them to communicate.

Generally, routers are configured using a standard routing protocol with an IP address as the default gateway.

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway

II. IP address

III. Subnet mask

After a router successfully determines the destination network, the router checks the routing table for the resulting destination network number. If a match is found, the interface associated with the network number receives the packets. Else, the default gateway configured is used. Also, If there is no default gateway, the packet is dropped.

The _____ of the Open Systems Interconnection (OSI) modelspecifies the electrical connections between computers and the transmission medium and is primarily concerned with transmitting binary data, or bits, over a communication network.

Answers

Answer:

"Physical layer" is the correct answer.

Explanation:

It dealt mostly with bit-level transfer across various equipment as well as it provides industrial automation connections to meet quality standards to something like digital downloads.The purpose of this layer would be to consolidate essential networking system compatibility so that information is being sent successfully.

Thus, the above is the correct answer.

Of the following is a principle of total quality management?

A. Continuous defect elimination

B. Continuous process improvement

C. Continuous value enhancement

D. Continuous productivity improvement

Answers

Option b the continuous process improvement

Unlike the collapse of Enron and WorldCom, TJX did not break any laws. It was simply not compliant with stated payment card processing guidelines.
a) true
b) false

Answers

I think the answer is A) true

The statement "Unlike the collapse of Enron and WorldCom, TJX did not break any laws. It was simply not compliant with stated payment card processing guidelines" is definitely true.

What was the cause of the TJX data breach?

The major cause of the TJX data breach was thought to be the hack that wasn't discovered until 2007, hackers had first gained access to the TJX network in 2005 through a WiFi connection at a retail store.

These situations were eventually able to install a sniffer program that could recognize and capture sensitive cardholder data as it was transmitted over the company's networks. They should be required to change the encryption methodology of the data they are using to save the personal identification information of their customers.

Therefore, the statement "Unlike the collapse of Enron and WorldCom, TJX did not break any laws. It was simply not compliant with stated payment card processing guidelines" is definitely true.

To learn more about, TJX data, refer to the link:

https://brainly.com/question/22516325

#SPJ2

Caleb Co. owns a machine that had cost $42,400 with accumulated depreciation of $18,400. Caleb exchanges the machine for a newer model that has a market value of $52,000. 1. Record the exchange assuming Caleb paid $30,000 cash and the exchange has commercial substance. 2. Record the exchange assuming Caleb paid $22,000 cash and the exchange has commercial substance.

Answers

Answer: See explanation

Explanation:

1. Record the exchange assuming Caleb paid $30,000 cash and the exchange has commercial substance.

Dr Machine (new) $52000

Dr Loss on exchange of asset $2000

Dr Accumulated Depreciation $18400

Cr Equipment (Old) $42400

Cr Cash $30000

Nite that loss was calculated as:

= Market value of new machine - (Book value if old machine - Depreciation) - Cash paid

= $52000 - ($42400 - $18400) - $30000

= $52000 - $24000 - $30000

= -$2000

2. Record the exchange assuming Caleb paid $22,000 cash and the exchange has commercial substance

Dr Machine (new) $46000

Dr Accumulated Depreciation $18400

Cr Equipment (Old) $42400

Cr Cash $22000

Note that the value of the new machine was calculated as:

= Original cost + Cash paid - Accumulated Depreciation

= $42000 + $22000 - $18400

= $46000

How do you find the average length of words in a sentence with Python?

Answers

Answer:

split() wordCount = len(words) # start with zero characters ch = 0 for word in words: # add up characters ch += len(word) avg = ch / wordCount if avg == 1: print "In the sentence ", s , ", the average word length is", avg, "letter." else: print "In the sentence ", s , ", the average word length is", avg, "letters.


Create a function void process(char ch, int x, int y)- to accept an arithmetic operator (+,-./, in argum
ch and two integers in arguments x and y. Now on the basis of the operator stored in ch perform the operator
in x and y and print the final result. Also, write a main function to input the two integers and an arithmetit
operator, and by invoking function process() print the output.
Example: Input:
First Integer
Second Integer
: 6
Value of ch
Output: The result of 5 and 7 on * = 24

write in java​

Answers

Answer:

The program is as follows:

import java.util.*;

public class Main{

   public static void process(char ch, int x, int y){

if(ch == '+'){

    System.out.print(x+y);  }

else if(ch == '-'){

    System.out.print(x-y);  }

else if(ch == '*'){

    System.out.print(x*y);  }

else if(ch == '/'){

    if(y!=0){

        double num = x;

        System.out.print(num/y);      }

    else{

        System.out.print("Cannot divide by 0");     } }

else{

    System.out.print("Invalid operator"); }

 }

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 int x, y;

 char ch;

 System.out.print("Enter two integers: ");

 x = input.nextInt(); y = input.nextInt();

 System.out.print("Enter operator: ");

 ch = input.next().charAt(0);  

 process(ch,x, y);

}

}

Explanation:

The function begins here

   public static void process(char ch, int x, int y){

If the character is +, this prints the sum of both integers

if(ch == '+'){

    System.out.print(x+y);  }

If the character is -, this prints the difference of both integers

else if(ch == '-'){

    System.out.print(x-y);  }

If the character is *, this prints the product of both integers

else if(ch == '*'){

    System.out.print(x*y);  }

If the character is /, this prints the division of both integers.

else if(ch == '/'){

    if(y!=0){

        double num = x;

        System.out.print(num/y);      }

    else{

This is executed if the denominator is 0

        System.out.print("Cannot divide by 0");     } }

Invalid operator is printed for every other character

else{

    System.out.print("Invalid operator"); }

}

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This declares both integers

 int x, y;

This declares the operator

 char ch;

Get input for both integers

 System.out.print("Enter two integers: ");

 x = input.nextInt(); y = input.nextInt();

Get input for the operator

 System.out.print("Enter operator: ");

 ch = input.next().charAt(0);  

Call the function

 process(ch,x, y);

}

}

In this module you learned about advanced modularization techniques. You learned about the advantages of modularization and how proper modularization techniques can increase code organization and reuse.
Create the PYTHON program allowing the user to enter a value for one edge of a cube(A box-shaped solid object that has six identical square faces).
Prompt the user for the value. The value should be passed to the 1st and 3rd functions as arguments only.
There should be a function created for each calculation
One function should calculate the surface area of one side of the cube. The value calculated is returned to the calling statement and printed.
One function should calculate the surface area of the whole cube(You will pass the value returned from the previous function to this function) and the calculated value results printed.
One function should calculate the volume of the cube and print the results.
Make a working version of this program in PYTHON.

Answers

Answer:

Following are the code to the given question:

def getSAOneSide(edge):#defining a method that getSAOneSide that takes edge patameter

   return edge * edge#use return to calculate the edge value

def getSA(SA_one_side):#defining a method that getSA that takes SA_one_side patameter

   return 6 * SA_one_side#use return to calculate the SA_one_side value

def volume(edge):#defining a method that volume that takes edge patameter

   return edge * edge * edge#use return to calculate edge value

edge = int(input("Enter the length of edge of the cube:\n"))#defining edge variable that input value

SA_one_side = getSAOneSide(edge)#defining SA_one_side that holds getSAOneSide method value

print("Surface area of one side of the cube:", SA_one_side)

surfaceArea = getSA(SA_one_side)#defining a surfaceArea that holds getSA method value

print("Surface area of the cube:", surfaceArea)#print surfaceArea value

vol = volume(edge)#defining vol variable that holds Volume method value

print("Volume of the cube:", vol)#print vol Value

Output:

Please find the attached file.

Explanation:

In the code three method "getSAOneSide, getSA, and volume" method is declared that takes a variable in its parameters and use a return keyword that calculates and return its value.

In the next step,edge variable is declared that holds value from the user and defines three variable that holds method value and print its value with the message.

Write a program that reads the balance and annual percentage interest rate and displays the interest for the next month. Python not JAVA

Answers

Answer:

Explanation:

The following code is written in Python. It asks the user to enter the current balance and the annual interest rate. It then calculates the monthly interest rate and uses that to detect the interest that will be earned for the next month. Finally, printing that to the screen. A test output can be seen in the attached picture below.

balance = int(input("Enter current Balance: "))

interest = int(input("Enter current annual interest %: "))

interest = (interest / 12) / 100

next_month_interest = balance * interest

print('$ ' + str(next_month_interest))

Any help , and thank you all

Answers

Answer:

There are 28 chocolate-covered peanuts in 1 ounce (oz). Jay bought a 62 oz. jar of chocolate-covered peanuts.

Problem:

audio

How many chocolate-covered peanuts were there in the jar that Jay bought?

Enter your answer in the box.

Explanation:

By comparing the time out mechanism used in TCP to that used in a data link layer protocol, outline why it is necessary for the TCP timeout mechanism to implement an adaptive timeout duration

Answers

Answer:

When there are network flows within the wireless link that experience prolonged poor transmission it can impact on the network, leading to the stalling of the source while waiting for the arrival of ACKS, due to the filling of the TCP source congestion window. More time is lost as the source waits for a timeout to be caused by the expiration of the RTO timer which results in lower efficiency and network throughput by the TCP that requires an adaptive timeout duration to be implemented

Explanation:

How could you use your technology skill and Microsoft Excel to organize, analyze, and compare data to decide if a specific insurance is a good value for the example you gave

Answers

Answer:

The summary of the given question would be summarized throughout the below segment.

Explanation:

"Insurance firms voluntarily assume our charge probability," implies assurance undertakings will compensate including all our devastations throughout respect of products for something we have health coverage and that the vulnerability for both would be equivalent.If somehow the client receives significant losses, the firm must compensate that kind of money as well as, if there are no failures, it can invest earnings or rather an investment.

What does the abbreviation BBC stands for?

Answers

Answer:

British Broadcasting Corporation Microcomputer System

Explanation:

The British Broadcasting Corporation Microcomputer System, or BBC Micro, is a series of microcomputers and associated peripherals designed and built by the Acorn Computer company in the 1980s for the BBC Computer Literacy Project.

Answer:

British Broadcasting Corporation

Explanation:

This is a UK company which provides television and radio news in over 40 languages. This is the computer related meaning, there are other meanings to the abbreviation but they seem irrelevant in this case.

Hope this information was of any help to you. (:

Which of the following statements regarding the SAP Hana product implemented by Under Armour is NOT true?
A. All of the statements are true.
B. The program allows legacy silos to remain intact.
C. The program can run across platforms and devices.
D. The program provides real-time results.

Answers

Answer:A

Explanation:i need points

The imperative programming paradigm is popular and is a part of object-oriented computing paradigm, because it: __________.
A. is based on computer organization and thus is efficient to execute on hardware.
B. matches the culture of doing things by following the step-wise instructions.
C. enforces the modularity and supports the development of large programs.
D. supports class inheritance and code reuse.

Answers

Answer:

B. Matches the culture of doing things by following the step-wise instructions.

Explanation:

Imperative programming paradigm follows a sequence of instructions and steps. The order of execution of the statement is necessary because their is sequence of statements. Operation is system oriented.

In imperative programming, the source code is a series of commands, this commands tell the computer what to do, when to do it and the order it will be done so as to achieve the best result. The code of imperative programming paradigm is quite easy to understand.

Other Questions
When looking at the cell membrane, where are the lipid heads located? this distance-time graph represents a journey made by Jo Laramie Trucking's CEO is considering a change to the company's capital structure, which currently consists of 25% debt and 75% equity. The CFO believes the firm should use more debt, but the CEO is reluctant to increase the debt ratio. The risk-free rate, r RF, is 5.0%, the market risk premium, RP M, is 6.0%, and the firm's tax rate is 40%. Currently, the cost of equity, r s, is 11.5% as determined by the CAPM. What would be the estimated cost of equity if the firm used 60% debt Classify each angle of the degrees How do different careers in the human services relate to one another how do oomycetes feed set up an equation and solve the following Three times a number plus 5 gives 20. what is the number.please give me answer Given the equation Y-4=3/4(x+8) in point-slope form, identify the equation of the same line in standard form According to the video, the Chinese economic model since the 1980s is commonly referred to as _________ with Chinese characteristics. Fill in the blank in the following sentence with the appropriate noun below. Siliencio! va a subir el _________.A. escenario B. decoradoC. telnD. boleto The velocity time graph of a body is given below. Find the distance travelled by the body from A to B. * Find the measure of angle b. Im so glad to be out on a walk oh its a little chillier than I expecvted which literary device is this the best example of Three airlines serve a small town in Ohio. Airline A has 48% of all scheduled flights, airline B has 26% and airline C has the remaining 26%. Their on-time rates are 81%, 61%, and 40%, respectively. A flight just left on-time. What is the probability that it was a flight of airline A? WILL GIVE BRAINLIEST 432x + 4x+7 Why is it useful to factor out the GCF first when factoring? WriSection B: Writing13. Your local radio station is collecting money for endangered animals. You have decided towrite a letter to the station suggesting which species of animal you think should besaved.You will need to think about:a. which animal species you would like to saveb. the reasons why this species should be savedc. how you think the money collected should be used. A large dump truck can move 1,170 tons/h of gravel from one point to another on a work site. What is this rate in lb/s The following data represent the number of loaves of bread, in thousands, which were sold by various grocery stores in the month of June. Construct a dot plot for the given data.4, 8, 11, 10, 10, 4, 5, 13,6, 13, 8, 14, 8, 1, 10, 9Select any value to see the controls for increasing or decreasing the frequency. 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Why was the War Measures Act passed?