Prompt Using complete sentences post a detailed response to the following. Give one example of digital art that you have seen today and where you saw it. Where do you most frequently see digital art? What does it say about our culture?

Answers

Answer 1

Answer:

Digital art forms can be frequently seen in film, television and video games

Explanation:

There are various forms of digital arts such as Fractal/Algorithmic Art, Dynamic Painting, Pixel Art, computer graphics, etc. I have seen computer graphic in a movie today.  

Most of the digital art forms are used as a conceptual drawing in film, television and video games


Related Questions

adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf

Answers

Answer:

this belongs on r/ihadastroke

Explanation:

Answer: ok

Explanation:

what's wrong with this python code i don't know what's wrong with both of them

Answers

Answer:

Keep it in the format

first one:

def swapping_stars():

   line_str = ""

   for line in range(6, 8):

       for char in range(0, 6):

           if line % 2 == char % 2:

               line_str = line_str + "*"

           else:

               line_str = line_str + "-"

           print(str(line_str))

swapping_stars()

second one:

if you want it to go:

23456

def print_numbers(list):

   for i in range(1, len(list)):

       print(str(list[i]))

num_list = [1, 2, 3, 4, 5, 6]

print_numbers(num_list)

if you want it to go

123456

def print_numbers(list):

   doneONE = False

   for i in range(1, len(list)):

       if not doneONE:

           print(str(list[i] - 1))

           doneONE = True

       print(str(list[i]))

num_list = [1, 2, 3, 4, 5, 6]

print_numbers(num_list)

Explanation:

What is the web page path on the web server for the URL:
http://www.mydomain.com/main/index.html?
O http://
O www.mydomain
O main/index.html
O index.html

Answers

Answer:

C: main/index.html

Explanation:

A chain of coffee servers is sending a spreadsheet of projected costs and profits to some of its investors. When, Kyle, the administrator making the spreadsheet, adds an image of his company’s logo, he realizes it would fit and look best if turned to read sideways.

How can Kyle change the image to make it fit in such a way?

He can select the image and hold down on the green handle above it while sliding the mouse.
He can select the image and hold down Control while sliding the scroll bar to the right.
He can press the PivotTable button and select “Rotate 90 degrees” and then click OK.
He can click on the Pictures Tool tab and select press Artistic Effects to access the rotate option

Answers

Answer:

On a spreadsheet application including MS Excel;

He can select the image and hold down the rotation handle above it while sliding the mouse

Explanation:

Manual rotation of a picture or a text box can be performed by selecting the image or text box in MS Word or a spreadsheet application such as MS Excel. With the mouse select the rotation handle of the picture and drag in the direction desired, left or right.

So as to limit the rotation to 15 degrees hold down the shift button while dragging the rotation handle by clicking on it with a mouse and dragging in the desired direction

She goes to look at her
HTML code to see what is wrong line by line until she can figure out what she
messed up. Which process is Ana using?

A. Fragmentation
B. Identification
C. Pinpoint
D. Debugging

Answers

Debugging is the answer

The process is Ana using is Debugging. Check below to see what the term is all about.

What is debugging used for?

Debugging is known to be the act of working on how a given program runs, and also how it creates data so as to be able to defects and know issues in a given code.

Note that since she goes to look at her HTML code to see what is wrong line by line until she can figure out what she messed up, she is engaged in debugging.

Learn more about Debugging from

https://brainly.com/question/163290

#SPJ2

Choose the expression that belongs in the blank in order to have the output shown.

>>> a = 5
>>> print(_____)
The value is5

"The value is " + str(a)

"The value is" , str(a)

"The value is " , str(a)

"The value is" + str(a)

Answers

Answer:

Option B

Explanation:

Given

a = 5

and if the value allotted to variable a is to be printed, the following command will be used

print "The values is", str(a)

Hence, option B is correct

i really want to know the best way to deal as much heart as possible plz tell me

Answers

Answer:

Set aside time every day for doing something that feels positive, whether that’s journaling, meeting up with a close friend, or watching a show that makes you laugh. Scheduling in moments that bring you joy is vital for healing a broken heart. It’s important to talk about your feelings with others and not numb yourself out.

Explanation:

secgcdesxeeeddfsexdddffdf

write examples of hacking in internet?​

Answers

Answer:

Although hacking is very bad, it can be found everywhere and anywhere.

Examples: Phishing, password checking, and keyloggers

Explanation:

Explanation:

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

Fatima has 3 packs of batteries. Each pack contains 4 batteries. She gives her brother 8 batteries to put in his toy robot. Let b represent the number of batteries Fatima has left. Which equation could be used to find the value of b?

Answers

Answer: See explanation

Explanation:

Let b represent the number of batteries Fatima has left.

The equation that can be used to find the value of b goes thus:

(3 × 4) = b + 8

12 = b + 8

b = 12 - 8

Therefore, based on the above equation, the number of batteries that Fatima has left will be 4.

What are good components to preorder a PC with that are cheep? It would be my first PC by the way.

Answers

Answer:

Good Components

.CPU AMD Threadripper 3960X Amazon

.CPU cooler NZXT Kraken X63 (280mm AIO liquid cooler) Overclockers

.GPU Zotac Gaming GeForce GTX 1660 6GB CCLonline

.Memory 32GB Corsair Dominator Platinum RGB 3200MHz Scan

Explanation:

Would you want a prebuilt? I know a very good prebuilt and custom build company called NZXT. They have very good parts and very good ratings. I know prebuilts are shamed on, but I promise you, one of the NZXT prebuilts are great.

HELPPPP KOKICHI IS OUT TO KILL ME

Answers

Oh my- good luck with that-

Answer:

rest in piece :(

Explanation:

What is HTML? (list down any 5 points)

Answers

Answer:

The HyperText Markup Language, or HTML is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets and scripting languages such as JavaScript.HyperText Markup Language (HTML) is the set of markup symbols or codes inserted into a file intended for display on the Internet. The markup tells web browsers how to display a web page's words and images.

Explanation:

If this doesn't answer your question tell me and i'll fix it.

who ever can get me the lyrics to raining tacos will get 46 points + the crown! i want the song!

Answers

Explanation:

Lyrics

It's raining tacos

From out of the sky

Tacos

No need to ask why

Just open your mouth and close your eyes

It's raining tacos

It's raining tacos

Out in the street

Tacos

All you can eat

Lettuce and shells

Cheese and meat

It's raining tacos

Yum, yum, yum, yum, yumidy yum

It's like a dream

Yum, yum, yum, yum, yumidy yum

Bring your sour cream

Shell

Meat

Lettuce

Cheese

Shell

Meat

Lettuce

Cheese

Shell

Meat

Cheese, cheese, cheese, cheese, cheese

It's raining tacos

Raining tacos

Raining tacos

It's raining tacos

It's raining tacos

Raining tacos

Raining tacos

Shells, meat, lettuce, cheese

It's raining tacos

It's raining tacos

Answer:

Explanation:

is that even a real song??

btw i answered so the other guy can get brainlest annnnnnd bc i want the point LOL

45 points

Multiple Choice: Choose the answer that best fits each statement below.

______ 5. Which of the following can be found by clicking the AutoSum drop‐down?
a. Average
b. Min
c. Sum
d. All of the above

______ 6. Which option is used to prevent a cell reference from changing when a formula is copied to
another location?
a. Named ranges
b. Absolute cell reference

______ 7. An advantage to defining range names is:
a. Selections can be larger
b. Selections can be any format
c. Name ranges are easy to remember
d. Name ranges clear cell contents

True/False: Answer True or False for each statement below.
______ 8. You can only increase or decrease the decimal places by two.
______ 9. The comma style allows you to format with a thousands separator.
______ 10. Excel does not allow you to copy and paste formulas with AutoFill.

Answers

Answer:

5 its either a or b and 6 is b 7 is d  and 8 t 9 f 10 f

Explanat ion:

How do we know if we can believe the things on the internet?

Answers

Answer:

you have to check for reliability

Explanation:

Answer:

you can't always believe the internet some stuff is false are bended

Explanation:

yea

write HTML code to create a web page which will contain a title my favourite book as a centralised heading feluda somogro and body will contain the name of the author satyajit ray ​

Answers

Answer:

Satyajit Ray (1921–1992), a Bengali film director from India, is well known for his contributions to Bengali literature. He created two of the most famous characters in Feluda the sleuth, and Professor Shonku the scientist. He wrote several short novels and stories in addition to those based on these two characters. His fiction was targeted mainly at younger readers (mostly teenagers) , though it became popular among children and adults alike.

Ray during recording of his film Pather Panchali

Most of his novels and stories in Bengali have been published by Ananda Publishers, Kolkata; and most of his screenplays have been published in Bengali in the literary journal Ekshan, edited by his close friend Nirmalya Acharya. During the mid-1990s, Ray's film essays and an anthology of short stories were also published in the West. Many of the stories have been translated into English and published.

You have created a group policy that prevents users in the accounting department from accessing records in a database that has confidential information. The group policy is configured to disable the search function for all users in the Accounting OU no matter which workstation is being used. After you configure and test the policy, you learn that several people in the Accounting OU have valid reasons for using the search function. These users are part of a security group named Managers. What can you do to prevent the Group Policy object (GPO) that you have configured from applying to members of the Managers group

Answers

Answer: Add the Managers group to the GPO's discretionary access control list (DACL).

Deny the apply Group Policy and read permissions to the Managers group.

Explanation:

To prevent the Group Policy object (GPO) which had been configured from applying to the members of the Managers group, the Managers group should be added to the GPO's discretionary access control list (DACL).

Likewise, the apply Group Policy can be denied and read permissions to the Managers group. This will further help in the prevention of users.

What would you classify anti-malware software as?


SaaS

enterprising

cloud

security

Answers

Answer:

enterpriseing is the answer

select all the correct answers
which two programming languages are most commonly used to write web based software programs?
1. Python
2. C
3. PHP
3. Ada

Answers

Answer:

PythonPHP

Explanation:

Plato Correct!

The two programming languages most commonly used to create software for websites are Python and PHP.

We have,

Python is known for being easy to understand and read, which makes it popular for building web applications.

It has tools and frameworks that help developers create websites quickly.

PHP is a language specifically designed for web development.

It is used to write code that runs on the server and helps create interactive websites.

Many popular websites and content management systems, like WordPress, are built with PHP.

While the C language can also be used for web development, it is not as commonly used as Python and PHP in this context.

Ada is a programming language mainly used in specialized industries like aerospace and defense.

It is not commonly used for creating websites.

Thus,

The two programming languages most commonly used to create software for websites are Python and PHP.

Learn more about programming languages here:

https://brainly.com/question/23959041

#SPJ4

(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?

Answers

Answer:

a trade mark is something where someone owns the rights to something in a specific country

Need the answer ASAP!!!!

Select the correct answer.
Which software development team member would make the most use of the tool, Load Runner?
O A.
software engineer
OB.
programmer
OC.
business analyst
OD.
tester

Answers

Answer:

software engineer is the answer

Which of the following images illustrates safe driving?

Answers

Answer:

bottom left

Explanation:

Answer:

keep your eyes on the road!!!!

Stages of reverse engineering

Answers

Answer:

Capture Data, Refine the Model, and then Manufacture it.

Explanation:

HELPPP ME PLEASEEE!!

Answers

It’s the last one! The key to an effective persuasion is to know what you want and be clear about your response.

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? a. Use mail merge for steps 1 and 2 and a word processor for step 3. b. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. c. Use a word processor for steps 1 and 2 and a graphics software for step 3. d. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

Answers

Answer:

1: Word Processor

2: Graphics Software

3: Mail Merge

Explanation:

Given

1. Create a list of invitees

2. Design an invitation card

3. Personalize the card

Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.

So task 1 requires a word processor

An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.

So task 1 requires a graphics software

Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.

Select the correct answer from each drop-down menu.
Complete the following sentences.

_________ effort is an important and necessary factor for the success of any project. In software development projects,
_______team members carry out several tasks to ensure the quality of the process and the final product.

Options for the first box are: managers, A teams, an individuals

Options for the second box are:internal, specific, external

Answers

Answer:

First, A teams, Second ,Specific

Explanation:

Identify the characteristics of syntax errors. Choose all that apply.
programmer did not follow the program language conventions
may be highlighted while writing the program
can be caused by mistyping or misspelling while writing the program
does not cause an error message

Answers

Answer:

Explanation:

Identify the characteristics of syntax errors. Choose all that apply.

programmer did not follow the program language conventions

may be highlighted while writing the program

can be caused by mistyping or misspelling while writing the program

Answer:

Its A B C i got it right

Explanation:

Complete the sentence.
You might create algorithms and flowcharts during the ______ phase of software development.

Release

Planning

Design

Coding

Answers

You might create algorithms and flowcharts during the Design phase of software development.

What is the algorithms  about?

In software development, the Design phase is a crucial step in which the developers plan and determine how the software will be built. This involves breaking down the requirements and specifications into smaller, manageable components and then figuring out how these components will work together.

Therefore, to accomplish this, developers often create diagrams, such as flowcharts or algorithms, to help visualize the software's logic and structure. These diagrams can then be used to guide the development of the software, ensuring that all parts of the project are aligned and working towards the same goals.

Learn more about algorithms from

https://brainly.com/question/20543449

#SPJ1

the advantages and disadvantages of internet​

Answers

Advantages : a lot of useful information from all around the world
Disadvantage:, cyberbullying, stalking, hacking

You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is getting a discount, which is determined by the age of the youngest person in the group. You need to create a program that takes the ages of all 5 people as input and outputs the total price of the tickets. Sample input: 55 28 15 38 63 sample output: 42.5 the youngest age is 15, so the group gets a 15% discount from the total price, which is $50 - 15% = $42.5

Answers

Answer:

Explanation:

The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int[] person = new int[5];

       System.out.println("Enter age of individual 1: ");

       person[0] = in.nextInt();

       System.out.println("Enter age of individual 2: ");

       person[1] = in.nextInt();

       System.out.println("Enter age of individual 3: ");

       person[2] = in.nextInt();

       System.out.println("Enter age of individual 4: ");

       person[3] = in.nextInt();

       System.out.println("Enter age of individual 5: ");

       person[4] = in.nextInt();

       int youngest = person[0];

       for (int x = 0; x < person.length; x++) {

           if (person[x] < youngest) {

               youngest = person[x];

           }

       }

       double discount = 1 - (((double)youngest) / 100);

       double output = 50 * discount;

       System.out.println("Total Price: " + output + " the youngest is " + youngest);

   }

}

Other Questions
Solve n/6=14/42 for the unknown quantity, n When tossing a 6-sided die, the probability of tossing a multiple of 3 is 1/3. If you toss the die 70 times, about how many times would you expect to toss a multiple of 3? The diameter of a circle is 6 in. Find its area to the nearest tenth. Selected information from Jacklyn Hyde Corporation's accounting records and financial statements for 2021 is as follows ($ in millions): Cash paid to retire notes $ 94 Common shares acquired for treasury 154 Proceeds from issuance of preferred stock 218 Proceeds from issuance of subordinated bonds 274 Cash dividends paid on preferred stock 77 Cash interest paid to bondholders 107 In its statement of cash flows, Jacklyn Hyde should report net cash inflows from financing activities of: Multiple Choice $325 million. $167 million. $218 million. $64 million. Based on the image of the rock layers and fossils, what two things can you conclude? A. Fossil D is the same age as Layer 2.B. Fossil A is the oldest of the four fossils. C. Fossils B and C are younger than fossil D. Fossils B and C are near the same age. please answer thissssssssssssssssssssssss What is the volume of a sphere with a radius of 10 inches? Round to the nearest hundredth.What is the volume of a sphere with a radius of 7 feet? Round to the nearest hundredth.6What is the volume of the sphere with a diameter of 18 centimeters? Round to the nearesthundredth Triangle A (1, 1), B (4, 4), C (6, 2) is a: Group of answer choicesIsosceles triangle Right triangle Acute triangle None of the other answers are correct Equilateral triangle A bag of marbles contains 4 redmarbles, 5 green marbles, and 3blue marbles. Karen takes a marble out, replaces itand pulls out another marble,what is the probability both marbles are red? Please help!!find the value of the trig ratio. Let us check your knowledge with the previous lesson hazard and risk.Direction: Read the statement properly and write the correct type of hazard in the space provided.1. Burn out, fatigue and verbal abuse from dissatisfied clients are result from being exposed to ______________ hazard.2. Caregivers who are sensitive to solutions may cause skin irritation, illness or breathing problems because of ________________ hazard.3. _____________________is the common occurrence in the workplace. It may result to bone dislocation, bruises or fracture.4. Exposure to blood or bodily fluids when changing diapers, performing first aid is _____________________hazard.5. _____________________ occur when a caregivers body position and working conditions put pressure on his/her body Andrea has had a savings account for ten years. She noticed over the last two years that the interest rates on her savings account went up in the first year and down in the second year. Which of the following budget scenarios BEST explains this transition?A.a budget surplus two years in a rowB.first a balanced budget, then a deficitC.first a balanced budget, then a budget surplusD.first an unbalanced budget, then a balanced budget - 13.4h + 4.2hIts the last one pls help The table shows the relationship between the number of cups and total volume of lemonade served. Cups of Total. Volume Lemonade Served 2 (ounces) 3 16 4 24 32 How many ounces is served per cup of lemonade? Enter the answer in the box. ounces per cup= If m= 8, how many solutions are there for the expression m-8? "My parents have always blanketed me with conversation."Is this a simile or a metaphor?Group of answer choicesMetaphorSimileNo answer text provided.No answer text provided Need help ASAP plz !!!!! The Langs family drove 225 miles to a beach. Most of their travel was on interstate highways. The Langs drive 65 miles per hour on the last 45 miles of their trip. On average, the Langs traveled 20 miles on one gallon of gas. The gas tank on the Langs' car holds 15 gallons of gas. The Langs had a full tank when their trip began. How many times did they stop to refill the tank before they reach the beach ANSWER ASAP! WILL MARK BRAINLIEST! Select all the correct answers.Which two tables represent the same function?|4|86|7|4|56|4|2|88|5x|y2|106|14x|y2|98|6 please help (no links or you are reported)