why do we need the system requirements for Adobe photoshop?

Answers

Answer 1
I’m sorry and I do not know I just need credits thank have a nice day

Related Questions

in what domain electrica energy is the most use

Answers

Answer:the main signal bearing entities are voltage and their current in circuit environments.

Explanation:

Protected members of a base class are like ________, but they may be accessed by derived classes. a. constructor functions.b. static members.c. private members.d. public members e. none of these.

Answers

Answer:

C). private members

Explanation:

These are options

a. constructor functions

b. static members

c. private members

d. public members

Protected members can be regarded as member that accessibility of them from outside the class is zero, they can only get accessibility from derived classes, though this is not applicable to private class. It should be noted that Protected members of a base class are like private but they may be accessed by derived classes.

Explain the three schemes via which the binding of instructions and data to memory addresses can be done. In each scheme, how the logical address can be converted to physical address?

Answers

Answer:

Compile time

Load time

Execution time

Explanation:

The binding of instructions can be done in three steps, which are:

Compile time

Load time

Execution time

• Compile time In compile time, absolute code is usually generated when the compile time where the process resides in the memory is known

• Load time - in contrary to compile time, if it is not known at compile time where the process will reside in memory, then the compiler has to generate a relocatable code. In this scenario, the final binding is usually delayed until load time.

• Execution time - if the process is able to be moved during its execution from a particular memory segment to another segment, then binding is delayed until run time.

Derek has to create a technical design of a complex floor plan using CAD. What will be most helpful for Derek to use to create the design?
OA layers
OB. scale
O c. units
OD. file formats

Answers

Answer: A: Layers

Explanation: It is correct on PLATO

Kristen wants to view the records of her database in ascending order. What should she do?
OA. Index the report
OB. Create a table
OC. Sort the table
OD. Create a report

Answers

the answer is Sort the table

The answer is OC. Sort the table

Corey set up his presentation for delivery to his team.

Answers

Answer:

If Corey wants to control the pacing of his presentation, he should adjust his playback settings. In the playback settings, he should select the default setting under "type;" this will allow him to change slides anytime. He should also click the check box under "options" that says "Change slides manually" so he can simply click on the slide whenever he is ready to move on to another slide.

Explanation:

If you don't like that answer, here's another one:

Corey knew he would need a lot of time to explain each point and that his team members would have lots of comments and questions. The best way that Corey should set up his slide show would be to make sure that he has an outline. Also, there should only be one thought per slide (never mix it). It has to be taken into account that he should have fewer words and more images/graphs.

To create an SSL connection, a Web server requires a ________, which is an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company.

a. DSL Degree
b. SSL Degree
c. SSL Certificate
d. DSL Certificate

Answers

Answer:

c. SSL Certificate

Explanation:

The full form of SSL is Secure Sockets Layer. It is the standard security technology which establishes the encrypted link between a client and the server—typically a web server (which is the website) and the browser, or the mail server along with a mail client (for e.g., Outlook).

In the context, in order to develop an SSL connection, an SSL Certificate is required by the Web server.

What is output? Select all that apply.
C = 0
while (c 10):
C = c + 5
print (c)

Answers

Answer:

The answer is:

5

10

Explanation:

In the while loop, we specify, if C is not equal to 10, C += 5 and print(c). When python reads the loop, python will check to see if C is equal to 10 and if not it will add 5 until C is more than or equal to 10. In addition, python will print(c) to the console until it hits 10. Once C is less than or equal to 10 the loop will stop. In this scenario, since we print c in the loop, the codes output will be the following:

5

10

hope this helps :D

The array elements are always stored in__________memory locations. Write the word consecutive or random in the blank appropriately.

Answers

Answer:

contiguous.

Explanation:

An array can be defined as a set of memory locations (data structure) that comprises of a group of elements with each memory location sharing the same name. Therefore, the elements contained in array are all of the same data type e.g strings or integers.

Basically, in computer programming, arrays are typically used by software developers to organize data, in order to search or sort them.

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements.

Binary search applies the principles of divide and conquer.

In order to do a binary search on an array, the array must first be sorted in an ascending order.

The array elements are always stored in contiguous memory locations.

It should be be noted that the array elements are always stored in contiguous memory locations.

According to the question, we are to discuss the array elements and how they are been always stored  .

As a result if this we can see that array elements are always stored in contiguous memory locations so as to enable the retrieval of the information.

Therefore, array elements are always stored in contiguous memory locations.

Learn More about array elements at;

https://brainly.com/question/3735128

What is the size of an iPad Air 2 when rotated

Answers

size of ipad air 2 is 360degree

I believe it’s 360 like the person above me said

True or False:

You can convert your PowerPoint presentation in web pages.

Answers

Answer:

true

Explanation:

True because a powerpoint can be opened online ( on a webpage) as well

which of the following reflects the order of operations

Answers

Answer: PEMDAS

Parenthesis, Exponents, Multiplication, Division, Addition, Subtraction

Explanation:

pemdas .. parentheses , exponents , multiply , divide , add , subtract.. DO THAT IN ORDER

Which Tab contains the paragraph attributes?

A. Home
B. Insert
C. Review
D. View

PLs help
Award: 15pts

Answers

Answer:

Insert

Explanation:

The replacement policy that can be implemented in practice and performs the best among the replacement policies that can be actually coded is:

Answers

Answer:

The answer is "Least recently used policy".

Explanation:

It is the page replacement policy, which uses a less frequent substitute.  It adds a registry from each frame that includes the last time the program, that views within the frame, and use a "logical clock" for each of the data references, that made to change by a tick.

This replacement strategy is often used to substitute its least currently utilized cache line or page, and it is realistic and best implemented among the substitution policies.

The file includes 4993 tweets including the keyword 'election'. Each tweet is represented in a separate line. Write a program to open the file and read through its lines, then only if a tweet includes a hashtag (a term beginning by the

Answers

Answer:

import re

with open("../../Downloads/Tweets.txt","r", encoding="utf-8") as tweets:

   myfile = tweets.readlines()

   for item in myfile:

       item = item.rstrip()

       mylist = re.findall("^RT (.*) ", item)

       if len(mylist) !=0:

           for line in mylist:

               if line.count("#") >=1:

                   ln = line.split("#")

                   dm = ln[1]

                   print(f"#{dm}")

Explanation:

The python source code filters the document file "Tweets" to return all tweets with a hashtag flag, discarding the rest.

Program that take 3 number and display them in ascending order c++

Answers

Answer:

#include <iostream>     // std::cout

#include <algorithm>    // std::sort

#include <vector>       // std::vector

using namespace std;

int main()

{

   vector<int> myvector{ 8, 1, 3 };

   std::sort(myvector.begin(), myvector.end());

   for (int x : myvector)

       cout << x << " ";

}

Explanation:

Use STL libraries where you can to keep your code robust!

Why do people create web pages?

Answers

Answer:

To grab peoples attention

Explanation:

Answer:

People create web pages to share their passion for whatever they do. People create them to sell buisness products too.

Explanation:

I hoped this helped.

Do you think the divide will fade in time. Write your opinion.

Answers

Hello. Your question is incomplete and without context, which makes it impossible for it to be satisfactory and satisfactory. However, I will try to help you in the best possible way.

For you to have an opinion on whether the division may disappear over time, you must analyze the composition of that division and how it was created, based on this analysis, you can reflect on whether the composition of the division in the environment in which it is located is likely to be temporary, or if it is impossible to determine the period of time for which it will remain active.

How many RTTs does it take until the sender's congestion window reaches 2M bytes? Recall that the congestion window is initialized to the size of a single segment, and assume that the slow-start threshold is initialized to a value higher than the receiver’s advertised window.

Answers

The question is incomplete, Below is the complete question.

Suppose that you are using an extended version of TCP that allows window sizes much larger than 64K bytes.1 Suppose you are using it over a 1Gbps link with a round-trip time (RTT) of 200ms to transfer 16M-byte file, and the TCP receiver's advertised window is 2M bytes. If TCP sends 1K-byte segments, and assuming no congestion and no lost segments:

(a) How many RTTs does it take until the sender's congestion window reaches 2M bytes? Recall that the congestion window is initialized to the size of a single segment, and assume that the slow-start threshold is initialized to a value higher than the receiver’s advertised window.

(b) How many RTTs does it take to send the file?

(c) If the time to send the file is given by the number of required RTTs times the RTT value, what is the effective throughput for the transfer? What percentage of the link capacity is utilized?

Answer/Explanation:

(A)

When;

RTT0 = 1KB

RTT2 = 4KB

RTT1 = 2 KB

RTT3 = 8KB

RTTn = 2nKB.......

We need n = 11 to have 2 MB = 211.

With that, the window size will become 2MB after 11 RTTs.

(B)

By the 11th RTT 2MB have been transmitted and the window is 2MB, then, by the end of the 12th RTT,2MB have been transmitted and the window is now 2MB. Similarly during the next 3 RTTs, another 2MB will be transmitted, 4MB and another 2MB, thus 15 RTTs is needed to transmit the entire file.

c) Effective throughput for the transfer is the file size over the needed time i.e,

= 8 * 16Mb / (15 * 200 * 10-3)

which is;

= 144 / 3000 * 10-3

Then;

= 144 * 103 / 3000

And;

= 48 Mbps(Megabit per second)

Bandwidth Utilization = effective throughput / Available link speed

= 48 / 1024

= 0.0468

= 4.68 %

MB = MegaBytes

while

Mb = Megabits

Which of the following features can be found on the LMS home page?
(Select all that apply.)
A. Log in to the LMS
B. Review the FTI calendar
C. Acces the FAQs
D. Watch videos
E. Follow FTI social media

Answers

A b c d e so yes it need 20 words for this lol

The binary constraint must cover indicates that ________.
A)a specific binary relationship must be included in a ternary relationship
B)a binary relationship includes a set of value combinations that must all occur in a ternary relationship
C)a table includes values that must occur in a binary relationship
D)a table includes values that must occur in a ternary relationship

Answers

Answer:

B

Explanation:

binary relationship includes a set of value combinations that must all occur in a ternary relationship

Which button in the Sort & Filter gallery of the Data tab would alphabetize from A to Z quickly?

Answers

Answer:

the answer is B (AZ down arrow)

Explanation:

Do you think the divide will fade in time? Write your opinion

Answers

Answer:

The answer is "true".

Explanation:

When ICTs are becoming more daunting and easier, that violation may eventually subside. However many people have reasons to believe that even in fact the racial literacy will persist, and even grow.  

It is constantly shrinking by 5% every year in terms of raw figures, and increasing estimates show that just by 2028 100% of the world's population will have access to the internet.

Which of these is NOT a benefit of being connected 24/7?
A. You can find information using search engines.
B. You can use weather apps to help plan outdoor activities.
C. You can feel like you have to respond to a message right away, even if you don’t want to.
D. You can use music apps to create, share, and listen to playlists.

Answers

Answer:

c

Explanation:

answering messages is a more of a choice than a benifit.

PLEASE HELP ASAP! BRAINLIEST TO BEST ANSWER!
Use the drop-down menus to set a password to encrypt a presentation.


1. Save a backup copy of the original file.


2. Go into the (A. Home tab, B. Trust canter, C. Backstage view) in the File tab, and select ( A. Check for issues, B. Protect presentation, C. Presentation permissions)

3. Type in a password. Then, (A. Reenter, B. Strengthen) the password, and save the new file.

4. Keep the password in a safe place.

Answers

Answer:

1. Save a backup copy of the original file.

2. Go into the  ✔ Backstage view  in the File tab, and select  ✔ Protect Presentation .

3. Type in a password. Then,  ✔ reenter  the password, and save the new file.

4. Keep the password in a safe place.

Explanation:

The password to a presentation for encryption is added from the backstage view of the file tab with to protect prestation option.

Why to encrypt a presentation?

The encryption to a presentation is given as the setting of password to open it in order to protect the data, and enhance the security of it.

The encryption to the presentation is performed with the following steps:

A backup copy of the original question is saved.In the backstage view of the file tab, protect presentation option is selectedThe password is typed, and then reentered to save the new file.The password is kept at the safe location.

Learn more about presentation, here:

https://brainly.com/question/14621266

#SPJ2

Can someone please help me?m

Answers

Answer:

(_(

Explanation:

ANIMATION QUESTION

In the you tube animation "The Heavy Is Ded" the Heavy is supposedly "Ded" but throughout the video, he clearly isn't ded, can anyone explain how on earth this is possible, because this should be impossible since the Heavy is ded

Answers

Answer:

I think my old acc got deleted again..........

Explanation:

I love u here is a meme

the celestial sphere is divided into
1. 88 different areas that identify, name, and plot the celestial objects.
2. 44 different areas that identify, name, and plot the celestial objects.
3. 22 different areas that identify, name, and plot the celestial objects.
4. constellations, such as Orion, Rigel, and Sirius

Answers

Answer:

A.

Explanation:

The answer is 1. or A.

Jacob has a text file open, and he is typing on the keyboard. What is the best description of how the
changes are being implemented?
O The original file is temporarily changed; the changes become permanent when he clicks "save."
O The new version is kept in a special virtual space; the file is only changed when he clicks "save."
O The information is stored on the clipboard.
O A copy is created with a new filename, which will overwrite the old one when he clicks "save."

Answers

Answer:

The new version is kept in a special virtual space; the file is only changed when he clicks “save.”

Explanation:

I took the test and got it correct.

The best description of how the changes are being implemented is the new version is kept in a special virtual space; the file is only changed when he clicks "save." The correct option is b.

What is a keyboard?

Using a keyboard, you can input letters, words, and numbers into your computer. When you type, you press each key on the keyboard separately.

On the right side of the keyboard, you can also find the number keys that run across the top of the keyboard. The principal use of a keyboard is as an input device.

A person can type a document, use keystroke shortcuts, access menus, play games, and complete a number of other tasks with a keyboard.

Therefore, the correct option is b, The new version is kept in a special virtual space; the file is only changed when he clicks "save."

To learn more about keyboards, refer to the below link:

https://brainly.com/question/24921064

#SPJ2

this is my pc it had glowing rams but we changed them​

Answers

Answer:

nice how many fps

Explanation:

wow very nice I love it I think it looks great
Other Questions
When you finish your budget, you should have:A: money left overB: more bills to pay c: a zero balance D: All of the choices help asapHow does the scientist know that the substance goes through a change of state during the time period labeled B on the graph?a.the temperature remains the sameb.the temperature increases gradually c.the particles start slowing downd.the particles start moving faster Insomnia is a synonym for Sleepy. * True or False help me plz should we changed or abolish the electoral college or leave it alone? pros and cons of why ? Match each system of equations to its graph.y = 2x + 1y = x + 2y = 3xy = x + 3y = 2x 2y = x 2y = 2x + 3y = x + 5y = 4x + 2y = 3x + 2 Which is a marketing influence on consumer demand?A. communicationB. advertisingC. recessionD. transportation Which is the best way for a craftsperson to advance in his or her career? A. develop a reputation for skilled work B. open a shop C. combine formal art with crafts Daniela has a container full of marbles. She gives away some of her marbles every day for five days. Each day, she has 1/4 the number of marbles she had a previous day. What fraction of the original number of marbles does Daniela have left after five days? Somebody help this assignment is due tonight for a grade A girl's feet are negative 2 over 4 yards from the surface of a pool. A boy's feet are negative 3 over 4 yards from the surface of the pool. Determine whose feet are closer to the surface. pls help asap The Italian term for a loud volume level is: A. subito. B. mezzo forte. . O c. piano D. forte. ANSWER CORRECTLY AND FIRST AND YOU WILL GET BRAINIEST:What is this flag and state the year this flag was made: Which statement best describes the Mughals who once lived in India?In the 1700s, the Mughals were Hindu rulers who opposed trade with Britain and other European nations.In the 1700s, the Mughals were Muslim rulers who allowed the East India Company to establish trading posts.In the 1800s, the Mughals were Indian nationalists who fought for freedom from British rule.In the 1800s, the Mughals were Indian loyalists who supported British rule and fought on behalf of the viceroy. PLEASE HELP ASAP!!!! WILL MARK BRAINILEST!!I need 3 questions to be answered if that's alright!!Question 1On the time lines you interpreted, what do the solid lines indicate.They indicate events that occurred within two years.They indicate events that occurred within a single year.They indicate events that occurred within five year.They indicate events that occurred within a centuryQuestion 2 On the time lines you interpreted, what do the broken lines indicate?They indicate events that occurred over multiple centuries.They indicate events that occurred over 20 years.They indicate events that occurred over multiple years.Question 3 On the second time line you interpreted, what does the yellow highlight indicate?It indicates the era of Arabic colonial control.It indicates the era of French colonial control.It indicates the era of Spanish colonial control.It indicates the era of English colonial control. determine the range of the following graph Question:What is the relationship between pressure, temperature and the state of matter?As you increase pressure,temperature...And what happens to the state of matter plz help HWplz help HWplz help HW What is 376 times 3 plus 2???? Extremely Need Help Please). I need help writing a report on the Silk Road: Make a list of topics that interest you. Topics can include cities, people, geographical features, trade goods, and ideas and innovations). You will choose a Topic and write a report on the Silk Road. It's time to learn more about one particular aspect of this famous trading route. 1) Introduction--- explain what the report is about---- identify the topic. ( 1 paragraph). Body--- present information about the topic. (2 paragraphs). Conclusion--- a simple summary highlighting major outcomes, significance, or relevance to today. ( 1 paragraph). [ If you write anything that doesnt contain to the instructions you will be Reported). Only answer if you are 100% sure. Will Mark Brainliest to whomever actually truly helps answer this. Need two responses. The value of y varies directly with x, when y = 5 and x = 6. What is the equation for this relationship? What is the value of y when x = 42?