Images or graphics have two key qualities which can impact the nature of the overall presentation or document they form part of:
The size of an image or graphics can be in terms of area (measurable in inches or centimeters) or pixels.
In either case, you don't want to have an image so large it takes up all the space on the page with little or no space for text and other items. This can hurt the document.
When documents have images with very large pixels, the overall size (in bytes) of the image becomes very large and sometimes difficult to open, upload, and transfer (subject to the speed or computing power of the computer being used to process it).
One feature of Microsoft Word which helps to optimize images is the Image Compression Tool.
For more about Microsoft Word and images, please see the following link:
Answer:
When images or graphics excessively occupy most of the space on the page.
Explanation:
For example, if you observed the attached image you'll see a bad example in which the image excessively occupies most of the space on the page making the written text difficult to read.
Next, a good example of proper editing is found in the next image, which shows the written text properly aligned with the text.
2. hard drive
3. display screen
4.Wi-Fi adapter
Answer: Display screen
Explanation:
This consumed much energy due to light and brightness
Answer:
Availability Goal
Explanation:
In Information Security, Countermeasures intended to ensure the uninterrupted availability of data and resources for authorized use promote the "Availability Goal".
The Availability goal is one of the the three main goals of Confidentiality, Integrity and Availability espoused within the CIA model of Information Security measures. Redundancy and Fault tolerance are means within the Availability model intended to mitigate against incidents like Denial of service (DoS), Loss of information system and Equipment failures, incidents that could all mean data and resource unavailability.
Answer:
Non repudiation.
Explanation:
Information security is a concept in information technology, whereby access to information, transmission and use of data are controlled for security purposes.
The access control countermeasures are preventive features to prevent access to information systems by attackers.
Non repudiation is an information security access control feature that prevents partners in business from denying emails delivered and signatures.
Answer: Amazon Web Services (AWS)
Explanation:
The home keys for the numeric keypad are 4 5 6
The fingers (Index, middle, and ring), on your right hand should always start on the 4 5 6 keys respectively. These keys are the home row keys for your numeric keypad. Each finger placed is responsible for a column of keys. For example, the middle finger is responsible for all the keys that lie in that column.
Answer:
c. Transforming raw data inputs into new or modified information
Explanation:
When you create a program what you are doing is making something that can take what a person does on say a website and then transform it into something else that can most of the time be clearly understood and defined.
Answer: i think its e. transforming the system design into a working computer system
Explanation:Programming is the process of taking an algorithm and encoding it into a notation, a programming language, so that it can be executed by a computer.