Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. she wants to use a stationary print medium that commuters can see from a distance. which print medium should felicity choose?

Answers

Answer 1

It can be print medium to be determined by the felicity should be Billboard. Therefore, option (D) stands correct.

What is billboard?

Billboard exists an American music and entertainment magazine published weekly by Penske Media Corp. The magazine furnishes music charts, news, video, opinion, reviews, circumstances, and styles connected to the music industry.

Billboard exists a hoarding and huge outdoor advertisement board That can be visited by many people. To be seen by most automobiles and pedestrians, billboards stand frequently erected in busy areas like highways and urban areas.

Many companies publish their brands and products on the billboard for extending brand awareness and spreading the word about their company to as many individuals can know about the product.

According to the above scenario, Felicity can capture the awareness of the regular subway commuters in her area via billboard advertisement. From a distance, commuters can notice the advertisement.

Therefore, it can be print medium to be determined by the felicity should be Billboard. Therefore, option (D) stands correct.

The complete question is,

Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. She wants to use a stationary print medium that commuters can see from a distance. Which print medium should Felicity choose?

(Correct answer only)

A. magazine

B. newspaper

C. flier

D. billboard

E. brochure

To learn more about billboard refer to:

https://brainly.com/question/3391907

#SPJ4


Related Questions

Anna is making a presentation on the top five most visited cities in her state. she wants to make sure that she does not put in too much information and slides on one city, and too little on another. which type of view in a presentation program will enable her to see the text of all the slides in the presentation? anna should use view to see the titles and text of all slides in the presentation.

Answers

Answer:

yea she should

Explanation:

Kevin, a manager at FitPlus fitness club, owns a website that updates information regarding his fitness club. He created background gradients by tiling gradient images across a page or element. Now, he wishes to modify these and add gradients supported by Cascading Style Sheet (CSS). Kevin would like to apply a gradient that transitions from blue for the top portion of the page to white for the bottom portion of the page. Which function should be use? a) background: linear-gradient(blue, white) b) background:linear-gradient(bottom white, top blue): c) background:linear-gradient(white, blue): d) background:linear-gradientito top blue, to bottom white):

Answers

Answer:

Background: linear-gradient (blue, white)

An attacker used an illegal access point (ap) with a very strong signal near a wireless network. if the attacker performed a jamming attack, which of?

Answers

If the attacker performed a jamming attack, the answer choice that would prevent this type of network disruption are:

* Locate the offending radio source and disable it.* Boost the signal of the legitimate equipment.

What is a Network Intrusion?

This refers to the activities of an external or internal hack to disrupt the network flow of a system.

Hence, we can see that if an attacker used an illegal access point (ap) with a very strong signal near a wireless network, in order to disrupt this type of network intrusion, you would have to:

* Locate the offending radio source and disable it.* Boost the signal of the legitimate equipment

Read more about network intrusion here:

https://brainly.com/question/26199042

#SPJ1

Brendan is examining a report using the design view. which section in the design view is going to appear only once on the first page and could contain logos and title information? page header page footer report header report footer

Answers

Answer:

report header

Explanation:

,,,,,,,,,,,

If html is used to specify the content of the webpage, then what do you use css for?

Answers

If html is used to specify the content of the webpage, then CSS to to specify the appearance of content on a webpage.

What is the uses of CSS?

Cascading Style Sheets can be regarded as one that  is been used in  styling as well as in  layout web pages .

When there is a need to  perform some actions such as :

alter the font color size  spacing of  contentsplit it into multiple columns

Then CSS comes into play , hence, If html is used to specify the content of the webpage, then CSS to to specify the appearance of content on a webpage.

Learn more about CSS on:

https://brainly.com/question/16397886

#SPJ1

When working with a spreadsheet, data analysts can use the _____ function to locate specific characters in a string.

Answers

When working with a spreadsheet, data analysts can use the CLEAN function to locate specific characters in a string.

What is the CLEAN Function?

The CLEAN Function is known to be a tool that is often categorized in the Excel Text functions.

Note that this function tends to delete or remove any kind of non-printable characters from any specified or given text.

Note that As financial analysts, people tend to often import data from a lot of sources and the CLEAN function can help to delete nonprintable characters.

Hence, When working with a spreadsheet, data analysts can use the CLEAN function to locate specific characters in a string.

Learn more about spreadsheet from

https://brainly.com/question/4965119

#SPJ1

What type of Trojan is a set of tools designed to gain control of a computer without revealing its presence

Answers

A type of Trojan which is a set of tools that is designed and developed to gain access and control of a computer system without revealing its presence is referred to as Rootkit.

What is a malware?

A malware can be defined as any type of software program or file that is designed and developed to be intentionally harmful to the host computer, server, or network, especially for the purpose of wreaking havoc, damage and destruction after gaining an unauthorized access.

In Computer technology, a Rootkit is a type of Trojan which refers to a set of tools or software program that is designed and developed to gain access and control of an end user's computer system without revealing its presence.

In conclusion, an end user can protect his or her computer system from Rootkits by installing an antivirus software with an updated malware infection database.

Read more on antivirus here: https://brainly.com/question/17209742

#SPJ1

The type of Trojan that is a set of tools designed to gain control of a computer without revealing its presence is called Rootkits.

What is a Rootkit?

Rootkit is software, most often malicious, created to hide or camouflage the existence of certain processes or programs from normal detection methods and allow exclusive access to a computer and its information. Its intercepts the data that is requested and filters this information when an operating system makes a request to read a file, letting the system read only the files that are not infected. Therefore, the antivirus installed on the machine or other security tool on the computer cannot detect any threat or malicious file.

See more about computing at: brainly.com/question/13027206

#SPJ1

meaning of mesh topology​

Answers

The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

What is meant by mesh topology?

Mesh topology is a kind of networking that is said to be where the full nodes do act in a form of a cooperation  so that they can be able to share or distribute data among themselves.

Note that this topology was said to be first seen or developed in about an approximate of about 30+ years ago and it is one that is often used in military applications and now it is seen to be used in home automation, smart HVAC control, and others.

Hence, The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

Learn more about mesh topology​ from

https://brainly.com/question/14879489

#SPJ1

Write a program that first reads a list of 5 integers from input. then, read another value from the input, and output all integers less than or equal to that last value

Answers

Answer:

integers = [int(i) for i in input().split()]

value = int(input())

for integer in integers:

--if integer <= value:

----print(integer)

Explanation:

We first read the five integers in a string. We can use the .split() method, which splits the string into separate parts on each space.

For example:

print(input())

>> "4 -5 2 3 12"

print(input().split())

>> ["4", "-5", "2", "3", "12"]

We cannot work with these numbers if they are strings, so we can turn them into integers using the int constructor. An easy way to do this is with list comprehension.

print([int(i) for i in input().split()]

>> [4, -5, 2, 3, 12]

Now that all the values in the list are integers, we can use a for loop to get each of the values and check whether they are less than or equal to the value.

Let's first get the value from the input.

integers = [int(i) for i in input().split()]

value = int(input())

print(value)

>> 4

Here, we have to pass the input through the int constructor to be able to compare it with the other integers. Let's now make a for loop to go through each integer and check if the integer is less than or equal to value.

for integer in integers:

--if integer <= value:

----print(integer)

The dashes are there to show indentation and are not part of the code.

Traditional methods of collecting systems requirements include: a. rapid application development. b. prototyping. c. interviews. d. joint application design. e. agile methodologies.

Answers

Answer:

interviews

Explanation:

because the designer gets to directly interact with the customer who knows exactly what they want.

A loop structure that tests the loop condition after executing the loop body is called a:_________

Answers

Answer:

A post-test loop structure, also known as a do while loop.

________ focus on managing documents, communicating, and scheduling. group of answer choices transaction processing systems knowledge work systems executive support systems office automation systems.

Answers

Office automation systems focus on managing documents, communicating, and scheduling. The correct option is D.

What is an Office automation system?

An office automation system is a tool from which data can be transferred from one system to another system without using manpower, or without human interventions. Examples are slack, Zoom video calls, Microsoft video calls, etc.

They are used to analyze, collect, and share data. They manage tasks easily, they also manage business process management software.

Thus, the correct option is D. office automation systems.

To learn more about the Office automation system, refer to the below link:

https://brainly.com/question/15131330

#SPJ1

In Hootsuite Inbox, you can see all the correspondence between a user and your organization on a particular social channel, including public and private conversations. This is useful for

Answers

The ability to view all the correspondence between an end user and your organization (company) on a particular social media channel, as well as public and private conversations is useful for understanding the full context of the most recent exchange in Hootsuite Inbox.

What is Hootsuite Inbox?

Hootsuite Inbox can be defined as a type of software application that is designed and developed to help end users in managing social messages (correspondence) from their organization's customers and audiences, especially by availing them an ability to collect and view (see) both private and public conversations (messages) from all networks or social media channel in one place.

This ultimately implies that, the ability to view all the correspondence between an end user and your organization (company) on a particular social media channel, as well as public and private conversations is useful for understanding the full context of the most recent exchange in Hootsuite Inbox.

Read more on Hootsuite Inbox here: https://brainly.com/question/15321261

#SPJ1

How have productivity programs improved the professional lives of people? (check all that apply)

made it easier and faster to communicate with others

made it harder to create and modify documents

made it easier to manipulate numbers in a spreadsheet

made it easier and less expensive to present information

Answers

Productivity programs improved the professional lives of people because:

made it easier and faster to communicate with othersmade it easier to manipulate numbers in a spreadsheetmade it easier and less expensive to present information

What is productivity?

Productivity is known to be the level of efficiency in regards to the production of goods or services and it is one that is rated by some measure.

Hence, Productivity programs improved the professional lives of people because:

made it easier and faster to communicate with othersmade it easier to manipulate numbers in a spreadsheetmade it easier and less expensive to present information

Learn more about productivity from

https://brainly.com/question/14262252

#SPJ1

Answer:

A). Made it easier and faster to communicate with others

C). Made it easier to manipulate numbers in a spreadsheet

D). Made it easier and less expensive to present information

Explanation:

I just did the Assignment on EDGE2020 and it's 200% correct!  

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)

What are the steps required to teach a dog the care (aka wellness check) command?

Answers

The steps required to teach a dog the care (aka wellness check) command is given below

What are the steps required to teach a dog command?

The ways to Teach Your Dog are:

Instruct the dog to  sit. then teach your dog the command Make the dog aware of the treat.Do Give a reward. Increase the level of difficulty.Implement the care command. Remove the treat. Then Switch hands.

What is Wellness check?

In the United State, a wellness check is known to be a kind of an in-person visit that is often made in response to a request from a friend or family member who is known to be concerned about the person's state  of mental health and in this case the dog.

Learn more about wellness check from

https://brainly.com/question/875455

#SPJ1

Write a raptor program that will display the count from 100 to 0 in decrements of 5.

Answers

A raptor program that will display the count from 100 to 0 in decrements of 5 is shown below.

What is a raptor program?

This refers to a programming environment that works on a flowchart basis to help the user to present their algorithms in a visual manner.

Using a raptor program, you can display a count from 100 to 0 in decrements of 5 as shown:


#include <iostream>

#include <string>

using namespace std;

int main()

{

int count;

Count =100;

while (Count<=0)

{

cout << Count << endl;

Count =Count-5;

}

return 0;

}

The result would be a list showing numbers that go from 100 to 0 in decrements of 5.

Find out more on raptor programs at https://brainly.com/question/15082977

#SPJ1

Write a program that takes a string as an input. If the string entered is equal to
“Chicken”, print “This is equal” to the screen. If the string entered is not equal to
“Chicken”, print “This is not equal” to the screen.

Answers

The program could be written using a python script.

Python script on string operation

The program takes a string as an input. First, declare a variable for the input:

var = str()

#The above code will ask for a string to be inputted

Next would be to condition the script in a particular direction using the 'if' statement. That is, a Boolean function.

if var ==('chicken'):

#The above code will compare the inputted string to the word 'chicken'.

  print("This is equal")

#The screen will display 'This is equal' if the inputted stringis the same as 'chicken'.

else:

  print("This is not equal")

#The screen will display "This is not equal" if the inputted string is not the same as 'chicken'.

In summary, the code goes thus:

var = str()

if var ==('chicken'):

   print("This is equal")

else:

   print("This is not equal")

More on python scripts can be found here: https://brainly.com/question/14378173

#SPJ1

Betty is photographing a meadow at 1:00 p.m. what camera white balance setting will work best at this time?

Answers

The correct option exists B. Betty is photographing a meadow at 1:00 p.m. Daylight camera white balance setting will work best at this moment. To return the color temperature to neutral, it counts an opposing color to the image. After successfully white balancing an image, whites should occur white rather than blue or orange.

What is Daylight camera?

Daylight – This mode stands for the normal daylight location while shooting outdoors. Many cameras do not include Daylight mode. Cloudy – This mode stands ideal for shooting on a cloudy day. This exists because it warms up the subject and surroundings and permits you to capture better shots.

Which light is better for the eyes yellow or white?

In our living rooms, dining rooms, bedrooms, and other areas of the house, it is recommended to use warm white, which is also understood as yellow color light. The yellow light has a greater calming influence on the eyes since it contains less blue light. It is well known that cool hues may create it challenging to fall asleep.

The Kelvin scale rates the color or warmth of white light; the warmer the color, the more down the color temperature. Candles exist normally around 2000 Kelvin (k), but daylight exists typically between 5500 and 6500k. Digital cameras exist the most adept at choosing the ideal white balance between 3200 and 6500K. In other terms, they're quite good at deciding which color temperature, between a warm interior and daylight white balance, compares to the lighting situations that photographers typically work in.

To learn more about  Daylight camera refer to:

https://brainly.com/question/16146767

#SPJ4

The complete question is,

Betty is photographing a meadow at 1:00 p.m. What camera white balance setting will work best at this time?

A. Flash

B. Daylight

C. Fluorescent

D. Cloudy

Answer:

The answer is Daylight I believe

Question 2 if you have a slow computer, what are some possible culprits that could be causing this? select all that apply

Answers

Answer:

too many programs running, computer virus, lack of memory, to much cache

Explanation:

Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include: Group of answer choices

Answers

Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include option b: Histamines and leukotrienes.

What are  Histamines and leukotrienes.

In the workings of allergic rhinitis, histamine is known to be a tool or that which is known to act or functions for the main allergic rhinitis symptoms such as rhinorrhea, nasal itching and others.

Note that Its effect is one that is often seen in nasal congestion but leukotrienes is one that leads to a boast or an increase in that of nasal airway resistance and also in that of vascular permeability.

Hence, based on the given scenario above, the Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include option b: Histamines and leukotrienes.

See full question below

Chemicals that are responsible for the signs and symptoms of an allergic reaction to a bee sting include:

A) The bee venom itself.

B) Histamines and leukotrienes.

C) Leukocytes and epinephrine.

D) Adrenaline and histamines.

Learn more about allergic reaction from

https://brainly.com/question/2693669

#SPJ1

What language choice will be the best for the website? 1. English only 2. Two languages: English and Chinese 3. Four languages: English, Chinese, Spanish, and Arabic You chose to redesign the company's website with minimal complexity. This turns out to be a smart move, as many countries must rely on slower Internet connections. Simple websites are more accessible in these areas with less available bandwidth. One option you take into consideration is whether to present the website content in multiple languages. You realize you won't be able to easily reconfigure the website for languages such as Arabic, which reads right to left instead of left to right, but that it might be worth it if the market is big enough. However, you can easily adapt the current site for languages more similar to English, such as Spanish.

Answers

The best language choice will be English only as it is known to be the language that is acceptable in every part of the world.

What is the most influential language in the world?

English is known to be the top and the most powerful language in all of the globe.

Note that  It is the dominant language that is made up of three G7 nations (such as the USA, UK and Canada), and also the British laid it foundation also as well as its global footprint.

Since it is often seen as  the world's lingua franca, it is therefore right to use it instead.

Hence, The best language choice will be English only as it is known to be the language that is acceptable in every part of the world.

Learn more about language from

https://brainly.com/question/10585737

#SPJ1

Complete the table???

Answers

Answer:

2.blending mixing, milkshake

3.boiling cooking,tea

A hacker is viewing information that passes along a network line for the purpose of gathering information. This is called?

Answers

In order to obtain information, a hacker is seeing data as it travels through a network line. This is called sniffing. The correct option is a.

What is sniffing?

In terms of network security, a sniffing attack entails the theft or interception of data through the use of a packet sniffer to record network traffic.

A hacker is a person who attacks or stole pieces of information illegally. They catch the line system of the computer, and they hack software, money, or data.

Thus, the correct option is a. Sniffing.

To learn more about sniffing, refer to the below link:

https://brainly.com/question/17100775

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. Sniffing

b. Spoofing

c. Hijacking

d. Impersonation

A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is most likely being implemented?

Answers

The type of cloud that is most likely being implemented when a group of small local businesses has joined together to share access is community cloud service. The correct option is C.

What is cloud service?

Cloud services have a wide variety of services for companies and businesses. They provide applications and software with resources. They provide easy and affordable services.

Community cloud service is a shared type of cloud service that helps banks and heads of trading firms.

Thus, the correct option is C. Community.

To learn more about cloud service, refer to the below link:

https://brainly.com/question/24227961

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Public

Private

Community

Hybrid

explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

In Binary language 10 stands for two. So this means that there are 2 types of people, one who understand binary and others who don't.

What are the advantages of cloud computing over computing on premises?

Answers

Answer:

answer my question

Explanation:

open my account. i need help.

Write a program whose inputs are three integers, and whose output is the largest of the three values. ex: if the input is: 7 15 3

Answers

Explanation:

Python

There are many ways we can write this program. Here are two ways.

Using the max function

For this question, we can the max function to find the largest of the 3 values.

def largest(value1: int, value2: int, value3: int) -> int:

--return max(value1, value2, value3)

Series of if-else statements

We could have alternatively used a series of if-else statements to get the largest value.

def largest(value1: int, value2: int, value3: int) -> int:

--if value1 >= value2:

----if value1 >= value3:

------return value1

----else:

------return value3

--else:

----if value2 >= value3:

------return value2

----else:

------return value3

The dashes before the lines are not part of the code. They are just for showing indentation. Also, the :int is a type annotation to indicate the type for the parameters. It isn't necessary, but it can help you and others understand what kind of arguments must be passed in to the function.

You are planning to depart on a flight from area 2 to area 4 in 12 hours. What weather is forecast to occur along your route?

Answers

It depends on where you live!

In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical section c) exit section

Answers

In critical section, the process requests permission to access and modify variables shared with other

Omar wants to use the new hard drive as his primary boot device, what is the next step you should perform?

Answers

Since Omar want the new hard drive to be used as a primary boot device, the next step to be performed is installing Windows on the new hard drive.

What is a hard-disk drive?

A hard-disk drive can be defined as an electro-mechanical, non-volatile data storage device that is made up of magnetic disks (platters) that rotates at high speed.

In Computer technology, all hard-disk drives are commonly installed on computers and other digital service for the storage of files and to enable the booting of a computer through its operating system (OS).

In this context, we can infer and logically deduce that if Omar want the new hard drive to be used as a primary boot device, the next step to be performed is installing Windows on the new hard drive.

Read more on hard-disk here: https://brainly.com/question/26382243

#SPJ1

Other Questions
Storm surge damage is usually amplified when _____ coincides with storm landfall With respect to value chains, if your job relates directly to design and maintenance of the organizational infrastructure (i.e., accounting or legal), you would be involved in ________ activities. The __________ with over 100 member nations is the largest institution of its kind and has the most successful record of promoting freer trade. In python please:Assume the variable definitions references a dictionary. Write an ig statement that determined whether the key marsupial exist in the dictionary. If so, delete marsupial and its associated value. If the key is not the dictionary, display a message indicating so. A(n) ______ disease is a disease that must be brought to the attention of local, district, state or national agencies by medical personnel aware of the condition Under a categorical __________ test, ethical dilemmas are resolved by looking at the potential consequences that would occur if everyone in society acted in a similar way. A ________ identifies the target market, the merchandise and services (retail format) that will be offered, and how the company will achieve long-term advantage over its competitors 14. The cutaway diagram below shows the pathsof earthquake waves generated at point X.P- andS-wavesreachseismographNo wavesCrustMantleCoreP-waves only-FocusOnly P-waves reach the side of Earth thatis opposite the focus because P-waves(1) are stronger than S-waves(2) travel faster than S-waves(3) bend more than S-waves(4) can travel through liquidsand S-waves cannot14S-Wave Travel Time Copyright 2017Topical Review Book Compars How do scientists believe that chloroplasts got into photosynthetic cells? In terms of Christianity, state 8 attributes of God. What is another chloride that could be used instead of the calcium chloride dihydrate to produce a solid precipitate with aqueous sodium carbonate? What is the name of the force that holds positively and negatively charged ions together in ionic compounds? nuclear forces van der waals forces electrostatic forces hydrogen bonding Given that gabby is looking for a budget-priced flight home for holidays, she will need to determine which flight features are most important to her. she will do this during the ________ phase. There are no criteria for determining whether god actually issued a particular command because divine commands are _____. Modern environmentalism is becoming well established in the united states. one of the main reasons for this is probably the ___________ in the modern movement. Match each step of the art critique process with the main question that goeswith it.1. Interpret2. Judge3. Describe4. IdentifyA. What do you see?B. Who did it? When? What isit?C. What does it mean?D. Do you like it? Why? How does the party use the book to draw thought criminals out into the open? a. by making it readily available to anyone guilty of thought crime and rebellious intent c. by distributing it among the proles and members of the outer party during hate week b. by saying they wrote it so that anyone seeking the truth about the party would be exposed d. by claiming goldstein wrote it so that anyone interested in rebelling would seek it out define the term quality of life Projects whose earnings tend to be highly dependent upon the state of the economy have higher blank______ risk. Read the excerpt from "The Treasure of Lemon Brown.Lemon Brown didnt move. Greg felt himself near panic. The steps came closer, and still Lemon Brown didnt move. He was an eerie sight, a bundle of rags standing at the top of the stairs, his shadow on the wall looming over him. Maybe, the thought came to Greg, the scene could be even eerier.Greg wet his lips, put his hands to his mouth and tried to make a sound. Nothing came out. He swallowed hard, wet his lips once more and howled as evenly as he could."Whats that?As Greg howled, the light moved away from Lemon Brown, but not before Greg saw him hurl his body down the stairs at the men who had come to take his treasure. There was a crashing noise, and then footsteps. A rush of warm air came in as the downstairs door opened, then there was only an ominous silence.Which statement most accurately describes Lemon Browns and Greg's actions in the excerpt?Gregs actions prove that he hopes to win the trust of Lemon Brown so that he will hand over his treasure to him.Lemon Browns and Gregs actions reveal that they have had problems in the past with the men looking for the treasure. Gregs brave actions prove to Lemon Brown that Greg can be trusted to keep his treasure.Lemon Browns courage inspires Greg to take action against the neighborhood thugs.