2.6 LAB: Branches:Remove gray from RGB Instructor note: This is the start of the Wk 2 -Branches Labs assignment. If you haven't done so please close out of this window and launch the Wk 2 - Branches Labs link from your Blackboard course to ensure proper submission to the gradebook. Summary: Given integer values for red, green, and blue, subtract the gray from each value. Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255. Thus (255,0,0) is bright red, (130,0,130) is a medium purple, (0,0,0) is black. (255,255,255) is white, and (40,40,40) is a dark gray. (130,50, 130) is a faded purple, due to the (50,50,50) gray part. (In other words, equal amounts of red, green, blue yield gray). Given values for red green, and blue, remove the gray part. Ex If the input is. 13050130 the output is: 80080 Hint: Find the smallest value, and then subtract it from all three values, thus removing the gray. Note This page converts rgb values into colors. 0/10 square un 26.1: LAB: Branches: Remove gray from RGB square Nor shown when eating Variables square Input

Solution4.1(231 votes)
Answer
Explanation
Similar Questions
Which three of the following are characteristics of a router? Connects networks Provides hardware firewall protection Usually incorporates switches Designed to convert analog signals into digital signals
The role of the programmer is to install computer work stations to enhance children's learning. True False Submit
Select the correct answer. Anne is creating a website where she can share music that her band created. She needs to make sure that the file size is small enough to allow her fans to stream the audio over the Internet. Which format should she use to save her audio? A. WMV B. MP3 C. JPEG D. MP4
When users store data on remote servers and access and share data through the internet, which storage method are they most likely using? A. Flash storage B. Networking storage C. DRAM storage D. Cloud storage
Which aspect of the CIA triad requires that passwords in a database be encrypted? a. Availability b. Integrity c. Scalability d. Confidentiality
A system administrator reviews network access permissions granted to several devices and revokes their certificates. What log would reflect these changes? A. Public Key Infrastructure (PKI) B. Certificate Revocation Lists (CRL) C. Trusted Platform Module (TPM) D. Hardware Security Module (HSM)
Which data type would be best for a username field? a. Long text b. Hyperlink c. AutoNumber d. Short text
Which statement about Rule-Based Access Control is true? a. It requires that a custodian set all rules. b. It dynamically assigns roles to subjects based on rules. c. It is considered a real-world approach by linking a user's job function with security. d. It is no longer considered secure.
What is the purpose of a choke point in a screened subnet configuration? To allow unrestricted access between the perimeter network and the LAN To facilitate better access control and easier monitoring To provide a direct connection to the Internet To eliminate the need for internal firewalls
Computer Vocabulary.Question 3 of 4 What is the program you need to look at Web sites? A. both B. el explorador de Web C. el navegador