OpenArt Logo
Sign in

Boddula Srinu

Boddula Srinu

Width: 1848
Height: 1128

Create your first image using OpenArt.

With over 100+ models and styles to choose from, you can create stunning images.

More images like this
Prompt: bar chart (comparing road network quality), data visualization, Liberia, Ghana, Kenya, (professional) design, clear labels, descriptive colors for each country, (high-quality) graphics, (modern) style, crisp lines, vibrant colors for clarity, engaging layout, dynamic presentation of data, (informative) infographic, background with subtle geographical elements, 4K resolution.
Prompt: Webpage showing KPIs of Inventory, in the first line There are 5 tiles with respectively: Available Inventory in reference, Nb of Reference Out Of Stock, Number of References in excess, Value of the Inventory, Potential Saving global
Underneath there is the title Inventory Structure underlined and bellow it there is a table with 4 lines titled: A, B, C, and D, and three columns titled: Number of References, Percentage of Total Quantity, and Percentage of Total Inventory value. On the right side of the Table there is a   Pie Chart representing the column of value of each line.
Underneath this Table and this pie chart, there is the Inventory Level Settings, with four tiles underneath, first tile has Number of references with Level setting under the Region Best Practice, second Tile with Value of the Gap with the Best Practice of the Region, Third Tile with the Number of Reference above Best Practice of the Region, the Fourth Tile with the Value of the Gap of Excess compared to the Best Practice of the region
Prompt: A detailed timeline visualizes a strategic cybersecurity plan spanning from May 2025 to June 2026, divided into three main phases: Cyber Diagnostic, Implementation of Strategic Controls, and Consolidation and Sustainability. The Cyber Diagnostic phase includes essential activities such as maturity assessment, critical asset mapping, vulnerability scans, penetration testing, and compliance evaluation with LGPD (General Data Protection Law). The subsequent phase focuses on implementing security measures, including network segmentation, protection of devices, Zero Trust model adoption, and awareness training. Finally, the timeline culminates in the Consolidation phase, entailing policy unification, preparatory audits for ISO/IEC 27001, and the formulation of a continuity plan, ensuring a structured approach to enhancing organizational cybersecurity.
Prompt:
Prompt: Webpage showing KPIs of Inventory, in the first line There are 5 tiles with respectively: Available Inventory in reference, Nb of Reference Out Of Stock, Number of References in excess, Value of the Inventory, Potential Saving global
Underneath there is the title Inventory Structure underlined and bellow it there is a table with 4 lines titled: A, B, C, and D, and three columns titled: Number of References, Percentage of Total Quantity, and Percentage of Total Inventory value. On the right side of the Table there is a   Pie Chart representing the column of value of each line.
Underneath this Table and this pie chart, there is the Inventory Level Settings, with four tiles underneath, first tile has Number of references with Level setting under the Region Best Practice, second Tile with Value of the Gap with the Best Practice of the Region, Third Tile with the Number of Reference above Best Practice of the Region, the Fourth Tile with the Value of the Gap of Excess compared to the Best Practice of the region
Prompt: