4
Select the correct answer.
Jason is working on a video image. He wants to add a small blur effect in a part of the video, but does not want to damage the video content

Which image-editing tool should he use?
ОА.
Dodge Tool
OB.
Pen Tool
OC.
Shape Layer
OD.
Smart Object
Reset
Next

Answers

Answer 1

Answer:

the answer is D Smart Object

Answer 2

Answer:

I think he should use a pen tool


Related Questions

When entering numbers that start with a zero, apply the _____ number format.
A. Text
B. Context
C. Zero
D. Zero decimal

Answers

Answer:

The Answer is gonna be D. Zero decimal

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service

Answers

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

Answer:

user accounts

Explanation:

What is the relationship between optical drives and WORMs?

Optical drives are advanced versions of WORMs.
WORMs do not affect optical drives.
Optical drives are susceptible to WORMs.
WORMs are types of optical drives.

Answers

Answer:

When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.

Explanation:

Good luck

Need answer ASAP. Thanks

Answers

Answer:

1. XHTML

2. XML

3. HTML

4. CSS

Explanation:

What is the status of this account?
A)Current
B)Current, but closed
C)Potentially negative
D)Potentially negative, but closed

Answers

D)Potentially negative, but closed

we know this due to this

-scav

The given account is Potentially negative, but closed. Option D is correct.

What is the Potentially negative account?

A closed account with a “Potentially negative closed” designation has a history that a lender would find unfavorable.

Negative account are the information includes things like missed payments on credit cards and loans, charge-offs, collections, bankruptcies, short sales, deeds in lieu of foreclosure, and foreclosures.

The given image clearly indicated that the account is under the debt and it is called as the Potentially negative, but closed account. The section under “Potentially negative items” will contain a list of all accounts that could be seen negatively by lenders or other people looking at your credit history.

Therefore, option D is correct.

Learn more about the account, refer to:

https://brainly.com/question/29108212

#SPJ2

5.What type of mic would you use for the following scenario:
• You want to pick up a wide range of frequencies , You are looking for an extraordinarily rich representation of the original sound, You seek smooth, detailed sound, You want to capture the subtle nuances in a recording studio, You expect and appreciate subtle, sensitive sound

a. Ribbon
b. Condenser
c. Dynamic

Answers

Answer: ribbon

Explanation:

Ribbon microphones are regarded as the most natural mics which can be used in capturing the voice, the sound of an instrument, and also the ambience of a room.

Ribbon microphone gives an extraordinarily rich representation of the original sound and also provide a smooth, and detailed sound.

Need answer ASAP

Complete the following sentences


____ objects are programmer defined objects with programmer developed properties and methods. Custom objects are ____
Objects.

Options for first box are:custom, built-in, user-defined

Option for the second box: user-defined, system-defined, undefined

Answers

Built in and user defined

Answer:

built-in objects are programmer-defined objects with programmer-developed properties and methods. Custom objects are user-defined objects.

What is the purpose of a hyperlink in a presentation?
A to add a joke to a presentation
B to create an attractive image
C to connect a user to a new slide, a file, or a webpage
D to keep track of the order of slides

Answers

Answer:

Answer:c to connect a user to a new slide, a file, or a webpage

Explanation:

Explanation:c

Answer:

c

Explanation:

List any two software that could be used for creating visual information

Answers

Answer: inkscape

Microsoft PowerPoint

Explanation:

Visual information is the presentation of information in visual format e.g through pictures, etc. It is the use of pictures, signs, icons etc to pass a message with one's sense of sight.

The software that could be used for creating visual information include inkscape and Microsoft PowerPoint. IInkscape is an open-source vector graphics editor which is used in the creation of vector images. Microsoft PowerPoint is also a presentation program.

Name the tools in plant propagation.
Q
18.
16.
17.
19.
20.
please po asap​

Answers

16. Branch or tree cutter
17.paint tape
18. Knife
19. Pots
20. Waterer

What behavior do elements in a stack follow?

Answers

A stack operates on the LIFO (Last In First Out) principle, which states that the element inserted last is the first element to be removed. Inserting an element into the stack is known as a push operation, and removing an element from the stack is known as a pop operation.

Answer:

last in, first out, or LIFO behavior

Explanation:

B

A computer database uses a binary sequence of 10 bits to represent unique user IDs. To increase the number of unique IDs that the database is able to represent, the database administrator increases the number of bits in a user ID to 11 bits. How many times more unique user IDs can be represented with the new system?

Answers

Answer:

2 times more unique IDs

Explanation:

The number of bits used to represent unique IDs in the computer system = 10 bits

The number of bits to which the database is upgraded to = 11 bits

The number of unique IDs represented by a 10 bits binary sequence, n = 10¹⁰ = 1024

The number of unique IDs represented by a 10 bits binary sequence, n = 10¹¹ = 2048

Therefore, the number of times more unique IDs that can be represented with the new system of 11 bits = 2048/1024 = 2 times more unique IDs

Which of the following might an audio technician do to music in a recording studio? (select all that apply)

a) write it
b) mix it
c) perform it
d) master it

Answers

B Plz give brainliest

Answer

perform it

master it

mix it

Explanation:

That's the Answer

Write a program to Find the Sum of 4 numbers​

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

   int a,b,c,d;//defining integer variable

   cout<<"Enter numbers:";//print message

   cin>>a>>b>>c>>d;//input numbers

   int sum=a+b+c+d;//add value in sum variable

   cout<<"4 number sum is:"<<sum;//print sum

   return 0;

}

Output:

Please find the attachment file.

Explanation:

In the program inside the main method 4 integer variable "a,b,c, and d" is declared that uses the print method to input the value from the user-end and after accepting the value an integer variable "sum" is declared that adds all input values and use a print method that prints the value with the message.

Write the program to convert the string “ SOFTware” into lower case ,”hardware “ string into upper case.
Combine the two strings and find the length of the combined string.

Answers

Answer:

The program in Python is as follows:

str1 = " SOFTware".lower()

str2 = "hardware ".upper()

str3 = str1+str2

lent = len(str3)

print(lent)

Explanation:

(1) Convert " SOFTware" to lower

str1 = " SOFTware".lower()

(2) Convert "hardware " to upper

str2 = "hardware ".upper()

(3) Combine both strings

str3 = str1+str2

(4) Calculate the length of the new string

lent = len(str3)

(5) Print the calculated length

print(lent)

What technology standard is commonly used today for hard drives to interface with the motherboard in a system? pasago po salamat ^_^

Answers

Answer:

Serial Advanced Technology Attachment (SATA).

Explanation:

The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Thus, the hardware components of a computer are the physical parts that can be seen and touched. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

Digital storage of data refers to the process which typically involves saving computer files or documents on magnetic storage devices usually having flash memory. Some examples of digital storage devices are hard drives, memory stick or cards, optical discs, cloud storage, etc. A reliable storage such as a hard-disk drive ensures that computer files or documents are easily accessible and could be retrieved in the event of a loss.

Serial ATA (SATA) is a technological standard which is commonly used today for hard drives to interface with the motherboard in a computer system. Thus, it's simply a bus interface on computer systems that is typically used for connecting mass storage devices to host bus adapters such as motherboards.

Generally, SATA comprises of two ports and these are the power and data connector.

list and explain seven functions of operating system software​

Answers

Answer: Security – ...

Control over system performance – ...

Job accounting – ...

Error detecting aids – ...

Coordination between other software and users – ...

Memory Management – ...

Processor Management – ...

Device Management –

HOPE THIS HELPS

ced-vfrj-yiu
ev.eyo.ne joi.n.thro.ugh goog.le m.eet​

Answers

Answer:

n.o

Explanation:

n.o.

(Java)
Summarize the connection between controls, events, and subroutines.

Answers

In order to create an effective summary, you must take time to read through the topics that you have been given. Namely:

"The Connection between Controls, event, and subroutines".

What is a Summary?

A summary refers to a concise statement or account or report of the key points of an event, story, or literature.

A summary is usually exclusive of details that are not necessary. It focuses on the key points.

The text relating to the topic must be carefully researched. Jot down your points on a separate sheet, especially when looking at introductory paragraphs and chapters. You will also find key points in the conclusive paragraphs of each chapter or the text.

Then ensure that all your points are arranged in an order that is logical and sequential.

Learn more about Summaries at:

brainly.com/question/25605883

The following procedure is intended to return true if the list of numbers myList contains only positive numbers and is intended to return false otherwise. The procedure does not work as intended. PROCEDURE allPositive(myList) { index ←← 1 len ←← LENGTH(myList) REPEAT len TIMES { IF(myList[index] > 0) { RETURN(true) } index ←← index + 1 } RETURN(false) } For which of the following contents of myList does the procedure NOT return the intended result?

Answers

Answer:

[-1, 0, 1]

Explanation:

Given

The above procedure

Required

Which list does not work as intended

The question has missing options (the options are available online).

From the question, we understand the procedure is to return true for lists that contain only positive numbers.

However, the list does not work for [-1, 0, 1]

The reason is that; the procedure starts checking from index 1.

i.e. index ←← 1

In [-1, 0, 1], the element at index 0 is negative (-1).

Since the procedure starts checking from index 1, the procedure will not check the element at index 0 (i.e. -1).

Hence, it will return true, instead of false

In this exercise we have to use the knowledge of computational language in python, so we have that code is:

It can be found in the attached image.

So, to make it easier, the code in python can be found below:

NumList = []

Number = int(input("Please enter the Total Number of List Elements: "))

for i in range(1, Number + 1):

   value = int(input("Please enter the Value of %d Element : " %i))

   NumList.append(value)

print("\nPositive Numbers in this List are : ")

for j in range(Number):

   if(NumList[j] >= 0):

       print(NumList[j], end = '   ')

See more about python at brainly.com/question/2266606

When should we not use Inheritance in programming?

Answers

Answer:

You shouldn't be using inheritance if your program doesn't reuse code a lot.

Explanation:

This is really the purpose of inheritance, to make it easier for us to call repeated method calls without having to copy and paste all the time and making our program long and redundant.  If you have simple programs that don't have repeated calls, then inheritance is unnecessary.

PLSSSSS HELPP!! Population biologists are concerned about invasive species such as the zebra mussel found in North American water ways because

A.The introduced species compete for resources more effectively than native species


B.These introduced species will require more land to be protected


C.Introduced species often become endangered when they are placed in a new habitat


D.Predators of the zebra mussels will decrease after these organisms are introduced into the habitat

Answers

Answer: A.The introduced species compete for resources more effectively than native species.

Explanation:

An introduced species is also called the exotic species and this is an organism which is not a native organism or specie and therefore isn't native to the place but rather it's being transported to the place through the activities of human being.

When the introduced species are introduced to a particular area, they compete with the natives for the available resources and often do this more effectively than the other native species.

Therefore, the correct option is A.

Hey does anyone think nervegear would be possible? (Just asking)

Answers

Answer:

Depends

Explanation:

Technology is not advanced yet, so building a fully functional nerve gear is difficult. It could be possible in a few years though.

Answer:

No, the Nerve Gear cannot be possible at the moment. However, in Japan, they are creating the Nerve Gear and is to be released in May 2022 told by the creator, Kayaba Akihiko. So, the Nerve Gear cannot be possible in 2020 but in 2022. We just have to wait for two more years.

Explanation:

please choose me as brainliest if that is ok ;)

Which option best describes what spotting sessions are in the context of filmmaking? ASAP PLEASEEEEE!!!!!!! 40 points
A.
They are sessions dedicated to discussing the film's art direction.
B.
They are sessions dedicated to discussing the film's screenplay.
C.
They are sessions dedicated to discussing the film's cinematography.
D.
They are sessions dedicated to discussing the film's costume design.
E.
They are sessions dedicated to discussing the film's score.

Answers

The answer you are looking for is E! :)

Answer:

E.  They are sessions dedicated to discussing the film's score.

Explanation:

PLATO

Which of the following best describes the protocols used on the Internet?

The protocols of the Internet are designed by government agencies to ensure they remain free to use

The protocols of the Internet are secret to maintain the privacy and security of people using them

Each device connected to the Internet will use a protocol designed by the company that manufactured it

The protocols of the Internet are open and used by all devices connected to the network

Answers

The protocols of the Internet are open and used by all devices connected to the network

-scav

Need answer ASAP I’ll mark brainliest if correct

How can you create a class without any methods, yet call a method from that class?

The class can___ methods from another class

Answers

the class can call methods from another class


hope that helps if you have any questions let me know and if you could mark this as brainliest i would really appreciate it!

In an event-driven program, you design the screens, define the objects, and define how the screens will connect.

Answers

Answer:

True.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

One of the most important steps in the software development life cycle (SDLC) is design. It is the third step of SDLC and comes immediately after the analysis stage.

Basically, the design phase is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.

Hence, in an event-driven program, the software developer design the screens, define the objects to be used, and define how the screens will connect to other sources or resources.

Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in: a) agriculture and away from services b) services and away from agriculture c) industry and away from services d) agriculture, services, and industry

Answers

Answer:

^^^^^ what they said

Explanation:

its b

Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in services and away from agriculture. Thus, option C is correct.

What does the graph represents?

According to the graph, the globalization process (period 2000-2019) has affected China by decreasing the proportion of workers in agricultural activities from more than the 40% to not much above the 10%.Based on this graph, globalization has affected China's workforce by creating a shift toward specialization in services and away from agriculture.

Meanwhile, workers in the service sector have increased from less than the 30% to more than the 60%. The percentage of people working in manufacturing activities has remained more or less stable, around the 30%.

Thus, option C is correct.

Learn more about service sector on:

https://brainly.com/question/14606383

#SPJ7

does anyone know the code to rating 5.2:4 on CodeHS?

Answers

Answer:no

Explanation:

no

1. Samantha uses the RSA signature scheme with primes p = 541 and q = 1223 and public verification exponent e = 159853. (a) What is Samantha's public modulus? What is her private signing key? (b) Samantha signs the digital document D = 630579. What is the signature?

Answers

Answer:

Why is samantha asking us? She should find out herself smh

Explanation:

Other Questions
Describe where you are in life right now. What makes you most excited about where you are now? What questions do you have, and what are you worried about???? Which sentence is written correctly?Marcus announced "I'm going to the aquarium to see a new exhibitO Marcus announced, "I'm going to the aquarium to see a new exhibit.O Marcus announced, "I'm going to the aquarium to see a new exhibit."Marcus announced, I'm going to the aquarium to see a new exhibit." What is the volume of the triangular prism shown below?8 cm3 cm13 cmA 143 cmB 312 cmC 156 cmDNot here At the same time, the growth of democracy has become one of the most powerful political movements of our age. In Latin America in the 1970s, only a third of the population lived under democratic government; today over 90 percent does. In the Philippines, in the Republic of Korea, free, contested, democratic elections are the order of the day. Throughout the world, free markets are the model for growth. Democracy is the standard by which governments are measured.Address at Moscow State UniversityRonald ReaganHow does Reagan substantiate his opinion that democracy is a powerful force?by stating that it is a powerful political movementby giving examples of countries that have become democraciesby explaining how the free market works by discussing ways governments are measured Round to the nearest tenth if necessary. Multiply and simplify. y^3 . y^5 . y^-2 .yA. y^-4B. 1/y^4C. y^-5D. 1/ y^3 R and S represent positive integers on a number lineand R< S. Which of the following could be thepositions of R and S? 49. Marcy Company declared a 100% common stock dividend on January 1, 2005, when the market price of the stock was $7.50. The entry to record this dividend will: A) debit Retained Earnings,$100,000 B) credit Common Stock Dividend Distributable,$50,000 C) credit Contributed Capital in excess of par, Common Stock, $25,000 D) credit Common Stock Dividend Distributable, $100,000 E) Since this is considered a stock split, no journal entry is made If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive digital identity? LENGHT OF ORBIT AND DISTANCE FROM SUN -4 (b + 2) = 20 answer A rectangular pool is being constructed with a length that is four times the width. There will be a walkway constructed around the pool that is 6 feet wide all around. Write a factored expression for the area in square feet of the pool and the walkway combined. Explicar que relacin existe entre la Revolucin Industrial, la Independencia de las XIII colonias y la Revolucin Francesa Use the distributive property to write an equivalent expression.10(5v+3) HELP I NEED ANSWER BEFORE 11 59 How do you write an equation of a line given (1, 2) and (3, 4) in a slope -intercept form Help please no links or Ill report What is the difference between cc and bcc. pls helpany links will be flagged because there is a person going around trying to get info by sending a link that supposedly answers your question Find the f^-1(x) and its domain