what do you mean by graphics editing​

Answers

Answer 1

Answer:

Changing or improving graphics images. It typically refers to bitmapped images rather than vector graphics drawings. Using an image editor, images can be modified by an artist using pen, brush, airbrush and other "painting" tools.

Explanation:

Answer 2

Answer:

Changing or improving graphics images. To make it look much better or modify or improve digital.

Explanation:


Related Questions

What is a data silos in ict

Answers

A data silo is a collection of data held by one group that is not easily or fully accessible by other groups in the same organization.

A tortoise is walking in the desert. It walks for 6 minutes at a speed of 7.68 meters per minute. How many meters does it walk?​

Answers

The tortoise walked 46.08 meters

Discuss new concepts that you have learned about Cisco Devices and how they will be helpful in the workplace.

Answers

Answer:

Research has shown that the Company unveils the industry's first high-end Wi-Fi 6E access points, Private 5G for the enterprise as a managed service, and new high-powered Catalyst 9000X series switches with Cisco Silicon One to deliver top speeds and performance with the security needed for hybrid work.

Explanation:

With these new concept/development work will be made easy.

What is the difference between

Answers

I need more context

Explanation:

you didn't the whole question

Primary key
Field
Record
Table

Answers

The primary key is always the id in any form, it may be uuid and etc.

So the primary key is the MOVIE_ID.

As you understand the entire thing is what you would quite often see in any relational databases like PostgreSQL. It's a table.

The fields are columns and any row is your entry or record in other words.

I will give you an example from the project I am working on, the screenshot shows a table for a user, you can consider it somewhat production style.

Question 6 of 10

Which level of abstraction in computing systems uses binary code to manage

information?

O A. Data

B. Programming

C. Applications

D. Operating systems

Answers

Answer:

Its A data just did the quiz

Explanation:

Data is evel of abstraction in computing systems uses binary code to manage information.

What is Data?

Data  in the quest of knowledge is a collection of discrete values that transmit information, describing amount, quality, fact, statistics, other fundamental units of meaning, or just simply sequences of symbols that may be further understood.

Data can reflect both actual measures and abstract concepts. Data are frequently employed in economics, science, and practically every other aspect of human organizational activity.

Price indices (such the consumer price index), unemployment rates, literacy rates, and census statistics are a few examples of data sets. Data here refers to the unprocessed facts and numbers that can be used in this way to extract information that is useful.

Therefore, Data is evel of abstraction in computing systems uses binary code to manage information.

To learn more about Data, refer to the link:
https://brainly.com/question/10980404

#SPJ2

write the name of a few operating system..

Answers

Apple IOS and Microsoft Windows

In this exercise we have to use our knowledge of operating systems to explain each one, so we have to:

Microsoft Windows, Mac OS X and Linux.

What are operating systems?

It is a software or set of software whose function is to administer and manage the resources of a system, from hardware components and file systems to third-party programs, establishing the interface between the computer and the user. The most common operating systems that exist for computers and that the market offers are: Microsoft Windows, Mac OS X and Linux.

So the operating system are:

Microsoft Windows is the company developed the Windows operating system in the mid-1980s. Mac OS X. This is the operating system developed by Apple Inc. Linux Ubuntu

See more about operating systems at brainly.com/question/6689423

Which graphics element loads faster when used with text or audio on a web page?

Answers

Answer:

A slideshow uses still images that shift through a desired order

list and discuss the various scheduling techniques of operating systems

Answers

Question:

•List and discuss the various scheduling techniques of operating systems.

Answer:

•First-Come, First-Served (FCFS) Scheduling.•Shortest-Job-Next (SJN) Scheduling.•Priority Scheduling.•Shortest Remaining Time.•Round Robin(RR) Scheduling.•Multiple-Level Queues Scheduling.

Explanation:

#Let's Study

#I Hope It's Help

#Keep On Learning

#Carry On Learning

is integer a type of constant variable​

Answers

Answer:

Yes it is

Explanation:

An integer constant is nothing but a value consisting of digits or numbers. These values never change during the execution of a program.

After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Addresses and hosts, what does she scan next on the target's network to see if any are open

Answers

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

How do hackers scan ports?

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

https://brainly.com/question/23294592

what do you mean by Graphics editing​

Answers

Answer:

here you go man-Changing or improving graphics images. It typically refers to bit mapped images rather than vector graphics drawings. Using an image editor, images can be modified by an artist using pen, brush, airbrush and other "painting" tools.

what is computer software?​

Answers

Answer:

Software is a collection of instructions that tell a computer how to work. This is in contrast to hardware, from which the system is built and actually performs the work.

Distinguished between
i. Conductors
ii Dielectric
iii. Poor Conductors
Name five (5) examples in each case and their atomic symbols

Answers

Answer:

this one is not understandable you see but I think it's better than nothing to do with it tmzr I don't know what to say to someone who did you start the morning and you can not be able to get it to

Imagine that you are introducing a new system to college students where they would have to use a special ID number you create for them for activities such as logging on to campus computers or using library resources. How would you plan and implement the change? Explain using Lewin’s three-stage framework.

Answers

Explanation:

g tear valobeshe beshe dibo na ya baba ji bante

What are two possible challenges of online collaboration?
I A. The lighting for certain team members may be dim.
A B. Team members in different time zones may have difficulty
showing up to meetings.
C. Working on the project can become drawn-out and boring.
D. A slow internet connection can make it difficult to communicate
and access online tools.

Answers

Answer:

B. Team members in different time zones may have difficulty showing up to meetings.

&

D. A slow internet connection can make it difficult to communicate and access online tools.

Explanation:

Working remotely allows for people to collaborate from virtually anywhere, but different time zones could negatively impact the work flow due to drastic differences in time.

In addition, technical difficulties are another issue to keep in mind because of the virtual setting you're working in.

Answer:

B. Team members in different time zones may have difficulty

showing up to meetings.

D. A slow internet connection can make it difficult to communicate

and access online tools.

Explanation:

Hello everyone I have a question about Java. I already generated 5 random words and I want to find a way to make the user input those exact same random generated words, or else they "lose". Any advice​

Answers

Answer:

no sé

Explanation:

Write a Java Program
Specific Instructions

Create a class for the following object.

Deck - contains 52 cards initially. Each card is represented by an unchangeable suit and value.
Suits - ♣ (Club), ♠ (Spade), ♥ (Heart), ♦ (Diamond)
Values - 1(A),2,3,4,5,6,7,8,9,10,11(J),12(Q),13(K)

Actions

draw - retrieves the top most card on the deck. When called with number of desired cards, it will try to draw the N cards, if not enough, draw all cards.
shuffle - randomizes the location of all cards, excluding the drawn cards
restore - returns the last N cards drawn on the bottom of the deck, if no number is provided, return all drawn cards.
Make sure that the class is encapsulated.

Answers

In the Deck Builder, initialize the 52 cards (along with the 4 jokers, which should be called “wild” and the suit is “wild”).

Public class Deck

  private final List<Carta> Deck;

  public Baralho() {

      listaCartas = new ArrayList<>();

      String[] naipes = {"club", "spade", "heart", "diamond"};

      int pos = 0;

      Carta c;

With this code we will be able to create the Deck, initialize the 52 cards together with the 4 jokers.

Learn more about Deck in brainly.com/question/1660537

Define a method named orderOfAppearance() that takes the name of a role as an argument and returns that role's order of appearance. If the role is not found, the method returns 0. Ex: orderOfAppearance("Forrest Gump") returns 1. Hint: A method may access the object's properties using the keyword this. Ex: this.title accesses the object's title property.

// Code will be tested with different roles and movies
let movie = {
title: "Forrest Gump",
director: "Robert Zemeckis",
composer: "Alan Silvestri",
roles: [ // Roles are stored in order of appearance
"Forrest Gump",
"Young Forrest Gump",
"Jenny Curran",
"Lieutenant Dan Taylor"
],
orderOfAppearance: function(role) {

}
};

Answers

The method named orderOfAppearance() that takes the name of a role as an argument is; Written as below

How to write a Program in Java?

The steps to write this Java program is as follows;

1) Initialize the movie JSON (JavaScript Object Notation) having the name, director, composer and title properties.2) Define a roleOf: function that has a name parameter.3) Check whether the selected is not equal to undefined and then return that name.4) Otherwise display this message: "0".

let movie = {

  name: "Forrest Gump",

  director: "Robert Zemeckis",

  composer: "Alan Silvestri",

  title: {

      "Forrest Gump",

      "Young Forrest Gump"

      "Jenny Curran"  

       "Lieutenant Dan Taylor"            

  },

  orderOfAppearance: function (role) {

      if (typeof (this.title[role]) !== 'undefined') {

          return this.title[role];

      } else {

          return "0";

      }

  }

};

Read more about java programming at; https://brainly.com/question/16397886

Where does blood travel when it leaves the right ventricle of the heart

Answers

The right ventricle contracts, and blood is forced through the pulmonary semilunar valve into the pulmonary artery. It then travels to the lungs. Hope this helps!
This is under computers and technology.

.
Derrick is having trouble figuring out why his computer monitor's image is distorted. He has exhausted all of the troubleshooting ideas he can think of and has decided to contact the customer support number for his device. The Technical Support Specialist tells him that he can fix the problem but will need remote access to his computer. Remote access refers to:

using a remote control like your television has to control your device.

taking control of the operation of a computer without physically using it.

allowing someone from a remote location to come and provide in-home service on your computer.

buying a remote control peripheral and installing it on your computer.

Answers

Answer:

I think it's the second option.

Explanation:

Definitely not the first or last choice.

Low Level Programming Language is also known as:

(A) Object Oriented Language
(B) Procedural Oriented Language
(C) Machine Level Language
(D) Processor Level Language​

Answers

Machine level language

A student plucks a guitar string and the vibrations produce a sound wave with a frequency of

650 hertz. Calculate the wavelength of the sound wave in air at STP. [Show all work, including

the equation and substitution with units.]

Answers

Answer:

52.8 cm

Explanation:

please mark brainlest

The  wavelength of the sound wave in air at STP is 0.510.

What is Frequency?

This is known to be the rate at which a thing takes place at a specific interval of time.

Note that the

The speed of sound in air is

343 m/ s

At STP the speed of sound wave is

v = 331m/s

Now, the wavelength is

is to 332 / 650

= 0.510

Learn more about  sound wave  from

https://brainly.com/question/1199084

#SPJ2

How to make a Java GUI application? Discuss each step needed.

Answers

Explanation:

Create a JFrame container

1- In the Projects window, right-click the NumberAddition node and choose New > Other .

2- In the New File dialog box, choose the Swing GUI Forms category and the JFrame Form file type. Click Next.

3- Enter NumberAdditionUI as the class name.

4- Enter my. numberaddition as the package.

5- Click Finish.

Without calculating, how can you determine the asymptotic rate of growth of the expression? Give an appropriate example to illustrate your answer. ​

Answers

Oh wow the person above is reckless

ways of caring for storage devices​

Answers

Answer:

eject the device before removing

Explanation:

If you just unplug a device, you run the risk of unplugging while an application is still using the device

In a Linux machine, you have a file named "types_of_fish.txt" and you want to append the word "trout" to the file contents. Which of the following commands can you use?

A. echo trout < types_of_fish.txt
B. echo trout > types_of_fish.txt
C. echo trout >> types_of_fish.txt
D. echo trout 2> types_of_fish.txt

Answers

Answer:

B because if you where to go in and try to make a file via terminal it would have to be like

$ echo file1 > file1

$ ln -s file1 file2

$ cat file2

file1

$ ls -ld file2

lrwxrwxrwx 1 lubos lubos 5 Jan 10 14:42 file2 -> file1

for the example

to restart a device without powering it down

Answers

Answer:

No possibly way of doing this

If the device isn't functioning but is turned on

On android: Hold the power button and either the volume up or down keys at the same time till the screen goes black

On IPhone/IPad/Ipod: hold down the home key and the power button till the screen goes blank

On Newer Apples with no home button, just hold down the power key till the screen goes blank

On PC: Hold the power button on the pc thill the screen goes black

On tablet: Use the steps for android listed above.

1. provides a list of at least five SSIDs and the
corresponding wireless encryption protocol.


2. identifies their SSID and encryption protocol.
Student provides a list of at least five SSIDs and the
corresponding wireless encryption protocol.


2. Student identifies their SSID and encryption protocol.

Answers

One of the most important ways to provide wireless security is through:

The use of encryption.

What is Wireless Security?

This refers to the network authentication and use of encryption to secure a network from unauthorized access or compromise of the network by an external agent.

With this in mind, we can see that SSID is a WiFi network name and it makes use of WPA2 security encryption to protect the wireless network through wireless encryption protocol.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about wireless security here:
https://brainly.com/question/14449935

Without an app, the emergency response team would radio information back to the hospital. What are some benefits of using an app to send information in a situation like this

Answers

Theres a lot of benefits, it just depends on the situation. For example, say that person whos calling is in a trafficing situation, or kidnapping.  it would give the dispacter more information than what the person could say. Or if you just got into a car accident, say all you had to do was press one button and then it sends the dispacher all of your information. Social security number, phone number, id, location, emergency contacts and more.  

Other Questions
Three vertices of a rectangle are at points A (-5,1), B (1,1), and C (1,-2). What is the area of the rectangle?Question 1 options:8 sq units10 sq units18 sq units 75 POINTSA right cylinder has a radius of 5 cm and a height of 3 cm. Answer the following questions and make sure to show all your work. (a) Find the Volume of the cylinder.(b) If you wanted more volume in your cylinder, which of these two ideas would give the most Volume?1. Doubling the radius to 10 cm, while the height remains 3 cm.-OR- 2. Tripling the height to 9 cm, while the radius remains 5 cm. List three things to consider when planning how to control risk Not sure what the answer might be Prove: AB CDURGENT HELP NEEDED Gareth buys 2 oranges he pays with 1 coin and gets 52p change work out the cost of 1 orange suppose a hair dryer uses 20kj of energy how many kWh is this Make N the subject of formula[tex]P = N + \frac{2}{D} [/tex] PLEASE HELP I NEED TO PASS MATH! The locally linear approximation of the differentiable function f at x=3 is used to approximate the value of f(3. 2). The approximation at x=3. 2 is an overestimate of the corresponding function value at x=3. 2. Which of the following could be the graph of f ? Enzymes increase the rate of reactions. Pick the right answer: 1. The enzymes increase the rate of the reaction due to the changes they themselves undergo. 2. Enzymes repeat their action again and again to accelerate activity.3. Enzymes increase the activation energy of the reaction.4. Enzymes alter the activity profile of the substrate. (I hope it makes sense. I had to translate it from my native language. Help is much appreciated!). If 3ten is 00000011 two, what is 3ten in an 8-bit two's complement representation? Four seasons lawn and landscaping provides customers with quality and value, treats others as they want to be treated, and practices open communications with all stakeholders. These are part of their. During the Cold War, the U.S. and the U.S.S.R engaged in wars in regions of the world outside of their own territories, with the purpose of maintaining a balance of power. These wars were called Please help. I'll mark brainliest. Thanks! Which figure can be formed from the net? V. Complete each sentence with the suitable form of theword provided. (Ipt)1. Don't drink that water. It's.... (contamination) e2. Three hundred people were left kos.... by the earthquake. (home)3. The did. fish are floating in the water. (die) 4. The Golden Gate Bridge in San Francisco is an of this famous city. (iconic) Analyses why meeting ya tax onligation may be important to you as a young entrepreneur Declan is studying the Susan B. Anthony dollar in his American history class. He sees this picture next to an explanation of when the coin was first introduced. What is the best caption for the picture? A) Susan B. Anthony was an important women's rights activist. B) The Susan B. Anthony dollar was first issued on July 2, 1979. C) The Susan B. Anthony dollar was generally unpopular with the American public. D) Only a relatively small number of Susan B. Anthony dollar coins remain in circulation. Lesson Le Part 5: Independent Practice 2 Which sentence best supports the idea that Chapel Hill's location contributed to it becoming more than just a college town? S A "In the late 1700s, local people could attend the New Hope Chapel, erected on the highest point of the hill." (paragraph 2) B "The Civil War forced the closing of many colleges throughout the South, but the university at Chapel Hill was able to continue holding classes. (paragraph 6) C "In 1932, the University of North Carolina was consolidated, or joined together, which the three campuses would now offer different kinds of programs." (paragraph 6) D "Because of its lovely setting and old-fashioned appeal, the town attracts quite a few people of retirement age...." (paragraph 7) meanplease help :,)