For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which feature or menu option should she use?

Answers

Answer 1

Answer: See explanation

Explanation:

Since we are given the information that Annie added the picture of a fruit in a document and wants to enhance it to give a cut-out, she can enhance her document's look by using clip art.

Clips art are simply used for designing and can be used in the illustration of a medium. In this case, the clip art can like a bitmap graphics which typically have a limited quality.

Answer 2

Answer:

Shapes

Explanation:

took the quiz


Related Questions

Arnie is planning an action shot and wants the camera to move smoothly alongside his running characters. He is working on a tight budget and can’t afford expensive equipment. What alternatives could you suggest?

Mount the camera on a wagon, wheelchair, or vehicle and move it next to the characters.
Rearrange your script so you don’t need to capture the motion in that way.
Try running next to the characters while keeping the camera balanced.
See if you can simulate the running with virtual reality.

Answers

Camera and wagon are answer

Libby’s keyboard is not working properly, but she wants to select options and commands from the screen itself. Which peripheral device should she use?
A.
voice recognition
B.
microphone
C.
mouse
D.
compact disk

Answers

C. mouse is the answer

((PLEASE HELP ME)) i need to get all my school work done before thursday
------------- are used to navigate between pages and Web sites.

Question 1 options:

Transitions


Animations


Hyperlinks


None of the above

Answers

Answer:

none of the above

Explanation:

Web navigation refers to the process of navigating a network of information resources in the World Wide Web, which is organized as hypertext or hypermedia. The user interface that is used to do so is called a web browser.

See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.
For instance, for input file:
ABCDEFGHIJKLM
It will output:
ADGJM
Iseek_example.c file contant:
// C program to read nth byte of a file and
// copy it to another file using lseek
#include
#include
#include
#include
void func(char arr[], int n)
{
// Open the file for READ only.
int f_read = open("start.txt", O_RDONLY);
// Open the file for WRITE and READ only.
int f_write = open("end.txt", O_WRONLY);
int count = 0;
while (read(f_read, arr, 1))
{
// to write the 1st byte of the input file in
// the output file
if (count < n)
{
// SEEK_CUR specifies that
// the offset provided is relative to the
// current file position
lseek (f_read, n, SEEK_CUR);
write (f_write, arr, 1);
count = n;
}
// After the nth byte (now taking the alternate
// nth byte)
else
{
count = (2*n);
lseek(f_read, count, SEEK_CUR);
write(f_write, arr, 1);
}
}
close(f_write);
close(f_read);
}
// Driver code
int main()
{
char arr[100];
int n;
n = 5;
// Calling for the function
func(arr, n);
return 0;
}

Answers

Answer:

See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.

For instance, for input file:

ABCDEFGHIJKLM

It will output:

ADGJM

Iseek_example.c file contant:

// C program to read nth byte of a file and

// copy it to another file using lseek

#include

#include

#include

#include

void func(char arr[], int n)

{

// Open the file for READ only.

int f_read = open("start.txt", O_RDONLY);

// Open the file for WRITE and READ only.

int f_write = open("end.txt", O_WRONLY);

int count = 0;

while (read(f_read, arr, 1))

{

// to write the 1st byte of the input file in

// the output file

if (count < n)

{

// SEEK_CUR specifies that

// the offset provided is relative to the

// current file position

lseek (f_read, n, SEEK_CUR);

write (f_write, arr, 1);

count = n;

}

// After the nth byte (now taking the alternate

// nth byte)

else

{

count = (2*n);

lseek(f_read, count, SEEK_CUR);

write(f_write, arr, 1);

}

}

close(f_write);

close(f_read);

}

// Driver code

int main()

{

char arr[100];

int n;

n = 5;

// Calling for the function

func(arr, n);

return 0;

}

Explanation:

What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
O email address
O web address
O UNC path
O All will be automatically converted.

Answers

Answer:

UNC path seems to be the answer

Answer:

UNC path

Explanation:

Can i get any information on this website i'd like to know what its for ?
https://www.torsearch.org/

Answers

Explanation: torsearch.org is a safe search engine mainly used for dark wed purposes. It does not track your location nor give any personal information.

9. Which of the following is the
leading use of computer?​

Answers

Complete Question:

What is the leading use of computers?

Group of answer choices.

a. web surfing.

b. email, texting, and social networking.

c. e-shopping.

d. word processing.

e. management of finances.

Answer:

b. email, texting, and social networking.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.

Also, social media platforms (social network) serves as an effective communication channel for the dissemination of information in real-time from one person to another person within or in a different location. Both email and social networking involves texting and are mainly done on computer.

Hence, the leading use of computer is email, texting, and social networking.

Which of the following statements is false?


Copyright exists the moment a work is created.


Copyright protects intellectual property such as text, art, film, music, or software.


Omitting the © copyright symbol means your work is not copyrighted.


Copyright is free.


You are not required to register your copyright.

Answers

Everything is false except the third one :)

It is false that omitting the © copyright symbol means your work is not copyrighted. The correct option is C.

What is a copyright?

Original works of authorship are protected by copyright, a type of intellectual property, as soon as the author fixes the work in a tangible form of expression.

The creators of the works of expression typically control the copyrights, however there are some significant exceptions: When an employee produces a work while employed, the employer is the rightful owner of the copyright.

Some individuals think that a work isn't covered by copyright law if it doesn't display a copyright emblem. That is untrue. The copyright symbol need not be used in most situations.

Thus, the correct option is C.

For more details regarding a copyright, visit:

https://brainly.com/question/14704862

#SPJ2

Give me good answers

1- what is the money?

2- what is the wealth?

How can it be used for good

Answers

Answer:

Money is currency

Explanation:

Is is how you pay for items

A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?
A. Four bits are not enough to store the eight directions. Five bits are needed for the new version of the game.
B. Four bits are enough to store the eight directions
C. Four bits are not enough to store the eight directions. Sodeen bits are needed for the new version of the game.
D. Four bits are not enough to store the eight directions. Eight bits are needed for the new version of the game.

Answers

Answer:

B. Four bits are enough to store the eight directions

Explanation:

The summary of the question is to determine whether 4 bits can store 8 directions or not.

To understand this question properly, the 8 bits will be seen as 8 different characters.

In computer memory, a computer of n bits can store 2^n characters.

In this case:

[tex]n = 4[/tex] i.e. 4 bits

So:

[tex]2^n = 2^4[/tex]

[tex]2^n = 16[/tex]

This implies that the memory can store up to 16 characters.

Because 16 > 8, then (b) answers the question.

Which option should Curt use to share his calendar with other users inside his organization?
O Email Calendar
O Share Calendar
O Publish Online
O Share Online

Answers

Answer:

Share calendar

Explanation:

Because you will be able to limit certain permissions to the organization rather than emailing it.

also, edge unit test 2022

Curt should use to share his calendar with other users inside his organization  "Share Calendar"

What is calendar ?

A calendar is a method of structuring and displaying time, typically for the purpose of planning and scheduling events or activities. It typically shows dates, days of the week, and yearly months and enables people to keep track of events like meetings, appointments, birthdays, and holidays. A desk calendar, a physical wall calendar, or an electronic calendar stored on a computer, smartphone, or other device are all examples of calendars

The correct option for Curt to share his calendar with other users inside his organization is "Share Calendar".

To know more about calendar check:

https://brainly.com/question/17524242

#SPJ6

Use devices that comply with _____________ standards to reduce energy consumption.


Energy Star


Energy Plus


Power Pro


Data Center


Power Star

Answers

Answer:

energy star

Explanation:

I just got it correct

The correct option is A. Use devices that comply with Energy Star standards to reduce energy consumption.

How much energy does ENERGY STAR save?

Depending on the comparable model, Energy Star appliances can help you save anywhere between 10% and 50% of the energy needed. If you are replacing an older appliance, you can save even more. The Department of Energy and the Environmental Protection Agency jointly administers the Energy Star program.

Through the use of energy-efficient goods and practices, it seeks to assist consumers, businesses, and industry in making savings and safeguarding the environment. The Energy star badge identifies high-performing, economical houses, buildings, and products.

Thus, the Use of Energy Star-certified equipment to cut down on energy use; is option A.

Learn more about Energy Star here:

https://brainly.com/question/27093872

#SPJ2

The virus which activated on a specific data and time is called

Answers

Trojans and other computer viruses that activate on certain dates are often called "time bombs".

define a computer, state its 3 main activities with examples of the functions of each of those activities​

Answers

Answer:

The four main functions of a computer are to:

- take data and instructions from a user

-process the data according to the instructions

- and display or store the processed data.

These functions are also referred as the input function, the procedure function, the output function, and the storage function.

Explanation:

When text is used as a Hyperlink, it is usually underlined and appears as a different color.

Question 3 options:
True
False

Answers

True it usually shows up with a blue underline

When machining rotors, what is the reason for setting the indexing collars to zero?

A. To know how much metal was taken off of each side.

B. To make sure that no cut exceeds .010 inch

C. To determine the proper cut speed of the Brake Lathe.

D. To measure the depth of the grooves on the rotor surface.

Answers

Answer:

To determine the proper cut speed of the brake lathe

To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.

What is indexing collars?

Thus, they can have a maximum of 256 colors, which is the amount of colors that 8 bits of information can specify (28 = 256). Fewer colors are produced by lower bit depths, which also result in smaller files. At the conclusion of this chapter, in Section 19.8, this is covered.

"Indexed color" refers to the fact that a color table contains the palette—the collection of colors—of the image. A reference (or "index") to a table cell containing the pixel's color is present in each pixel of the image.

By choosing Image Mode Color Table in Photoshop, you can view the table for an indexed color image.

Therefore, To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.

To learn more about indexing collars, refer to the link:

https://brainly.com/question/12608731

#SPJ2

hy plzz help me friends​

Answers

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

Answer:

Ram which stands for random access memory, and Rom which stands for read only memory are both present in your computer. Ram is volatile memory that temporarily stores the files you are working on. Rom is non-volatile memory that permanently stores instructions for your computer

In matlab how would this specific code be written and how could I ask the user to enter a vector of coefficients for the polynomial model. Verify that the entry has an even number of elements (an odd number of elements would mean an even order polynomial). If an invalid vector is entered, prompt the user to re-enter the vector until an acceptable vector is entered. If the user does not enter an acceptable vector after 5 attempts (including the first prompt), display a warning and remove the last element of the last vector entered. (For example, if the last user input is [1 2 3 4 5], the vector becomes [1 2 3 4]).
my code
[1,2,3,4];

Answers

Answer:

Explanation:

that is correct 1234

What is the New York Times doing to try to keep up with digital technology?

Answers

Answer:

Clover Food Labs: Using Technology to Bring The “Real Food” Movement to Cambridge, ... The New York Times is one of the many companies that has had its existence ... That monthly limit has since been reduced to 10 articles in an attempt to ... which has at least kept pace with the limited expectations for the industry

What is your favorite LEGO set

Answers

Answer:

star wars death star....

i like any of them they are all so cool lol

What is a key consideration when evaluating platforms?

Answers

Answer:

The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.

When gathering the information needed to create a database, the attributes the database must contain to store all the information an organization needs for its activities are _______ requirements.

Answers

Answer:

Access and security requirements

Very large storage system that protects data by constantly making backup copies of files moving across an organization's network is known as ...

Answers

Answer:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

Explanation:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

What is File system failure?

File system failure refers to disk-related errors that may be due to corrupt files,  disk integrity corruption, file execution policies, bad sectors, etc. These errors may prevent be causing users from accessing or opening files. The first line of defense against a file system failure is a well-defined set of proper system backup and file maintenance procedures.

These errors can be encountered in files such as images, documents, PDFs, movies, etc. In order to protect and provide defense against file system failure, it is important to manage proper backup and file maintenance procedures.

Therefore, RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

You can learn more about file system at:

brainly.com/question/14312784

#SPJ2

List 3 clinical tools available in the EHR and discuss how those benefit the patient and/or the practice

Answers

Thor Odin and Aries the threes listed powerful

A musician has recorded some initial ideas for new songs which she wishes to share with her bandmates. As these are initial ideas she is not too concerned about the quality of the audio files she will send, but does wish the size of the files to be as small as possible so they can be easily downloaded by her bandmates, including using mobile data. Which of the following should she do to meet these requirements? Select two answers.
Save the audio using a high sampling rate.
Save the audio using a low sampling rate.
Save the audio using a low bit depth.
Save the audio using a low amplitude (volume).

Answers

Answer:

1.save the audio using a low sampling rate

2.save the audio using a low bit depth

Explanation:

1. if the quality of the audio is low then the size of the audio will also be low and which will make the size of the data to be less and also easier to download

Is there an alternative website of https://phantomtutors.com/ to get guidance in online classes?

Answers

Answer:

The website is

classroom

Explanation:

solve x + 4 / x - 3 = 4 , step by step explanation will mark as brainliest ​

Answers

Answer:

I didn't get the exact answer..but hope this help

Select the true statement about network protocols.A protocol determines how the sending computer notifies the receiving computer about the presence of compressed data.A protocol determines how it will be executed on every networked device.A protocol determines how the sending device notifies the receiving device that there is data to be sent.A protocol is not required for all data transmissions.

Answers

Answer:

A protocol determines how the sending device notifies the receiving device that there is data to be sent.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A protocol can be defined as a standard set of rules established by the regulatory agencies to determine how data are transmitted from one network device to another.

Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

A protocol determines how the sending device notifies the receiving device that there is data to be sent, regardless of any difference in terms of structure or design.

grade 11 essay about the year 2020​

Answers

Answer:

This 2020 have a new normal class because of CO VID-19 Disease have more students and teachers patient the teachers is preparing a module to her/his student and the student is answering are not learning lesson because of the COV ID-19 the whole word enduring to that pandemic and all fronliners is the hero in this pandemic because all frontliners is helping the people to we heal and to healed that virus.

Explanation:

Your co-worker who went to UCLA tells you that DHCP is not enabled at your new job, so you should just use the same IP address that you have at home to connect to the internet. He told you it should work because your computer is communicating with a unique public IP address at home, so no other computer in the world would have it. When you try this, your computer does not have internet access. Give two reasons why?

Answers

Answer:

1. internet connection is not enabled on the computer.

2. The DHCP server in the company is not enabled as well.

Explanation:

For a user to access the internet, the computer must have a public IP address that is either assigned to it by a service provider or dynamically from the DHCP server in the computer. In the case of the former, the user just needs to enable the internet connection to obtain the unique IP address.

If the DHCP server or the internet connection is not enabled, the user would not have access to the internet.

Other Questions
Solve each of the following equations plsss help ill give brainliest if you give a correct answer What was the purpose of the caste system? I -9I = ____HELP HELP ME ME ASAP PLEASE Child with Toy Hand Grenade in Central Park, N Y C. A little boy stands in the park with the left strap of his overalls off his shoulder. He holds a toy grenade in his right hand and his left hand is clenched like a claw. What is disturbing about the boy in the above photograph? help answer both plz! Someone help and plz make sure its right plz! :) Which expression shows the total area of 5 rooms, if thesides of 3 rooms measure 17 feet each, and the sides of2 rooms measure 15 feet each? Select one of these topics, and imagine a conversation in which someone tries to make a point using a form of fallacious reasoning. Write the conversation as you imagine it, focusing on the error in logic. It will be on the The value of reading vs. Watching television What is the day after the day after tomorrow if the day before the day before yesterday was Friday ? Simplify 5u^2w^3 x 7uw^3 One of the most powerful tools you have to create variety and to offer readers visual relief isa) pulled quote.b) infographics.c) white space.d) L-shaped layout. Could somebody please help me? Select the correct answerWhich biogeochemical cycle includes the exoskeleton and shells of marine organisms as a reservoir? A) carbon B) nitrogen C) sulfur D) oxygen Thank you! :) Like a boil that can never be cured as long as it is covered up but must be opened with all its pus-flowing ugliness to the natural medicines of air and light, injustice must likewise be exposed, with all of the tension its exposing creates, to the light of human conscience and the air of national opinion before it can be cured. type of figurative language? I need help with this as fast as possible thanks bye Will most likely cause the formation of a MountainA. Divergent boundary B. Convergent boundary C. Transform boundary What was an early negative effect of the ruling in Georgia?Schools were not large enough to hold the childrenStudents at white schools were treated unfairlyStudents at black schools had to relocateThe General Assembly stopped funding desegregated schools how do i make chrystals using home suppplies Question one: what is the first step to solving x+5=27 And what is the answer using perfect algebra format Question two: What is the first step to solve 3w=-4 and what is the answer to the problem Cynthia, a sole proprietor, was engaged in a service business and reported her income on the cash basis. On February 1, 2013, she incorporates her business as Dove Corporation and transfers the assets of the business to the corporation in return for all of the stock in addition to the corporations assumption of her proprietorships liabilities. All of the receivables and the unpaid trade payables are transferred to the newly formed corporation. The balance sheet of the corporation immediately after its formation is as follows: Dove Corporation Balance Sheet February 1, 2013Assets Basis to Dove Fair Market ValueCash $ 80,000 $ 80,000Accounts receivable 0 240,000Equipment (cost $180,000; 120,000 320,000 depreciation previously claimed $60,000)Building (straight-line depreciation) 160,000 400,000Land 40,000 160,000Total $400,000 $1,200,000Liabilities and Stockholders EquityLiabilities:Accounts payabletrade $ 120,000Notes payablebank 360,000Stockholders equity:Common stock 720,000Total $1,200,000Discuss the tax consequences of the incorporation of the business to Cynthia and to Dove Corporation.