what are two reasons for choosing transport layer security (tls) over ip security (ipsec) encryption?.

Answers

Answer 1

IPsec encrypts the IP packet, resulting in lesser application-level security are the two reasons for choosing  TLS over IP.

Where is TLS utilized and what does it do?

The most popular protocol for applying cryptography on the web is Transport Layer Security (TLS). TLS uses several cryptographic techniques to offer safe network connections. An overview of TLS and the cryptography procedures it employs are given in this section.

What serves as IP security?

The Internet Engineering Task Force (IETF) standard suite of protocols known as IP security (IPSec) provides data authentication, integrity, and confidentiality between two communication points via an IP network. Additionally, it defines authenticated, encrypted, and decrypted packets.

To know more about TLS visit:

https://brainly.com/question/16986184

#SPJ4


Related Questions

____ are used to connect computers, hubs, switches, and routers to a network in a local area network (LAN).

Answers

Answer:

Network interface card (NIC) or wireless network interface controller (WNIC)

Explanation:

To connect a computer or device to a local area network (LAN), several hardware components are required: a network interface card (NIC) or wireless network interface controller (WNIC) a transmission medium, either wired or wireless a network connection device, such as a router, hub, switch, wireless access point (WAP), gateway or bridge

in which collision-avoidance hashing strategy are the items stored in an array of linked lists in which each item's key locates the bucket where the item is to be inserted?

Answers

In separate chaining, collision-avoidance hashing strategy are the items stored in an array of linked lists in which each item's key locates the bucket where the item is to be inserted.

What is Separate Chaining?

The array is implemented as a chain, which is a linked list, when separate chaining is used. Separate chaining is one of the most well-liked and frequently used ways for handling mishaps.

The linked list data structure is used in this method's implementation. A chain, which is a singly-linked list, is created as a result of many elements being hashed into the same slot index.

The linked list in this case contains all the elements that hash to the same slot index. The linked list can now be searched using a key K by simply linearly traversing the list. The intrinsic key for any entry must equal K in order for us to know that we have located the entry. If we have searched all the way to the end of the linked list and still can't find our entry, then the entry isn't there. As a result, it follows that while separate chaining, if two different elements have the same hash value, we store them both in the same linked list one after the other.

To learn more about separate chaining visit:

https://brainly.com/question/13091820

#SPJ4

what spreadsheet function enables you to put each of the colors in column g into a new, separate cell? 1 point divide mid delimit split

Answers

The spreadsheet function that enables you to put each of the colors in column g into a new, separate cell is option D: SPLIT.

What does a function in the sample spreadsheet mean?

A function is a preset formula that conducts calculations. Common functions that can be used to rapidly determine the sum, average, count, maximum value, and minimum value for a range of cells are included in all spreadsheet systems.

Therefore, one can say that the use SPLIT to divide each color in Column G into its own distinct cell. The spreadsheet function SPLIT separates text into smaller chunks and places each one in a different cell, all around a predetermined character.

Learn more about spreadsheet function from

https://brainly.com/question/4965119
#SPJ1

2. extended subtraction procedure create a procedure named extended sub that subtracts two binary integers of arbitrary size. the storage size of the two integers must be the same, and their size must be a multiple of 32 bits. write a test program that passes several pairs of integers, each at least 10 bytes long.

Answers

A technique called extended subtraction is used to show how to subtract integers that have been expanded.

What is expanded notation with subtraction?

Expanded form aids in the retention of the fact that each digit in a number has a value corresponding to its position in the number. When combining huge numbers, students can be flexible in their calculations.

To show how to subtract extended-form integers, the concept of expanded subtraction is employed. A number is written in expanded form when the place values of each digit are shown.

we take the following figure out of the result. Up until the final number is removed, we proceed as before. Our response is the solitary number that remains.

To learn more about extended subtraction refer to:

https://brainly.com/question/16013794

#SPJ4

By following a structured troubleshooting approach, a network administrator identified a network issue after a conversation with the user. What is the next step that the administrator should take?

a. Verify full system functionality.
b. Test the theory to determine cause.
c. Establish a theory of probable causes.
d. Establish a plan of action to resolve the issue.

Answers

The next step that the administrator should take is  Establish a theory of probable causes.

What is troubleshooting?You might follow a troubleshooter through multiple steps and be prompted to check settings or connections. It then displays its findings, along with a link to view more information that displays a troubleshooting report.Troubleshooting is a type of problem resolution that is frequently used to fix broken components or operations on a machine or a system.In order to address an issue and get the product or process back in operation, a logical, methodical search for the problem's source is required.When resolving server problems, IT professionals typically adhere to some basic rules. Pressing Control-Alt-Delete on a computer to access the Microsoft Windows Task Manager allows users to identify which programmes have stopped responding, close them, and restart the system. This is a simple troubleshooting technique.

To learn more about troubleshooting refer to:

https://brainly.com/question/14394407

#SPJ4

What would this be?

Answers

Looking into this, the ones that I found that are EC-Council Certified are:

Ethical Hacker (CEH)
Goals:
- Master an ethical hacking methodology
- Grasp complex security concepts
- Learn how to scan, hack, test and secure an organizations information systems


EC-Council Licensed Penetration Tester (LPT) Master

to change how cells appear, you use conditional formatting. then, to highlight cells with a value of at least $100, you choose to format cells if they have a value greater than or equal to 100. 1 point true false

Answers

Answer: True

Explanation:

In order to change appearance to a cell, you have to use conditional formatting. The statement says that it has to be greater than or equal to 100 which is correct.

Asia is selling bracelets to raise money for the school's band trip. She needs to determine how much she has already raised and how many more bracelets she must sell. Which response best explains why a computer would perform this task better than a human?

Computers can perform calculations at unbelievable speeds.
Computers can think creatively.
Computers can replicate human tasks.
Computers don't require sleep.

Answers

Note that where Asia is selling bracelets to raise money for the school's band trip and she needs to determine how much she has already raised and how many more bracelets she must sell, the response that best explains why a computer would perform this task better than a human is: "Computers can perform calculations at unbelievable speeds." (Option A)

What is the speed of the fastest computer?

Frontier, the fastest supercomputer on the TOP500 supercomputer list as of May 2022, with a LINPACK benchmark score of 1.102 ExaFlop/s, followed by Fugaku. The United States has five of the top ten, China has two, and Japan, Finland, and France each have one.

As of June 2022, China had 173 of the world's 500 most advanced and powerful, one-third more than its next competitor, the United States, which had an additional 128 supercomputers.

Learn more about computing speed:
https://brainly.com/question/2072717
#SPJ1

you are an it director for a large school system. you need to set up inbound and outbound rules on the windows 10 machines. what will you use to accomplish this?

Answers

You will use to accomplish this Windows Defender Firewall with Advanced Security.

What aspect of Windows 10 makes configuration easier?Purview offers a sophisticated set of features while streamlining configuration setup. Regarding: Windows 10. MS Windows 11.GPO settings are updated more often by default on domain controllers—every 5 minutes. The GPO's Set Group Policy refresh interval for machines option is found in the Computer Configuration -> Administrative Templates -> System -> Group Policy section, where you may modify the GPO update frequency.A microprocessor called a Trusted Platform Module (TPM) is made to perform fundamental security-related tasks, mainly those requiring encryption keys. A hardware bus is used by the TPM to connect with the rest of the system after it has been placed on the motherboard of a computer.

To learn more about Windows Defender refer to:

https://brainly.com/question/29352945

#SPJ4

which of the following describe a system image backup? answer a system image contains everything on the system volume, including the operating system, installed programs, drivers, and user data files. a system image does not include operating system files, program files, encrypted files, files in the recycle bin, user profile settings, or temporary files. a system image includes only specified files and folders backed up to a compressed file. a system image only contains the operating system, installed programs, drivers, and user profile settings.

Answers

A statement which describe a system image backup include the following: A. a system image contains everything on the system volume, including the operating system, installed programs, drivers, and user data files.

What is data?

In Computer technology, data can be defined as any representation of factual instructions or information in a formalized and structured manner, especially as a series of binary digits (bits), symbols, characters, quantities, or strings that are used on computer systems in a company.

Generally speaking, a system image backup comprises all the data that are stored on the computer system volume, as well as the operating system (OS), installed software programs, drivers, and other user data files (documents).

Read more on data here: brainly.com/question/26207955

#SPJ1

you decide to create an r markdown notebook to document your work. what are your reasons for choosing an r markdown notebook? select all that apply.

Answers

Since you decide to create an r markdown notebook to document your work. The reasons for choosing an r markdown notebook are:

B It lets you record and share every step of your analysis

C It displays your data visualizations

D It allows users to run your code

What does R Markdown notebook mean?

The code chunks can be independently and interactively executed in a R Notebook, which is a document written in R Markdown. By doing this, you may evaluate the output as you construct your R Markdown document without having to knit the entire thing.

Additionally, R Markdown allows for the compilation of R scripts into notebooks that contain script output, source code, and commentary. Any output format, including MS Word, HTML, and PDF, can be created from a notebook.

Therefore, a person can decide to utilize a R Markdown notebook to record and share each step of your study because it enables you to do so. The notebook displays your data visualizations and lets users run your scripts.

Learn more about r markdown notebook from

https://brainly.com/question/25558534
#SPJ1

See full question below

Q:

Scenario 2, continued

As a final step in the analysis process, you create a report to document and share your work. Before you share your work with the management team at Chocolate and Tea, you are going to meet with your team and get feedback. Your team wants the documentation to include all your code and display all your visualizations.

You decide to create an R Markdown notebook to document your work. What are your reasons for choosing an R Markdown notebook? Select all that apply.

Multiple Choice Question. Please Choose The Correct Options ✔

A

It automatically creates a website to show your work

B

It lets you record and share every step of your analysis

C

It displays your data visualizations

D

It allows users to run your code

treasury regulation § 1.6695-2 details the due diligence requirements. how many requirements are there?

Answers

If you are paid to prepare a tax return or make a refund claim claiming any of these tax benefits, you must comply with four specific due diligence obligations as outlined in Treasury Regulation 1.6695-2.

What is Treasury regulation?A recognized disciplinary body of the US federal government is the US Sentencing Commission.The panel suggested 7 actions that corporations should take to demonstrate due diligence: The business must create and publish a code of ethics describing the essential requirements and identifying the organization's main danger zones. The system is overseen by high-ranking organizations that are thought to adhere to business regulatory and ethical standards (such as an ethics director, vice president of operations, general advocates and so forth).No one who has a history of misconduct ought to have a position of leadership.There will also be a training course (Ethics Training) for distributing guidelines and procedures.

To learn more about Treasury regulation refer:

brainly.com/question/29807625

#SPJ4

define the function outputvals() that takes two integer parameters and outputs all integers starting with the first and ending with the second parameter, each followed by a newline. the function does not return any value. ex: if the input is 1 5, then the output is: 1 2 3 4 5

Answers

The function outputVal () produces the product of all integers starting with the first parameter and finishing with the second parameter, followed by a newline. It accepts two integer parameters.

What is outputVal () ?

#include <iostream>

using namespace std

void OutputValues(int n1, int n2) {

for (int i = n1; i <= n2; i++) {

 cout << i << endl;

}

}

int main() {

int num1;

int num2;

cin >> num1 >> num2;

OutputValues(num1, num2);

return 0;

}

The outputvals() function produces the product of all integers starting with the first parameter and finishing with the second parameter, followed by a newline. It requires two integer parameters.The number you enter into the expression serves as the input, and the result of any calculations or look-ups is the output. What inputs are acceptable—the entries that are permitted and make sense for the function—depends on the type of function. The outputs that may be produced from those inputs are also controlled by the function.

To learn more about outputVal () refer to:

https://brainly.com/question/25343043

#SPJ4

b) every statement in a program must end with a semicolon. c) every method must end with a semicolon.

Answers

The semicolon is a statement separator in the Java programming language. That is, a semicolon must be used to end each sentence.

Why do computers use Java's 0s and 1s?

Computers can transform the waves into bits of data, or ones and zeros, to lessen interference. Bits, as opposed to wave forms, are less susceptible to interference and produce better audio and visual output.

How are binary digits used by computers?

The central processing unit (CPU) and RAM of computers may store binary code, which is composed of digital 1s and 0s, to represent numbers. Inside the CPU or RAM, these digital numbers are electrical signals that are either on or off.

To know more about JAVA visit;

https://brainly.com/question/12978370

#SPJ4

Treasury regulation §1.6695-2 presents a standard for when you must make additional inquiries to meet due diligence requirements. T/F

Answers

When further inquiries are necessary to satisfy the duties of due diligence, Treasury Regulation 1.6695-2 provides a standard.

What is Treasury regulation requirements?In order to claim the EITC, CTC/ACTC/ODC, AOTC, or HOH filing status, a paid tax return preparer must comply with the four due diligence standards set forth in the Regulations. According to IRC 6695(g), a penalty of $500* must be paid for each time a tax return preparer fails to follow the due diligence requirements imposed by the Secretary by regulations with regard to determining eligibility for or the amount of the credit allowed by section 32. This penalty is applicable to all returns and refund claims.The Internal Revenue Service (IRS), a department of the Treasury Department of the United States, problems the tax guidelines referred to as the Treasury Regulations. These guidelines, which constitute the Treasury Department's legitimate interpretations of the Internal Revenue Code, are one supply of U.S. federal earnings tax law.

To learn more about Treasury regulation requirement refer:

brainly.com/question/28606881

#SPJ4

you are an application developer. you use a hypervisor with multiple virtual machines installed to test your applications on various operating systems' versions and editions. currently, all of your virtual machines used for testing are connected to the production network through the hypervisor's network interface. however, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. to prevent issues, you decide to isolate the virtual machines from the production network. however, they still need to be able to communicate directly with each other. what should you do? (select two. both responses are part of the complete solution.) answer create mac address filters on the network switch that block each virtual machine's virtual network interfaces. disable the switch port the hypervisor's network interface is connected to. create a new virtual switch configured for bridged (external) networking. disconnect the network cable from the hypervisor's network interface. connect the virtual network interfaces in the virtual machines to the virtual switch. create a new virtual switch configured for host-only (internal) networking.

Answers

Connect the virtual switch to the virtual network interfaces in the virtual machines. Make a brand-new virtual switch with host-only (internal) networking settings.

What is virtual network interfaces ?

A computer can connect to a network using a virtual network interface, which is a software-based network interface. It works similarly to a real network interface, such an Ethernet card, but without the need for any hardware. Instead, the operating system or virtualization software is used to generate and administer it altogether. A virtual switch is a software-based network switch that enables communication between virtual networks and other virtual network devices as well as with physical networks.

By forwarding packets between the physical network and the virtual network, it serves as a bridge between the two. Similar to a virtual network interface, a virtual switch can be established and maintained solely within the virtualization program without the need for any hardware.

To learn more about virtual machines refer :

https://brainly.com/question/28271597

#SPJ4

Which of the following web design software would allow the web designer to create videos?
A. FTP
B. Text editor
C. Storyboard
D. Flash

Answers

Answer: FTP

Option A.

Explanation:

The answer is D. Flash.

what spreadsheet tool allows you to control what can and cannot be entered in your worksheet in order to avoid typos? 1 point data validation find vlookup list

Answers

The spreadsheet tool allows you to control what can and cannot be entered in your worksheet in order to avoid typos is option A: data validation

What does validation mean in data?

Spreadsheet software is a type of computer program that can store, organize, and analyze data in tabular form. The software is capable of simulating paper accounting worksheets digitally. They may also contain several interconnected sheets.

Before using, importing, or otherwise processing data, data validation refers to verifying the quality and accuracy of the source data. Depending on the limits or aims of the destination, many methods of validation can be carried out. Data cleansing also includes data validation.

Therefore,  the work of Data quality and accuracy are ensured through a procedure known as data validation. In order to assure the logical consistency of input and stored data, it is implemented by including a number of checks in a system or report. Data is entered into automated systems with little to no human oversight.

Learn more about spreadsheet tool from

https://brainly.com/question/22719337
#SPJ1

the preferred method for capturing a query includes facility-approved query forms, fax transmissions, or secure email / it messaging. true false

Answers

A precise and simple medical question is required. From the health record, it should include clinical indicators.

What does a question mean in the healthcare industry?

In any healthcare context, a query is a method or communication tool used to clarify information in the patient's medical file to ensure documentation integrity and proper code assignment for a given encounter. The words "clarification" and "clinical clarification" are all alternatives for the word "query."

What does a diagnosis query mean?

In order to increase the specificity and completeness of the information used to assign diagnostic and procedure codes in the patient's health record, a physician query is defined as a written request to a doctor for further, clarifying documentation.

To know more about Query visit;

https://brainly.com/question/29575174

#SPJ4

what is a collision in a hash table? what is a collision in a hash table? two different keys hashing to a value outside of the range of the table. two different keys being normalized into the hash table at the same index. all keys added to the table without any collisions. a hash function that returns a hash value that does not need to be normalized into the table. a hash table that is completely full. a hash table that does not have any primary clustering. a hash function that yields a uniform distribution in its hash results before normalization.

Answers

When two keys in a hash table are hashed to the same index, a collision occurs. Because each slot in a hash table is meant to hold just one element, collisions are a concern.

What does a hash table collision mean?

Collisions. When multiple values are hashed by a certain hash function hash to the same position in the table or data structure (hash table) being generated by the hash function, a collision occurs.

What does collision mean in C++ hashing?

When another key will be mapped to an already-occupied slot, this is referred to as a collision. We need a collision management method to fix this issue. Here are several strategies for dealing with collisions: Separate chaining is a method for directing each hash table cell to a chaining node, linked list, or both.

to know more about collision here:

brainly.com/question/13138178

#SPJ4

A collision happens when two keys in a hash table are hashed to the same index. Collisions are a problem since a hash table is designed to retain just one entry in each slot.

What does a hash table collision mean?

Collisions. When multiple values are hashed by a certain hash function hash to the same position in the table or data structure (hash table) being generated by the hash function, a collision occurs.

What does collision mean in C++ hashing?

A collision occurs when a different key will map to a slot that is already occupied. To resolve this problem, we require a collision control technique. Here are a few approaches to avoid collisions: Each hash table cell can be directed to a chaining node, a linked list, or both using the separate chaining technique.

To know more about collision here:

brainly.com/question/13138178

#SPJ4

which is not a characteristic of web 2.0? group of answer choices user-centered design static content rich user experience web as a platform crowd sourcing g

Answers

Crowd sourcing is not a characteristic of web 2.0.

What characteristics does Web 2 have?

Web 2.0's main traits include the ability to access web-based apps from any location.

Simple programs address certain issues.Content, not the tools used to show it, is what has value.Sharing of data is simple.Instead of top-down, distribution is bottom-up.a general phrase for Internet apps that emphasize user collaboration, user-generated content sharing, and social networking.The phrase "Web 2.0" is used to characterize the second generation of the World Wide Web, which is centered on enabling online collaboration and information sharing. Web 2.0 essentially describes the shift from static HTML Web sites to a more dynamic, more straightforward Web. koobface.

To learn more about web 2.0 refer to:

https://brainly.com/question/12105870

#SPJ4

what is the syntax for the cmd.exe command to view the attributes on a file named batch1.bat in windows 10

Answers

The attrib command, which shows, modifies, or deletes characteristics associated with files or directories, is referenced in this article.

What does the cmd attrib command do?

Your attr list name is the name of the file that the ATTRIB command allocates. Your active attribute lists can be listed using the LISTALC command and the STATUS operand. The data set name is NULLFILE, which is also the name of the data set for files allocated using the ALLOCATE command's DUMMY option.

What in a computer is attrib?

A user can alter certain properties, or "attributes," of a computer file or directory by using the ATTRIB command in Intel ISIS-II, DOS, IBM OS/2, Microsoft Windows, and ReactOS. The EFI shell also has the command available.

To know more about attrib command visit: -

https://brainly.com/question/10169933

#SPJ4

which attack is typically used specifically against password files that contain cryptographic hashes?

Answers

The decryption of data using a birthday attack is a form of cryptographic attack that looks for matches in the hash function.

What is meant by birthday attack?

However, only the birthday attack expressly targets the cryptographic hashes kept in a system's password file. All of the other attack techniques listed may be used against passwords.

An example of a cryptographic attack that takes advantage of the birthday problem's math is the birthday attack. A communication breach between two or more parties may be caused by this attack.

You have a one in 365 chance of having a birthday in the same year as each of the other 22 people in a room of 23, or a total of 22/365 chances, if there are 23 people present. Joe has a 21/365 probability of having a birthday in common with the persons who are still present if you don't match.

A birthday attack is a type of cryptographic attack that decrypts data by searching for matches in the hash function.

Therefore, the answer is birthday attacks.

To learn more about  birthday attacks refer to:

https://brainly.com/question/18566296

#SPJ4

which happens first authorization or authentication? group of answer choices authorization authentication authorization

Answers

Identity is necessary for both authentication and authorization. Authentication always occurs before authorization because you cannot identify a person or service before you authorise them.

What is ISA server?

When using Outlook Anywhere, a conventional log-in box is used to submit the client's credentials to the ISA server. When using Outlook Web Access, forms-based authentication is used to communicate the client's credentials. A server assesses if a client has permission to use a resource or access a file through the authorization procedure. Authentication and authorization are frequently combined so that the server can identify the client making the access request. Someone may be verified in one of three ways.

To learn more about frequently  from given link

brainly.com/question/13305546

#SPJ4

you have a very small network in a home-based office, and you want to limit network access to only those hosts that you physically own. what should you utilize to make this possible?

Answers

Enable MAC filtering can be utilised to limit network access to only those hosts that you physically own.

What use does MAC filtering serve?

By using MAC address filtering, you may prevent communication from particular recognized workstations or devices. A computer or other device on the network is recognized by its MAC address, which the router uses to decide whether to allow or deny access. The policy will determine how traffic entering from a certain MAC address is screened.

Should you permit MAC filtering?

Since it is so simple to spoof a MAC address and obtain unauthorized access to a network, MAC address filtering is actually far from secure. Additionally, while MAC address filtering does offer businesses a false feeling of security, it renders them more susceptible to security breaches.

To know more about MAC filtering visit

brainly.com/question/14527362

#SPJ4

suppose you run the following code: public static void main(string[] args) { try { statement1; m(); statement2; } catch (exception2 ex { statement3; } } public static void m() { try { statement4; statement5; statement6; } catch (exception1 ex1) { statement7; } finally { statement8; } statement9; } answer the questions: 1. if no exception occurs, which statements are executed? 2. if statement5 throws an exception of type exception1, which statements are executed? 3. if statement5 throws an exception of type exception2, which statements are executed? 4. if statement5 throws an exception that is neither exception1 nor exception 2, which statements are executed?

Answers

The main() method is a particular Java programming method that acts as a Java program's publicly accessible entry point.

What is public static void main ?

All other Java methods call the main method, which is public static void. Learn what each of the keywords in the "public static void main" declaration does and why each one is just as important as its neighbor in this fundamental task. You don't actually require a main() function in your Java application for it to compile. However, the JVM (Java Virtual Machine) looks for the main() function while it is running and begins to execute from it.

1. statement1, statement2, statement3, statement5, statement6, statement7.

2. statement1, statement2, statement4, statement5, statement6, statement7.

3. statement1, statement2, statement5.

4. statement1, statement2, statement5.

To know more about public static void main , visit

https://brainly.com/question/8659179

#SPJ4

the virtual file system layer is dedicated to allow access to: a. different types of locally mounted file systems and remote file systems. b. locally mounted file systems only. c. remote file systems only. d. locally mounted file systems or remote ones, but for one type of file system only.

Answers

The virtual file system layer is dedicated to allow access to a. different types of locally mounted file system and remote file systems.

The virtual file system or VFS is a forms of an interface between a concrete file system and operating system's kernel. VFS function is to give abstraction layer that the application can access the different types of the file system in local or in a network storage of devices.

So, the VFS will allow access to different types of file which the option d is incorrect. Then, the VFS also allow to access in multiple file system source which is local and network or remote, so the option b and option c is incorrect.

Learn more about virtual file system here:

brainly.com/question/28233138

#SPJ4

when choosing an algorithm, faster run times can often be achieved at the expense of what other resource? group of answer choices

Answers

Active memory is the other resource of faster run times can often be achieved at the expense when choosing an algorithm.

What is the active memory?With active memory, the memory system handles calculation tasks that are traditionally handled by a CPU. Because processing is done close to the data rather than having to move it across chip interconnects from memory to the processor, performance is enhanced and energy consumption is decreased.A tasty dish's appearance brings up memories of its flavour. Passive memory can be seen in several situations. However, our memory is active when we make a conscious attempt to recall a previous event. Recollection is the term for active memory.When data is retrieved from storage, computations are made in RAM, which is employed as active memory. Data must be erased from NAND flash memory in whole blocks, which is a key distinction between flash memory and RAM.

Learn more about active memory refer to :

https://brainly.com/question/13671958

#SPJ4

which is the keyboard shortcut for deleting with a rectangular selection while using the eraser tool?

Answers

Ctrl + x and command + x are the keyboard shortcut for deleting with a rectangular selection while using the eraser tool in Windows and MacOS respectively in photoshop.

What is photoshop?

Photoshop is a photo editing and raster graphic design programme that enables users to produce, edit, and work with a variety of graphics and digital art. Additionally, it enables the import of images in different file formats as well as the creation and editing of multi-layered raster images.

The Windows and MacOS versions of Photoshop are created by Adobe Systems. Thomas Knoll and John Knoll developed Photoshop in 1988, and Adobe Systems bought the official distribution rights to the software. Numerous updates to Photoshop have been released since then.

Learn more about Photoshop

https://brainly.com/question/16859761

#SPJ4

You are playing a game in which different clans fight over the throne to a country. You find an important clue in the form of a robe that the king or queen would wear. What color is the robe most likely to be? purple orange blue green

Answers

PURPLEEEEEEEEEEEEEEE
Other Questions
Given: segment BD bisects angle ABC and segment BD bisects angle ADC. Prove: segment AD is congruent to segment CD Will mark brainly and help with other stuff too!!! the results of the experiemnts can be used as evidence in support of which of the following scientific colaiims about mitochrondial activity I need help with my math homework Indicate whether each of the following transactions would increase (+), decrease (-), or not affect (N/A) total assets, total liabilities, and total stockholders equity. how does the pressure of a gas change when it is compressed? group of answer choices it will not change because there is no relationship between volume and pressure. it will increase because p1v1 one force of 6.2 newtons and one force of 4.4 newtons act on a body at the same point so that the resultant force is 9.1 newtons. find the angle between the resultant and the larger force, to the nearest 10th of a degree. events that impact the essential purpose and value of the contract create . a. commercial impracticability b. commercial frustration c. commercial impossibility d. accord and satisfaction Two angles form complements. One angle measure is eight more than twice the other. Find both angles measures. Let the graph of g be a vertical stretch by a factor of 3 and a reflection in the y-axis, followed by a translation 2 units left of the graph of f(x)=x^2-5x+1 . Write a rule for g . Why does the author include information about monkeys listening to the sounds of birds?OA It helps the reader to make the connection between dogs and monkeys as easily trainable to be pets.B.It provides evidence that dogs, monkeys, and snakes understand the language spoken by humans.OC. It reinforces beliefs that all individual species can communicate with each other and with humans. D. It provides evidence for the assertion that dogs might be able to understand some human language. Ben has 7 more baseball cards than Sara. Sara has x baseball cards. Enter an expression to represent the number of baseball cards Ben has. Lamar is boiling some potatoes to turn them into mashed potatoes. What cookingmethod is he using? withdrew from bank rs15000 for office use and rs 5000 personal use Net primary productivity is the primary productivity of an ecosystem, after subtracting energy lost inA. dead plant tissues.B. inedible plant tissues.C. respiration by primary producers.D. respiration by primary consumers.E. inefficiencies of photosynthesis. How can climate change affect natural disasters? What is the command to manage accounts on Server 2008? Why did the Han emperor create the Civil Service exam? it...........be very hot this summer What has the greatest influence on windspeed