It would be C- crop. This allows you to specifically delete parts of the image using drag and drop features. Hope this helps!
<span>Answer:
-Software architecture isn't about big design up front;
-Every software team needs to consider software architecture;
-The software architecture role is about coding, coaching and collaboration;
-You don't need to use UML;
-A good software architecture enables agility.</span>
Answer:
D- Trojan Horse
Explanation:
Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.
Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.
Answer:
in controlling the mouse or cursor
Explanation:
as is it known tha a cursor is a poniting device. and the only way to control it without a mouse is the touchpad