1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
2 years ago
7

If you insert a picture, resize and reposition it, and then change to a different picture, you must modify the new picture to

Computers and Technology
2 answers:
Mashcka [7]2 years ago
3 0

Answer:

false , that is not true

Explanation:

because a person can change to a different picture , but it Is not by force it will have a match to the original

Vinil7 [7]2 years ago
3 0
If you insert a picture, resize and reposition it, and then change to a different picture, you must modify the new picture to
match the original.
True
False

FALSE
You might be interested in
What Is The First Computer Brought In Nepal ? <br>​
tiny-mole [99]

Answer:

I don't know,,,(((:lol

8 0
2 years ago
Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
Sav [38]

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
8 0
3 years ago
Which changes the natural world? <br> technology <br> science <br> prototypes <br> feedback
Gelneren [198K]
It would be technology,
5 0
3 years ago
An executable file that was determined to be infected with a virus was terminated from the running processes list. However, afte
Mama L [17]

Mostly Trojan will has multiple version and I love u virus extra.

<u>Explanation:</u>

As first step workstation or desktop or laptop to scanned for virus and if any virus or malware found then it should be removed first. Operating system should be updated with latest patch, virus signature also be updated once again executed founded by virus infected.

Better to copy new exes and place in the same folder and try to execute again. If still the problem persists download antivirus software such as Norton, bit defender, Kaspersky etc. executable files affected by 15-20 viruses

8 0
3 years ago
What type of activities are performed with the help of the software used in hospitals?
faust18 [17]

Answer:

Xrays, Ultrasounds, managing patient records, communicating with colleagues, etc.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Enter the value of 5⋅(13.5−4.5). <br> ​
    5·1 answer
  • ________ is installed into special, read-only memory of devices like printers and print servers or devices used for various type
    13·1 answer
  • Which best describes color blindness?
    8·1 answer
  • Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data mus
    8·1 answer
  • Which application is a digital version of a manual typewriter? A. Database B. Presentation C. Spreadsheet D. Word processor
    8·2 answers
  • A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS
    15·1 answer
  • ...................You like swamps
    13·2 answers
  • Tennis players are not allowed to swear when they are playing in Wimbledon
    6·2 answers
  • You are asked to write a program that prompts the user for the size of two integer arrays, user input for the size must not exce
    13·1 answer
  • Write a method to add/subtract two matrices. The header of the method is as follows:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!