1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
1 year ago
11

when drawing over an existing object in a paint app, . a. you are replacing the existing object b. the new object appears on a n

ew layer c. the objects remain independent d. the existing object is converted to a vector graphic
Computers and Technology
1 answer:
Sati [7]1 year ago
6 0

When drawing over an existing object in a paint app, is option A. you are replacing the existing object.

<h3>Is drawing considered art?</h3>

One of the basic forms of art is drawing or sketching. Many artists will learn to draw as a fundamental artistic talent, regardless of whether they are painters, sculptors, or digital artists. But sketching is a legitimate art form in and of itself, not only a forerunner to other forms of visual art.

Hence, in adobe, This sketching program has a long history. Like other Adobe applications, Photoshop Sketch has a beautiful interface that is uncluttered and straightforwardly organized. A sizable digital canvas is left blank by the brush panel on the left and the sparse design tools on the right.

Learn more about drawing from

brainly.com/question/26063108
#SPJ1

You might be interested in
What is the difference between a LAN and WAN? how do these two networks interact?​
stealth61 [152]
A LAN, abbreviated from Local Area Network, is a network that covers a small geographical area such as homes, offices, and groups of buildings. Whereas a WAN, abbreviated from Wide Area Network, is a network that covers larger geographical areas that can span the globe.

A Wide Area Network (WAN) operates over a much larger area, as they interconnect LANs to allow them to exchange data.
3 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
4 years ago
Wat kind o mouse pleese hep meh​
Trava [24]

Answer:

It's is a razer Basilisk

4 0
4 years ago
Maria is developing an online gaming website. She is working on an interactive game that has a central character guiding visitor
hammer [34]

Answer:

The answer is animation. This question has been answered already.

Source:

brainly.com/question/12414395

8 0
2 years ago
Describe the steps that transform a program written in a high-level language such as C into a representation that is directly ex
Alla [95]

Answer:

First, you would want to translate from C-language Program (in text format) into the assembly language Program (still in text format, but in the corresponding architecture of the computer where the program will be run). The software tool you will use for this step is Compiler.

Then you would translate from the assembly language program (text format) into Machine Code Program (in binary format). The software tool used for this step would be Assembler.

7 0
2 years ago
Other questions:
  • Theâ ______ is a large worldwide collection of networks that use a common protocol to communicate with one another.
    5·1 answer
  • What is likely to happen to the economy when there’s too much money or credit circulating?
    13·1 answer
  • What does the KISS Principle stand for?
    11·2 answers
  • Adjusting the ______ adjusts the difference in appearance between light and dark areas of the photo.​
    10·2 answers
  • Explain the concept of scalability. How would you respond?
    15·1 answer
  • The two main methods of verification
    6·1 answer
  • What does the following if statement do?<br><br> if (num1 == Math.abs(num1))
    12·1 answer
  • Consider two different implementations of the same instruction set architecture (ISA). The instructions can be divided into four
    14·1 answer
  • When you open your word-processing program, it opens in a<br> field<br> menu
    9·2 answers
  • In the negative side of the battery, there are millions and millions of _________.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!