1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
3 years ago
6

To remove unwanted parts from an image, select the image and then choose the option

Computers and Technology
1 answer:
Volgvan3 years ago
8 0

Answer:

You need to make use of the Brush tool for removing the unwanted part of an image.

Explanation:

Yes, it is the brush tool or the lasso tool that you can make use of. and you will find brush tools in all sorts of image processing software may it be the paint or Photoshop. It is common to both the raster-based and vector-based image processing software. And you can easily find it inside the tool section, and then make use of it to remove the unwanted parts from an image.

You might be interested in
What is the default letter assigned for the primary hard drive?
SVETLANKA909090 [29]

d drive i think unless ssd

8 0
3 years ago
What would you need to install if you have an app that is incompatible with your current operating system?
Angelina_Jolie [31]

Answer:

D. A virtual machine

Explanation:

7 0
2 years ago
The security administrator for PLABS.com recommends using a host-based firewall for all servers and workstations. What can a hos
cestrela7 [59]

Answer:

A. Helps prevent a system from being fingerprinted by port scans.

B. Can restrict a computer from receiving network traffic.

D. Stop a process or application from launching.

Explanation:

The "host-based firewall" is an important type of<em> firewall software </em>that is being installed into a computer/device in order to allow it to control the network traffic. This enables the host to protect itself from any malware or viruses that may attack. It, primarily, provides a customized protection. Thus, it is more commonly used by <em>small businesses</em> or<em> individual people</em>.

Host-based firewalls allows "packet filtering." This controls the network access which makes it hard for attackers because of the little information that it provides. So, this explains option A. This then prevents a system from being fingerprinted by port scans.

Host-based firewalls can protect the device from unwanted network traffic, so this explains option B. This then restricts the computer from receiving the network traffic.

It can disable programs that are malicious, thereby stopping the launching of those programs. This explains option D.

7 0
3 years ago
Can someone plz answer these questions
AfilCa [17]

Answer:

11001100 = 204

11111111 = 255

Explanation:

For 11001100:

1*2⁷ + 1*2⁶ + 0*2⁵ + 0*2⁴ + 1*2³ + 1*2² + 0*2¹ + 0*2⁰ = 204

Just replace 1's by 0's in the following calculation to do it for every 8 bit number:

1*2⁷ + 1*2⁶ + 1*2⁵ + 1*2⁴ + 1*2³ + 1*2² + 1*2¹ + 1*2⁰ = 255

If you don't want to do the calculation yourself, you can set the windows calculator in programmer mode, then select binary and key in the number.

3 0
3 years ago
Cybercards are most useful for __________. keeping a personal diary writing to-do lists tracking Internet-based research creatin
egoroff_w [7]
Cybercards are most useful for TRACKING INTERNET-BASED RESEARCH.

Cybercard note-taking makes possible the following tasks:

1) highlighting and taking notes directly on a webpage<span>2) </span><span>organizing information collected with tags</span>
<span>3) searching your collection of notes, tags, and webpages</span>
5 0
3 years ago
Other questions:
  • Suppose we wish to put a set of names in alphabetical order. We call the act of doing so sorting. One algorithm that can accompl
    15·1 answer
  • __________ is a website that offers a variety of Internet services from a single, convenient location.
    13·1 answer
  • The moon has less mass than the earth, so what happens to objects on the moon?
    11·1 answer
  • Write switch-case statement that displays the following information if the temperature is the input Activities at Lake LazyDays
    13·1 answer
  • A network administrator manages a network with 75 servers. At least twenty of those servers are approaching end of life but the
    8·1 answer
  • Arrange the steps involved in natural language generation.
    9·1 answer
  • Pls help due tonight<br>Will give brainiest
    13·2 answers
  • Why does Brainly keep on giving me ads. All I want to do is get answers not be smothered by a bunch of ads. And then when you go
    7·1 answer
  • Explain why a sound background in auto electricity and electronics is absolutely necessary if you are to troubleshoot
    15·1 answer
  • Write a function magicCheck that takes a one-dimensional array of size 16, a two-dimensional array of four rows and four columns
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!