1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
14

How do you open two different picture in photoshop?

Computers and Technology
1 answer:
ratelena [41]3 years ago
4 0
Click "file" and click "open image" and that's your first image and do the same thing ;))))
You might be interested in
UserInp = input("Did you like the story?")
larisa86 [58]

Answer:

userInp = input("Did you like the story?")

if(userInp == "yes" or "Yes" or "yes." or "Yes." or "yes!" or "Yes!" or "yeah" or "Yeah" or "yeah." or "Yeah." or "yeah!" or "Yeah!") :

(Press tab right here) print("Thanks, I'm Glad you liked it!")

7 0
3 years ago
How did the movie characterized being a genius on real genius movie
zhuklara [117]
I do not know, i really hope you dont fail!!!!!!!!!
5 0
3 years ago
Read 2 more answers
For your biology class, you will be giving a presentation of the findings of a plant growth experiment. Which application is bes
ICE Princess25 [194]

Answer: Powerpoint

Explanation: Easy to give graphs and add pictures. You can also add shapes to create a bar graph if needed.

6 0
3 years ago
The encapsulating security ______ protocol provides secrecy for the contents of network communications as well as system-to-syst
Goshia [24]

Answer:

payload

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

The encapsulating security payload (ESP) protocol is a standard protocol that provides secrecy for the contents (data) transmitted via network communications, as well as system-to-system authentication and data integrity verification so as to prevent unauthorized access.

Basically, the encapsulating security payload (ESP) protocol is a transport layer protocol that provides data confidentiality, integrity and authentication in IPv6 and IPv4 protocols.

5 0
3 years ago
Help! What is this graph and what does it represent?
Lunna [17]

Answer:

Explanation:

how much something had in each month in this graph

7 0
3 years ago
Other questions:
  • Most internet connections use what transmission
    13·2 answers
  • Which combination of factors would result in the lowest monthly mortgage payment?
    9·2 answers
  • What would you need to install if you have an app that is incompatible with your current operating system?
    13·1 answer
  • 3 Points
    15·2 answers
  • g Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative inte
    12·1 answer
  • What is used to connect computers to the internet*Audio Ports
    15·2 answers
  • Can someone please answer this please!!!
    6·2 answers
  • Who is the founded the java computer language?​
    5·1 answer
  • Lloyd has created a validation script for a data entry form. What property should he use to test for a selected radio button?
    7·2 answers
  • Differences between formula and function as used in spreadsheet​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!