1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
4 years ago
13

When using the magnetic lasso tool , which setting blurs the area between the selection and the surrounding pixels?

Computers and Technology
1 answer:
andre [41]4 years ago
3 0
Your answer is the "feather" setting :)
You might be interested in
Hundreds of a bank’s customers have called the customer service call center to complain that they are receiving text messages on
Aleks [24]

Answer:

Customer enlightenment is the key. The bank should communicate with customers and inform them they never asked them to provide their personal information to such a website or an unknown source. I explain steps to take to avoid such fraudulent text messages. If they have responded to such messages, the bank should also guide the customers on steps to take to recover their stolen money.

Explanation:

Customer enlightenment is the key. The bank should communicate with customers and inform them they never asked them to provide their personal information to such a website or an unknown source. I explain steps to take to avoid such fraudulent text messages. If they have responded to such messages, the bank should also guide the customers on steps to take to recover their stolen money.

Some measures to be taken by both the banks and the customers are as follows;

  • The customers should be careful not to call any number people send to them rather they should get any information they need by going to the bank or search for such information on the bank official websites.
  • Customers should be alert and think carefully before sharing any financial details
  • For customers that responded to such messages, the banks will be proactive enough to shut it down and retrieve the customer's funds the same day.
  • Customers are advised to always report such fraudulent messages when received.
  • Banks should frequently verify transactions through telephone or text messages whenever an unusually high or out of the ordinary payments are flagged by its automated systems.
  • The bank can also prevent this fraud by blocking the customer card whenever an unusual transaction is noticed. The customer will then be contacted to confirm if the transaction was genuine or not. At times the transaction may need to be attempted again.

6 0
3 years ago
What must be the same for each variable in an array in compiled languages?
sukhopar [10]

The data type must be the same for each item in the array.

7 0
3 years ago
"Bullet Lists" can be which of the following?
MariettaO [177]

Answer:

letters and numbered

Explanation:

7 0
4 years ago
Read 2 more answers
Marianne needs to create a version of her slide presentation that does not include all the slides and will be used for
Morgarella [4.7K]

Answer:

B is the correct answer because that's what I do

8 0
3 years ago
Read 2 more answers
What is the primary reason that routing on the internet is redundant
Elena-2011 [213]

Most of the time rerouting on the internet is redundant because a router already does it automatically. For example if one path has a lot of traffic it with put the user on another path with less traffic but same destination.

<span />
4 0
3 years ago
Other questions:
  • I need help to find out what is wrong with this program and my variable, "exponent" comes out as 0 in the output instead of the
    14·1 answer
  • Barr the Bear has started a business to sell fish to Poe and his fellow penguins. The penguin customers submit many fish orders,
    12·1 answer
  • What is the name of the table tools contextual tab that appears once you insert a table?
    8·2 answers
  • Given an integer variable i and a floating-point variable f, write a statement that writes both of their values to standard outp
    12·1 answer
  • In what year was the first mobile phone produced?
    15·1 answer
  • True or False <br><br> Rootkits are only made by black-hat hackers.
    11·1 answer
  • What role do chromosomes play in inheritance?
    8·1 answer
  • You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to
    8·2 answers
  • What is the final value for X ?<br><br> x= 1<br><br> x=13<br><br> x= x+3<br><br> x=0
    9·1 answer
  • What is used to connect computers to the internet*Audio Ports
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!