1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
4 years ago
13

When using the magnetic lasso tool , which setting blurs the area between the selection and the surrounding pixels?

Computers and Technology
1 answer:
andre [41]4 years ago
3 0
Your answer is the "feather" setting :)
You might be interested in
The organization wants you to avoid situations that make you choose between its overall benefit and your
iren [92.7K]
Personal gain is the answer :))
3 0
4 years ago
What key stage involves considering design options?
Grace [21]

Answer: Formulating your brief

Explanation:

The key stage that involves considering design options is formulating one's brief.

The aim of "Formulating Your Brief" is simply a way to determine the context in which a particular work will be to be undertaken after which the aim is then defined. It can either be formal or informal.

7 0
3 years ago
When was microsoft word for windows invented?
Dahasolnce [82]
1981 fue inventado por Bill gates y paul allen
4 0
3 years ago
The rangevalidator object on a web form has a type property for identifying the type of data for the range, such as ____.​
mojhsa [17]
<span>numbers,  dates, currency or strings - The range validator in a web form helps check whether the value entered in the field falls between the minimum and maximum values allowed in that field. For example if the type of data accepted  is of date type, then the rangevalidator checks whether the entered date falls within the given range. That means, month entered should be between 1 and 12, etc.</span>
8 0
3 years ago
What is the difference between the Paste Special and Paste Link options?
kotegsom [21]
Paste Link lets you automatically update the referenced document.
8 0
3 years ago
Read 2 more answers
Other questions:
  • A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
    7·1 answer
  • What is the difference between a manufacturing engineer and a materials engineer?
    7·2 answers
  • A user calls your help desk to report that the files on her USB stick do not have any permissions associated with them and there
    15·2 answers
  • When creating a chart or graph, which should be completed first?
    9·2 answers
  • I’m turning my Pinterest into a professional account what should be my user name please try to think of a good name and not just
    11·2 answers
  • The rock cycle _____.
    14·1 answer
  • Plzz help.... <br><br>i will mark u as brainliest if u answer correct
    10·1 answer
  • When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
    8·1 answer
  • Answer this crossword for brainliest and 15 points
    9·1 answer
  • What is an insertion point?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!