1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
3 years ago
6

What is the line tool used for in photoshop

Computers and Technology
1 answer:
ale4655 [162]3 years ago
5 0
Creates line<span> shapes and paths.</span>
You might be interested in
Select all statements that correctly describe the ramifications of important features supported by modern DBMS.
lara [203]

Answer:  

"Option b and Option d" is the correct option for this question.

Explanation:

In the database, datatype belongs to the information storage medium, which can hold a specific type of value. There are several data types, which is used in database like integer, character, series, floating-point and array numbers, and the rules, that give levels of security to information are known as a security constraints. It may be either developed as rules on integrity, mathematical formalism rules or schematic rules, and other choices were wrong which can be described as follows:

  • In option a, The asserts, which is in any exchange in a database, should only modify the information, that is effected in acceptable ways is called consistency, that's why it is wrong.
  • In option c, The validity and accuracy of the data in the database can not be ensured, that's why it is wrong.
3 0
3 years ago
Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer dema
AysviL [449]

Answer:

The correct answer is C. Consumer behavior and preferences.

Explanation:

hope it will help :)

6 0
4 years ago
If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
Juliette [100K]

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

8 0
3 years ago
Read 2 more answers
Where is the BIOS chip located?
masya89 [10]

Answer:

on the motherboard inside the computer

6 0
4 years ago
Read 2 more answers
Harry is creating a PowerPoint presentation and wants all the slides to have a uniform look.
Ne4ueva [31]

Answer:

✔ Slide Master view

✔ layout and theme

✔ PowerPoint template

Explanation:

On Edg

4 0
3 years ago
Other questions:
  • About ___% of children score within one standard deviation above or below the national average in intelligence.
    5·1 answer
  • A software license gives the owner the to use software.
    12·2 answers
  • Special programs that facilitate communication between a device and the os are called
    12·1 answer
  • The _____ is a blinking vertical line that indicates where the next typed character will appear. scroll box sheet tab insertion
    7·1 answer
  • The memory unit of a computer has 2M Words of 32 bits (or 4 bytes) each. The computer has an instruction format with 4 fields: a
    14·1 answer
  • In the Mouse Properties window, you can?
    8·1 answer
  • To display data in a certain manner, like alphabetical order, is called
    5·2 answers
  • "What technology will examine the current state of a network device before allowing it can to connect to the network and force a
    6·1 answer
  • WILL GIVE BRAINLIEST!! NO LINKS!!!
    12·2 answers
  • What is the name of the directory that contains symbolic links to unix sysv rc scripts for runlevel 2?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!