1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
4 years ago
6

Which choice lists two image formats that support transparency

Computers and Technology
2 answers:
hjlf4 years ago
7 0
One is a PNG (You can turn images into PNG by using Save As)
zloy xaker [14]4 years ago
6 0
The answer to this is <span>GIF 89a and PNG...i hope that this has helped u</span>
You might be interested in
_________ is the biggest problem you can face if you don’t identify the scope of your risk management project. Scope creep Nonco
mart [117]

Answer: Scope creep

Explanation:

 Scope creep in the project management basically refers to the uncontrolled development or growth in the project creep. It basically occur when the project scope are not appropriately defined.

It usually involve lack of change in the control system and increase the complexity of the project. It is also has poor requirement analysis.

So, that is why it is the biggest problem we usually face in the project management.

5 0
3 years ago
A customer has contacted you to help him alleviate the large amount of time and effort that goes into adding and removing users
Ostrovityanka [42]

Answer: On-demand

Explanation:

On-demand computing is the term of cloud computing that describes the function that provides organization with cloud hosting services. This function permits those organization to provide their customers for assessing computing resources and services as per necessity.

According to the question,on-demand is the computing function that should be used in the mentioned case. Technician and customers will get to access the computer as per their necessity and will not have to waste their efforts and time.

7 0
4 years ago
Look plz help :))))))))))))))))))))
andrey2020 [161]

Answer:

false

Explanation:the answer is false

6 0
3 years ago
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
Jane's organization recently experienced a security incident that occurred when malware set to trigger on the chief executive of
inn [45]

Answer:

The answer is viruses

Explanation:

Because it is a harmful software hidden inside another  and usually performs a harmful action, such as destroying data.

4 0
4 years ago
Other questions:
  • If you are asked to bring in agile way of working into the way a meeting runs, which one among the listed options will you imple
    11·1 answer
  • Sal Kan earned $3,000.00, But he is only getting $1,585.00 on his pay check to
    9·1 answer
  • If a user wants to change one small section of the formatting of a document and leave the rest the same, which process should be
    14·1 answer
  • The chip that controls the radio frequency waves within a device
    9·1 answer
  • To use an ArrayList in your program, you must import:1. the java.collections package2. the java.awt package3. Nothing; the class
    6·1 answer
  • Manuel has set up his network so that some employees can open and view files but are unable to edit them. Others can open, view,
    10·1 answer
  • (5 pt.) The name of a variable in the C programming language is a string that can contain uppercase letters, lowercase letters,
    15·1 answer
  • You want to deploy a software package that's available to all users in the domain if they want to use it, but you don't want the
    7·1 answer
  • if anyone could help me with this it would be great. I have to turn in a practice resume and im completely lost and have no clue
    7·1 answer
  • Which line of code in this program is MOST likely to result in an error
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!