1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
10

Where do we draw the line between creativity and deception?

Computers and Technology
1 answer:
BARSIC [14]3 years ago
4 0

Answer:

when you are manipulating the pictures for art and creativity purposes and not for changing your own or others appearance.

You might be interested in
1) What is Net beans
Bingel [31]

Answer:

it's a software

Explanation:

NetBeans IDE lets you quickly and easily develop Java desktop, mobile, and web applications, as well as HTML5 applications with HTML, JavaScript, and CSS. The IDE also provides a great set of tools for PHP and C/C++ developers.

5 0
3 years ago
What should you do to organize a large amount of data??
Kay [80]
Set them up from least to greatest or create a number graph with all the data.
5 0
3 years ago
If you have a long title for a table and need it to span several cells you use
dsp73
If you are talking about on Microsoft Excel then you merge the cells.
6 0
3 years ago
________ can be written only once. The data cannot be erased or written over once it is saved.​
notka56 [123]

Answer:

WORM (Write Once, Read Many)

Explanation:

The full meaning which means Write Once, Read Many implies that data can only be entered (or better put, written) once. Once the data has been written, the data can not be updated or deleted. However, the data being stored on WORM can be read as many times, as possible.

Hence, WORM answers the question.

6 0
3 years ago
Jason wants to set up his Wi-Fi’s security. He cannot install a central server for authentication. However, he wants to use a pr
jolli1 [7]

Answer:

Answer = a ig

wpa. ig ig ig ig

4 0
3 years ago
Other questions:
  • When you close a file, what happens to the undo history list for that file?
    5·1 answer
  • Which function returns a valid value without any arguments?
    13·2 answers
  • Your co-worker is at a conference in another state. She requests that you
    9·1 answer
  • Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
    12·1 answer
  • Write a program that prompts the user to enter the number of integer numbers you need to enter, then ask user to enter these int
    5·1 answer
  • Help, with gaming unlocked
    12·1 answer
  • This innovator created “honeypots” in which fake accounts are set-up in order to catch cybercriminals: Jeremiah Onaolapo
    6·1 answer
  • Need answer ASAP. I’ll mark brainliest if correct
    7·1 answer
  • An example of documentary evidence that might be presented at trial for a cyber crime is:
    9·1 answer
  • A service that enables a customer to build and run their own applications but doesn't include extensive access to hardware and m
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!