1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
7

Name three actions you can perform on an inserted image.

Computers and Technology
2 answers:
MariettaO [177]3 years ago
5 0

Answer:

  1. Crop
  2. Resize
  3. Rotate

Explanation:

statuscvo [17]3 years ago
5 0

Answer:

Three actions that can be performed an inserted image are:

  • Crop
  • Resize
  • Rotate

Explanation:

Image crop : this is the removal of the unwanted areas in an image, this is performed on an inserted image, if the image contains extra/unwanted images attached to the main image

Image resize: This is the resizing of the image by either adding or subtracting  pixels from it, this affects the height and width of the image by either reducing or increasing it, to fit into the document.

Image Rotate: This the changing of the view of the image from either landscape view to portrait view depending on what view is required from the image been inserted into the document.

You might be interested in
_____ makes source code available for use, modification, and redistribution as long as licensing terms are met. Free and open-so
Andrei [34K]

Answer:

Free and open-source software makes source code available for use, modification, and redistribution as long as licensing terms are met.

Explanation:

Open-source software is software you can find and use for free.

8 0
2 years ago
I WOULD REALLY APPRECIATE IT IF YOU ANSWER THIS QUESTION: Which of the following devices transforms electrical energy into mecha
sammy [17]

Answer:

Pencil shapener

Explanation:

7 0
3 years ago
If x has a value of 7 and y has a value of 20, what is displayed as a result of executing the code segment
Llana [10]

<em>6.65 </em><em>is displayed as the</em><em> output </em><em>of the </em><em>block of code</em>

<em />

In python programming, * denotes multiplication. To get the output, we will substitute the value of x and y given into the result to have;

<em> result = x * y - x / (y)</em>

<em> result = 7 * 20 - 7 / (20)</em>

<em> result = 140 - 7 / (20)</em>

<em> result = 133/20</em>

<em> result = 6.65</em>

<em />

<em>This shows that </em><em>6.65 </em><em>is displayed as the</em><em> output </em><em>of the </em><em>block of code</em>

<em />

The question is incomplete;

Let the code segment be

<em>>>> x = 7 </em>

<em>>>> y = 20   </em>

<em>>>> result = x * y - x / (y) </em>

<em>>>> result  </em>

<em>output:__?</em>

<em />

Learn more here: brainly.com/question/24240957

5 0
3 years ago
Use a dictionary to count the frequency of letters in the input string. Only letters should be counted, not blank spaces, number
netineya [11]

Answer:

def count_letters(text):

 result = {}

 # Go through each letter in the text

 convert_text = text.lower()

 for letter in convert_text:

   if letter.isalpha():

     if letter in result:

       result[letter] += 1

     else:

       result[letter] = 1

 return result

print(count_letters("AaBbCc"))

# Should be {'a': 2, 'b': 2, 'c': 2}

print(count_letters("Math is fun! 2+2=4"))

# Should be {'m': 1, 'a': 1, 't': 1, 'h': 1, 'i': 1, 's': 1, 'f': 1, 'u': 1, 'n': 1}

print(count_letters("This is a sentence."))

# Should be {'t': 2, 'h': 1, 'i': 2, 's': 3, 'a': 1, 'e': 3, 'n': 2, 'c': 1}

Explanation:

4 0
3 years ago
Discuss the importance of the coordinated attention to the 3 broad areas of InfoSec (pillars): Computer Security, Data Security,
True [87]

Answer:

Computer security, includes network security and data security

Explanation:

It is very important to be aware of computer security, then I provide the definitions of each of the three pillars.

Computer security:

Take into account that there is no absolute security, however, risks must be minimized.

 In this section, confidentiality, integrity, availability, and authenticity are important.

It also includes physical security (hardware), software security (network) and data security.

Data Security:

It is the set of logical systems whose function is to coordinate the hardware and software (registers, packages that travel through the network, etc.).

Network Security:

The goal is the advanced detection of botnets and malware callbacks. It must be prevented from intrusions.

5 0
3 years ago
Other questions:
  • A bunch of computer scientists take over an island and start their own country. They want the license plates to use binary numbe
    11·1 answer
  • Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work
    5·1 answer
  • In the following piece of css code what is the property ?
    9·1 answer
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace, which is your best option?
    7·1 answer
  • Twitter and facebook are both examples of the​ _____________ internet business model.
    7·1 answer
  • At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this
    10·1 answer
  • How Charles Babbage Concept of<br>Computer has help the modern<br>Computer​
    6·1 answer
  • Consider rolling a 6-sided die. The outcome of interest is the number of dots that appears on the topside when the die stops rol
    7·1 answer
  • Write a Java program that will be able to generate the sample table below.
    5·1 answer
  • Why when I send a message on iOS it says the person’s notification is silenced, and the message isn’t delivered?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!