1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
7

Name three actions you can perform on an inserted image.

Computers and Technology
2 answers:
MariettaO [177]3 years ago
5 0

Answer:

  1. Crop
  2. Resize
  3. Rotate

Explanation:

statuscvo [17]3 years ago
5 0

Answer:

Three actions that can be performed an inserted image are:

  • Crop
  • Resize
  • Rotate

Explanation:

Image crop : this is the removal of the unwanted areas in an image, this is performed on an inserted image, if the image contains extra/unwanted images attached to the main image

Image resize: This is the resizing of the image by either adding or subtracting  pixels from it, this affects the height and width of the image by either reducing or increasing it, to fit into the document.

Image Rotate: This the changing of the view of the image from either landscape view to portrait view depending on what view is required from the image been inserted into the document.

You might be interested in
The encapsulating security ______ protocol provides secrecy for the contents of network communications as well as system-to-syst
Goshia [24]

Answer:

payload

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

The encapsulating security payload (ESP) protocol is a standard protocol that provides secrecy for the contents (data) transmitted via network communications, as well as system-to-system authentication and data integrity verification so as to prevent unauthorized access.

Basically, the encapsulating security payload (ESP) protocol is a transport layer protocol that provides data confidentiality, integrity and authentication in IPv6 and IPv4 protocols.

5 0
3 years ago
How does ludonarrative apply to game design
Amiraneli [1.4K]

When gaming and story work together to produce a meaningful and engaging experience, this is referred to as Ludonarrative harmony. From the standpoint of design implementation, it is the synchronized interactions between in-game activities (mechanics) and in-world context.

<h3>What is game design?</h3>

Game design is a broad area that includes computer science/programming, creative writing, and graphic design.

It is also defined as the use of design and aesthetics to the creation of a game for pleasure, educational, exercise, or experimental objectives

Learn more about game design:
brainly.com/question/26066869
#SPJ1

6 0
2 years ago
Yvonne found an article online that relates to her research topic, but the article does not cite the author. What should Yvonne
jonny [76]
Hey there!

If Yvonne found an article that relates to her research topic, but it doesn't cite an author, then she should definitely look up another article that relates to her topic that does cite the author. She shouldn't pretend that the article that cites no author is hers, otherwise she could possibly get her grades lowered.

Hope this helps you.
Have a great day! (:
3 0
3 years ago
Read 2 more answers
ASAP PLEASE
notka56 [123]
1st blank:task
2nd blank:transparency
6 0
3 years ago
Read 2 more answers
How we Design a power point presentation with your own voice recording in slide show with at least 10 slides. You can choose any
sukhopar [10]

Answer:

qszdsdddddsq

Explanation:sqdqsdsqdsqd

6 0
3 years ago
Other questions:
  • For any element in keysList with a value greater than 60, print the corresponding value in itemsList, followed by a semicolon (n
    14·2 answers
  • A(n) _______________ supplies one of the most critical aspects of docking stations, but in a smaller, more portable format: supp
    15·1 answer
  • Interoperability means
    8·1 answer
  • Which of the following are pointers? Select all that are correct. hub node router transmission media switch port interconnector
    7·2 answers
  • Look at the following code:
    7·1 answer
  • Q: If a program is invoked with "python program.py -r input.dat output.dat", what are the elements of argv?
    10·1 answer
  • Universal Containers uses a custom object within the product development team. Product development, executives, and System Admin
    11·1 answer
  • Question Mode Matching Question Match the following description with the appropriate programming language generation. 1GL 1GL dr
    7·1 answer
  • I don't want my large video files using up all my hard drive space . Can I archive my videos in on DVDs or Blu Rays?
    8·1 answer
  • In cell K10, create a formula using the SUM function that calculated the total of the range F17:F20 subtracts it from the value
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!