1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
4 years ago
15

Micheal has increased the contrast of the given picture. Which feature or menu option of a word processing program did he use? A

. Format B. Insert C. View D. Review E. File
Computers and Technology
1 answer:
Alex17521 [72]4 years ago
7 0

First of all, Micheal would have inserted an image in the word-processing program. The option to increase or decrease the contrast of an inserted image comes under the format feature.

A. Format

<u>Explanation:</u>

When a user inserts an image, the image is inserted with the same visual setting as it was saved with. The user can increase or decrease the contrast of the image to suit his/her needs.

The format menu provides several other editing options such as altering the brightness, compressing the picture, resizing the picture and even change the inserted picture and many more.

You might be interested in
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Effective controls protect ______ from workplace hazards.
erastovalidia [21]

Answer:

Contact your team leader, supervisor, manager, etc.

3 0
3 years ago
Read 2 more answers
What is a scenario where records stored in a computer frequently need to be checked
vazorg [7]

if your in  school and always are getting into trouble the school will always be checking your records


7 0
3 years ago
Read 2 more answers
The work associated with software engineering can be categorized into three generic phases, regardless of application area, proj
cricket20 [7]

Answer:

The work associated with software engineering can be categorized into three generic phases,regardless of application area, project size, or complexity namely the_____________ phase which focuses on what, the______________ phase which focuses on how and the_____________ phase which focuses on change ? i. support ii. development iii. definition

[A]. 1, 2, 3

[B]. 2, 1, 3

[C]. 3, 2, 1. ✅✅

[D]. 3, 1, 2

6 0
3 years ago
Write the steps for mail merge and formation of documents.
denpristay [2]

Answer:  

The steps for mail merge and formation of documents are:

Mail merge are used for simplifying the repetitive document and several tasks. Mail merge is the process for creating many documents at once that contain identical formatting, graphics and layout text. Basically, it consist of two files, the data source and the mail document.

  • In order to run the mail merge, the first step is that create the document name as mail merge and if the TABLE were on a separate page then simply create  it as DATA SOURCE by clicking on OPEN button.
  • Then, last step is to hit the merge into the new document button on the tool bar, which is the fourth to last button on far right end of the tool bar.
8 0
4 years ago
Other questions:
  • What does % find on edhesive??
    14·1 answer
  • Which of the following is false?
    7·1 answer
  • bj;ljfg'cfmb dfl kbslf jflk[gkdblkfd lbrkjlfbbfkjbdfjkbadbjbbkvbk'lbk'blbf;l;lkb lm;flklmkjlvkljvkljvbfbdsjsfbbjjlkbfjklbkfj'lgg
    9·2 answers
  • During the analysis phase of the SDLC the systems analyst will decide how the hardware, software and network infrastructure, use
    5·1 answer
  • When you create a linked object using the object dialog box, you must click the?
    15·1 answer
  • Aaron is stating the main idea of what he read in his own words. He is _____.
    11·2 answers
  • What is a fruitful function? Explain with help of programming example?<br> plz
    7·1 answer
  • Can someone else kill Raz and I can still get the challenge done by collecting the artifact in fort nite?
    13·1 answer
  • Can u please help me solve this
    15·1 answer
  • Select all the correct answers<br> Which TWO statements describe the functions of wireless media?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!