1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juliette [100K]
3 years ago
5

If you turn on the Lock alpha button , what happens

Computers and Technology
2 answers:
BabaBlast [244]3 years ago
7 0

You will be unable to make changes to transparent, or see-through, parts of a layer.

An Alpha Channel describes and controls the opacity or transparency of all color channels on a pixel. When the Lock alpha button is turned on, it prevents the user from making changes to those transparent portions of an image. When it is unlocked, the user can manipulate the image in any way he or she likes. Transparent portions of an image can be painted upon or can be filled upon with color if this feature is turned off.


SSSSS [86.1K]3 years ago
3 0

Answer:

1) you will be unable to make changes to transparent, or see-through, parts of a layer

2) clipboard brush

3)make changes to other layers

4) visual effect you can apply to your image

5)across from eachother

You might be interested in
an organization that maintains a gateway to the Internet and rents access to customers on a per-use of subscription basis\ and W
shtirl [24]
1. An organisation that maintains a gateway to the internet and rent access to customers on a per use of subscription basis is called INTERNET SERVICE PROVIDER [ISP]. Internet service providers are of various forms, it can be commercially or privately owned, it can also be owned by a community. The internet access provided by ISP can be inform of cable, DSL or dial up. ISP provide other services such as website building and virtual hosting.
2. Internet protocol [IP] refers to a set of rules that guide the format of data sent over the internet, it is the method by which data is sent over the internet from one computer to another computer. Each computer that is linked to the internet has a unique IP address by which it is identified and distinguished from all other computers on the internet.
8 0
3 years ago
HELP ME PLEASE!!!!!!!!!!!!
Mila [183]

Answer:

b b isss the right answer

5 0
3 years ago
Read 2 more answers
A question to determine your ability to use the reference materials effectively. Your boss has determined that you will be using
Ymorist [56]

Answer:

The answer is "implement on group 2 and group 3".

Explanation:

In the given scenario, When technology workers are using in the project teams. People like to be stable, and we can't allow wireless network transmission to maintain their security and privacy. When we considering category 1 being the only ones who have links to a higher authority, that's why Group 2 and Group 3 were needing to be implemented.

3 0
2 years ago
You can access various sites on the WWW by using hyperlinks or by
Vilka [71]
<span>or by following directions on screen </span>
5 0
3 years ago
Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.
FromTheMoon [43]
For numb in [5,8]:
for numa in [2,3]:
print(str(numb) + str(numa))
3 0
2 years ago
Other questions:
  • Acrynom for wys or wyg
    10·1 answer
  • After configuring a static IP address on a desktop computer, the technician finds that he cannot communicate with other devices
    10·1 answer
  • * Create a list of places and situations in which we use a computer
    11·1 answer
  • What is used in computer appliances and special-purpose applications, such as an automobile, ATM, or media player and is used fo
    5·1 answer
  • Which of the following forces all traffic, communications, and activities through a single pathway or channel that can be used t
    15·1 answer
  • What term is used to refer to the requesting of information from a database?
    10·2 answers
  • PLZ HELP WILL MARK BRANLIEST Jargon is:
    9·1 answer
  • Suppose that a 64MB system memory is built from 64 1MB RAM chips. How many address lines are needed to select one of the memory
    11·1 answer
  • The ______ clause allows us to select only those rows in the result relation of the ____ clause that satisfy a specified predica
    5·1 answer
  • Defination of formula bar​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!