1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
11

laire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of t

hat place in her letter. Which feature of a word processing program will help Claire to remove unwanted parts of the pictures?
Computers and Technology
1 answer:
Ivenika [448]3 years ago
3 0

The crop feature

gdvfvbfhdnkdsfdfsdffsf

You might be interested in
An _____ is a set of directions for carrying out a task.
Lena [83]

An algorithm is a set of directions for carrying out a task. Sounds about right

8 0
4 years ago
Describe how pseudocode makes programming more efficient for large programming tasks.
Talja [164]

Answer:Pseudocode helps us understand tasks in a language-agnostic manner. Is it best practice or suggested approach to have pseudocode creation as part of the development lifecycle? For instance:

Identify and split the coding tasks

Write pseudocode

Get it approved [by PL or TL]

Start Coding based on Pseudocode

Explanation: use phrasing tool if you want to write in your own words.

6 0
3 years ago
Read 2 more answers
Why do bats sleep upside down
seraphim [82]

Answer:

Bats cannot run so it would be almost impossible for them to take off from the ground. A major advantage to hanging upside down is that bats do not need to generate lift to begin flight. They just drop out of their bed, open their wings and off they go.

Explanation:

8 0
3 years ago
A firewall is either software or dedicated hardware that exists between the __________ being protected.
Lapatulllka [165]

A firewall is either software or dedicated hardware that exists between the network and the resource being protected. this network security device monitors traffic to or from the network. It is based on set of rules about what data packets will be allowed to enter or leave a network.

5 0
3 years ago
Which of the following will display a string whose address is in the dx register: a.
worty [1.4K]

Answer:

a)

Explanation:

Function 9 of interrupt 21h is display string.

8 0
3 years ago
Other questions:
  • Select the correct answer.
    8·2 answers
  • Select the correct statement about data preparation.
    10·1 answer
  • Most printers are plug and play compatible and must be manually configured when they are plugged into the system.
    14·2 answers
  • What will be displayed if the following Java code segment is run? System.out.println("one "); System.out.print("two "); System.o
    12·1 answer
  • How to delete Brainly account ?​
    12·1 answer
  • Think about that the C, B and S parameters of a Cache. Think about what happens to compulsory, capacity, conflict misses, if onl
    7·1 answer
  • Write an algorithm to calculate the sum of integer ​
    7·1 answer
  • Any device that uses light to read and write information.
    9·2 answers
  • How easily can teachers see browsing history on chromebook]
    9·1 answer
  • Who is the monst important person and why
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!