1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
3 years ago
9

Drag each label to the correct image.

Computers and Technology
2 answers:
o-na [289]3 years ago
7 0
I think
brightness
contrast
sharpness
saturation
krek1111 [17]3 years ago
3 0

Answer:

From left to right images:

brightness, contrast, sharpness , saturation.

Explanation:

The first image (1st from the left) has the brightness manipulated, since the light on the image looks accentuated.

The second image has the contrast decreased, the image colors are a bit less  distinguishable.

The third image has the sharpness  increased since borders are more accentuated and sharper.

Finally the fourth image has its saturation decreased since all colors are significantly less vibrant.

You might be interested in
What type of maintenance is required of a computer’s power supply to ensure that it remains in working order?
True [87]
<span>d. Clean any dust or debris from the air vents in front of the fans.</span>
5 0
3 years ago
Read 2 more answers
Write a program that asks the user to input a set of floating-point values. When the user enters a value that is not a number, g
Lady_Fox [76]

Answer:

Check the explanation

Explanation:

// include the necessary packages

import java.io.*;

import java.util.*;

// Declare a class

public class DataReader

{

// Start the main method.

public static void main(String[] args)

{

// create the object of scanner class.

Scanner scan = new Scanner(System.in);

// Declare variables.

boolean done = false;

boolean done1 = false;

float sum = 0;

double v;

int count = 0;

// start the while loop

while (!done1)

{

// start the do while loop

do

{

// prompt the user to enter the value.

System.out.println("Value:");

// start the try block

try

{

// input number

v = scan.nextDouble();

// calculate the sum

sum = (float) (sum + v);

}

// start the catch block

catch (Exception nfe)

{

// input a character variable(\n)

String ch = scan.nextLine();

// display the statement.

System.out.println(

"Input Error. Try again.");

// count the value.

count++;

break;

}

}

// end do while loop

while (!done);

// Check whether the value of count

// greater than 2 or not.

if (count >= 2)

{

// display the statement on console.

System.out.println("Sum: " + sum);

done1 = true;

}

}

}

}

Sample Output:

Value:

12

Value:

12

Value:

ten

Input Error. Try again.

Value:

5

Value:

nine

Input Error. Try again.

Sum: 29.0

3 0
3 years ago
Read 2 more answers
A __________ search engine focuses on a specific subject.<br><br>answer : Specialized
natita [175]

Answer:

Specialized fr just want point lol

Explanation:

5 0
3 years ago
Columns can be added to a page in the page layout tab in the blank grouping
ZanzabumX [31]

Answer:

Page Setup Grouping.

Explanation:

In Microsoft Word, Columns break up the page into, at max, 13 columns, and at minumum, 2. The way you go about doing this is

  1. Go to the Layout Tab
  2. Go to the Page setup Grouping
  3. Click on the Columns Action
  4. In the Dialog Box, choose either from one of the presents, or custom make your own column settings.
  5. Click Okay
  6. Done!

3 0
4 years ago
Read 2 more answers
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
Other questions:
  • In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place,
    12·1 answer
  • In regards to storing folders the computer can be described as a ________________.
    7·1 answer
  • Your network administrator finds a virus in the network software. Fortunately,
    13·1 answer
  • What are the features of Cobol language that make it suitable for programming business applications.
    6·1 answer
  • In excel, which symbol means not equal to when comparing two values?
    15·1 answer
  • Your program will search for prime numbers. You will first ask the user for the range of values to search, and use for loops to
    6·1 answer
  • !WILL MARK BRAINLIEST!
    8·1 answer
  • In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
    7·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • Which option ensures that items in a text box or table cell will be in the absolute center of that element?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!