1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balu736 [363]
3 years ago
15

Image-editing software is used to _____.

Computers and Technology
1 answer:
34kurt3 years ago
8 0
The answer is (B) En<span>hance a photograph.

</span>

Image editing software is used to enhance or manipulate digital images. They are many primary tools with which a user may enhance, manipulate, and transform images. Many of these programs are also used to create or render computer art from scratch. One example of the most popular image editors is Adobe Photoshop. However for beginners or home users, there are a number of free editing apps to try.

You might be interested in
The proxy statement issued by a corporation is a requirement of: a. The Securities &amp; Exchange Commission (SEC) b. The Financ
8090 [49]

Answer:

The answer is "Option a".

Explanation:

A proxy statement is a file, that provides security and exchange in data commission, that is a powerful tool for holders, as it tells employees, that together with the instructions to do, and other choices, which could be listed as follows are wrong:

  • In option b, It is used in accounting guidelines, that's why it is wrong.
  • In option c, It requires, that's why it is incorrect.
  • In option d, It is wrong because it doesn't committee.
8 0
4 years ago
What is the tallest dam in the united states of america?
hichkok12 [17]
Oroville Dam<span> is an earthfill </span>embankment dam<span> on the </span>Feather River<span> east of the city of </span>Oroville, California<span>, in the </span>Sierra Nevada<span> foothills east of the </span>Sacramento Valley. At 770 feet (235 m) high, it is the tallest dam in the U.S.[8]<span> and serves mainly for water supply, hydroelectricity generation and flood control.
Answer from Wiki</span>
7 0
3 years ago
Read 2 more answers
The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been assigned the following permissions:
Softa [21]
A deny full control to both , because Mary had to have both files or denied full control
3 0
3 years ago
Why have the 'taskmasters' been answering questions so long but they're still only at the ambitious rank?
damaskus [11]

lol that dude hasnt been on since a year what the hell happned to him

5 0
3 years ago
Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for e
Goryan [66]

Answer:

The correct answer to the following question will be "Digital Forensics".

Explanation:

  • Digital forensics is a field of forensics that involves the analysis and retrieval of materials found in electronic devices, sometimes related to cybercrime.
  • The objective of digital forensics methodologies would be to check, maintain and evaluate evidence on computing systems to find possible evidence for a trial. In the initial days of computing, an individual investigator could process files because the power consumption was so small.

Therefore, Digital Forensic is the right answer.

7 0
4 years ago
Other questions:
  • SubVIs...
    15·1 answer
  • The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
    13·1 answer
  • As a safe driver, you cannot, __________
    13·1 answer
  • Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
    12·1 answer
  • How do you import an SVG file?
    12·1 answer
  • Which statement describes Augmented Reality (AR) technology?
    12·1 answer
  • What is the first step in finding a solution to a problem
    13·1 answer
  • Anyone know the friends song by Marshmello? It's stuck in my head.
    12·2 answers
  • Why is my Brainly scanner not work​
    5·2 answers
  • Consider the following static method.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!