1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
drek231 [11]
3 years ago
10

What keyboard key can you press to limit the angle of the line when using the pencil tool?

Computers and Technology
1 answer:
leva [86]3 years ago
6 0
F6,p hope that helps :)
You might be interested in
Which of the following is not a type of bank?
andreyandreev [35.5K]
Where is the following banks that is listed?
3 0
3 years ago
Read 2 more answers
Functions of barriers include (mark all that apply): A. Define boundaries B. Design layout C. Deny access D. Delay access
gayaneshka [121]

Answer:

A. Define boundaries

C. Deny access

D. Delay access

Explanation:

A barrier is a material or structure used to prevent or block access. Barriers can either be natural or structural and are used for many purposes usually for security reasons. The following are functions of barriers either natural or structural:

  1. Define areas of boundaries
  2. Delay or slow access. Example is the use of speed bumps to slow down vehicles.
  3. Provide access to entrances such as the use of gates
  4. Deny access to unauthorized personnel and allowing authorized personnel.
4 0
3 years ago
What is the minimum number of data points you should usually have to look for signs of improvement on a run chart?
nexus9112 [7]

Answer:

There Should be at least 10 Points

Explanation:

An execution graph becomes more powerful as you add more data points because there will be more opportunities to identify patterns. If you are looking for signs of improvement, you usually need at least 10 data points.

Performance charts (frequently acknowledged as line graphs outside the excellence management field) display the performance of the process over time

6 0
3 years ago
1. If you have the following device like a laptop, PC and mobile phone. Choose one device
ella [17]

Answer:

For this i will use my own PC.

OS - Windows 10

Storage Capacity - 512 GBs

Memory - 16 GB

Wi-Fi - Ethernet

Installed Application - FireFox

Explanation:

An OS is the interface your computer uses.

Storage capacity is the space of your hard drive.

Memory is how much RAM (Random Access Memory) you have

Wi-Fi connectivity is for how your computer connects the the internet.

An installed application is any installed application on your computer.

3 0
3 years ago
Which of these is an advantage of having multiple layers in a drawing and enables you to make changes to one part of an image wi
Ivan

Answer:

enables you to make changes to one part of an image without accidentally changing other parts

Explanation:

Computer aided designs incorporate the use of multiple layers in drawings. The first layer is known as the layer 0, while the present layer the designer is working on is known as the current layer. The advantage of the incorporation of layers in designs include the following

1. It helps objects to be altered, grouped, hidden and moved as the designer wishes.

2. Layers can be grouped and worked on separated and common properties like color and line weight assigned to them.

3. Layers can be manipulated as the user wishes. They can be locked, frozen, turned off, etc.  Locking prevents accidental changes being made on objects.

4 0
2 years ago
Other questions:
  • You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts acces
    7·1 answer
  • Constructors ________. initialize instance variables when overloaded, can have identical argument lists when overloaded, are sel
    11·1 answer
  • The Huntington Boys and Girls Club is conducting a fundraiser by selling chili dinners to go. The price is $7 for an adult meal
    8·1 answer
  • How many check boxes from the following code can be selected at any given time? Home Address Federal Express UPS
    13·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • Define client and.server​
    13·1 answer
  • List three different sets of keywords that could be used to search for information on how to
    15·1 answer
  • Help! I’ll mark you brainly! Please help me.
    15·1 answer
  • You have an audio that contains one pause for 0.2 seconds and another one for 0.6 seconds. When do you need to create a new segm
    5·1 answer
  • Imagine that a team of scientists test a certain hypothesis, and the experimental results show that it is false.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!