1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
4 years ago
11

5. When resizing an object with the Select Tool, what keyboard key should you press to make it resize equally in all directions?

(1.0 points)
Computers and Technology
1 answer:
Elan Coil [88]4 years ago
4 0

Answer:

When resizing an object with the select tool, the keyboard key you should press to make it resize equally in all direction:

  • The Shift Key

Explanation:

  • In photoshop software, you should hold the shift key to resize the object or image so that it can be resized equally in all direction otherwise it will not resize equally.
  • In a famous presentation making software, this same method is used to resize the objects and images equally.
You might be interested in
12. Because Java byte code is the same on all computers, compiled Java programs a. are nonexistent b. must be re-compiled for ea
GenaCL600 [577]

Answer:

C) Highly portable

Explanation:

This means they can run on any computer or platform that supports Java without the need for recompillation.

This idea is popularly called WORA that is Write Once Run Anywhere.

Software Applications written in Java are compiled to bytcode (.class) which are intended to run on the Java Virtual Machine (JVM) irrespective of the architecture of the computer or device.

5 0
3 years ago
For which task would you most likely use word-processing software? question 5 options: formatting text with various fonts, sizes
dexar [7]

The tasks for which word-processing software is required are formatting text with various fonts, sizes and styles, placing text in rows and columns for sorting and filtering, and placing numeric data in rows and columns for statistical analysis. The correct options are A, B, and D.

<h3>What is word processing software?</h3>

A word processor is a hardware or computer program that allows for the input, editing, formatting, and output of text, along with other functions.

The act of creating, editing, saving, and printing documents on a computer is referred to as word processing. Word processing requires the use of specialized software known as a Word Processor.

Word processing software is used to edit text documents such as resumes and reports. You basically enter text by typing, and the software provides tools for copying, deleting and various types of formatting.

Today, the word processor is one of the most frequently used software programs on a computer, with Microsoft Word being the most popular word processor.

Thus, the correct options are a, b, and d.

For more details regarding word processing software, visit:

brainly.com/question/20910519

#SPJ2

3 0
1 year ago
Read 2 more answers
Which part of the network communication process is responsible for sending and receiving data to and from the network media?
Whitepunk [10]

Answer:

Network Interface

Explanation:

Network interface is a piece of hardware or software that interfaces between two or more pieces of equipment or protocol layers in the computer network.

To do this, the computer needs a network interface card (NIC).

Ths NIC controls the wired and wireless connections of a computer to exchange information with other computers and the Internet.

4 0
3 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
Match the network component to its function.
Anni [7]

Answer:

where are the functions??

5 0
3 years ago
Other questions:
  • How to make a negative number positive in excel
    13·1 answer
  • Pat creates a table in a spread sheet
    9·1 answer
  • Convert A4B from hexadecimal to binary. Show your work.
    11·1 answer
  • 1 what elements of composition are under your control in photoshop
    13·1 answer
  • Which of the following is a disadvantage of using open source software?
    14·1 answer
  • Witch is a game story device
    5·1 answer
  • Three Cat 5e cables were run from an office area to three computers in a machine shop. Work took place on the weekend when the m
    14·1 answer
  • What is the gear ratios of a gear train with an input gear of 48 teeth and an output gear of 12?
    15·2 answers
  • A _____ movement tries to improve a part of society, usually through legal methods.
    6·2 answers
  • What is the purpose of each component ?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!