1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
6

This is pixlr

Computers and Technology
1 answer:
kramer3 years ago
6 0
1 - Cropping
2 - Filter
3 - High Resolution
4 - Opaque
Thank you!
You might be interested in
Which feature in word automatically corrects typos, minor spelling errors, and capitalization as you type? autocomplete spelling
Fed [463]
I think auto correct.....,
8 0
3 years ago
Which of the following application delivery methods requires Internet access?
morpeh [17]

Answer:Cloud hosted

Explanation:

3 0
3 years ago
Dell is an American corporation that deals with computer technology. With its worldwide sourcing and fully merged production and
UNO [17]

Answer:

Dell is a globally integrated company

Explanation:

A company that designs its strategy, management, and  operations in pursuit of a new goal; which is the integration of production and value delivery worldwide is known to be a globally integrated company.

From the question, Dell was described as an American corporation that deals with computer technology with its worldwide sourcing and fully merged production and marketing system. Thus, Dell is  a globally integrated company.

7 0
4 years ago
_____ are used to associate a style sheet or style rule with a specific device or list of device features.â
Usimov [2.4K]
Media queries are used to associate a style sheet or style rule with a specific device or list of device features<span> .This technique is used for delivering a tailored style sheet to different devices and applying </span><span>CSS styles depending on a device's general type, specific characteristics  or environment.
</span>
6 0
3 years ago
Read 2 more answers
The protection of intellectual property (ip) is an example of what kind of information security need?
timama [110]

The protection of intellectual property (IP) is an example of Confidentiality of information security need, Unauthorized disclosure of intellectual property might result in the loss of whatever competitive advantage the IP may have provided the company.

What is considered IP?

Any creation of human intelligence that is shielded by the law from illegal use by others is generally referred to as intellectual property. A limited monopoly over protected property is inevitably created by the ownership of intellectual property.

Who owns intellectual property?

A work's owner is typically considered to be its creator. But for various kinds of property and in various situations, intellectual property ownership can be decided in various ways. For instance, if a piece of work is produced for a client, the client is the owner of that intellectual property.

Learn more about intellectual property: brainly.com/question/18650136

#SPJ4

3 0
2 years ago
Other questions:
  • What is the first step to creating a PivotTable?
    9·2 answers
  • Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo
    9·1 answer
  • A graphic design student is putting the finishing touches on her PowerPoint presentation for her speech. She is carefully analyz
    12·1 answer
  • Elisa and Josh need to access General Help. Elisa will press the F1 key. Josh will click on ? in the upper-right corner of the W
    14·2 answers
  • Which three skills are useful for success in any career?
    8·1 answer
  • Database applications are seldom intended for use by a single user.
    15·1 answer
  • 2. 5s is a Chinese principle adapted for use in the workplace.<br>True or False​
    11·1 answer
  • A group of users in a small publishing office want to share large image files in a common folder with high availability. Which o
    15·1 answer
  • What (if any) are the same feature requirements that might be found in server software/OS environments
    10·1 answer
  • A _______ attack is where the input includes code that is then executed by the attacked system.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!