1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rom4ik [11]
3 years ago
12

Which technique is used to convert a color image to a black and white image?

Computers and Technology
1 answer:
Andrew [12]3 years ago
4 0
Microscope
bc thats the answer
You might be interested in
Select the correct answer from each drop-down menu.
DerKrebs [107]

Answer:

?

Explanation:

?!?!

3 0
3 years ago
Which section in a slide is not visible to the viewers of a presentation, but is visible to the presenter in the normal Slide vi
lyudmila [28]

Answer:

the speakers note

Explanation:

when putting it in presenter view it'll have a separate window so you'll have access and see speaker notes etc

3 0
3 years ago
What is a partition gap, and how might it be used to hide data?â?
o-na [289]
Partition is a logical drive.  Large disks have to be partitioned in order to be structured. Knowing what partition is, partition gap refers to the unused space between partitions. It is also "Inter-partition<span> space" which</span><span> can be used to hide data on a hard disk. In this case a disk editor utility is used to access the hidden data in the partition gap.</span>
4 0
3 years ago
Read 2 more answers
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
3 years ago
Is co2+4h2--&gt; ch4 + 2h2o a combustion​
Nadya [2.5K]

Answer:

No its not a combustion its a formation.

Explanation:

7 0
3 years ago
Other questions:
  • ____ was the first-generation cellular telephone system.​ a. ​Advanced Mobile Phone Service (AMPS) b. ​Global System for Mobile
    12·2 answers
  • What is deshtop in desktop publishing
    11·1 answer
  • How can my computer catch a virus?
    13·1 answer
  • A company that manufactures machine parts order a new system that makes Products at ten times the speed of earlier machines. the
    13·2 answers
  • A customer has a system with a Gigabyte B450 Aorus Pro motherboard. He wants to upgrade the processor from the AMD Athlon X4 950
    8·2 answers
  • (08.03 MC) Maya is a senior in high school and would like to pursue a career in web design. She needs more information about wha
    11·2 answers
  • Read the sentence.
    10·1 answer
  • A(n) ____ is a logical grouping of several data files that store data with similar characteristics.
    8·1 answer
  • A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
    9·1 answer
  • If you need to change the typeface of a document, which menu will you choose?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!