1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
3 years ago
13

Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of

that place in her letter. Which feature of a word processing program will help Claire to remove unwanted parts of the pictures?
Claire uses the ------------option from the Format tab to remove unwanted parts of the pictures.

i already tried crop and got it wrong
Computers and Technology
1 answer:
alexgriva [62]3 years ago
7 0

Claire uses the <u>Crop option</u> from the Format tab to remove unwanted parts of the pictures.  

<u>Explanation:</u>

In Microsoft Word, after inserting a picture, when we click on the picture to select it, the ribbon shows the format options. Various options are available for formatting a picture, however, in order to cut out the unwanted portion Claire needs to use the crop option.

Crop options allow the user to cut resize an image by cutting out the part of the picture user decides.

<u>To crop the picture follow the procedure given below:</u>

  • Double click on the image
  • Click the format tab to size the image
  • Click crop, perform cropping using the handles appearing at the edge of image.
  • Drag handles to crop and save them.
You might be interested in
A. True
Goryan [66]
The answer is :True
6 0
4 years ago
Read 2 more answers
Write three tasks students can preform in a digital classroom?
Nadya [2.5K]

Students can perform several tasks in a digital environment. For example, they can watch instructional videos, take notes, and participate in peer discussions.

this is the right answer .just did it

7 0
3 years ago
Read 2 more answers
A function may return a pointer, but the programmer must ensure that the pointer:
elena-14-01-66 [18.8K]
Hello i am kust gere to answer the qustions nothing else
4 0
4 years ago
If we develop a new policy for our environment that requires us to use complex and automatically generated passwords that are un
stepan [7]

Answer:

The answer is "Login complexity will be increased very exponentially".

Explanation:

In computer science, The password is also known as a series of characters, which allows you to use the validation process to validate any customer's privacy.  

  • It is normal usage of passwords that work together with a username to make it, it only accessible by the user, and to give the user accessibility to a computer, software or web page.
  • If the password is more complex so, it is hard to learn, and it also provides login complexity, that's why we must use a less complex password.
7 0
3 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Other questions:
  • Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security
    10·1 answer
  • How does soil lose its value? A.When the top soil is stripped by wind or water B.When the bedrock is damaged by animals C.When w
    15·1 answer
  • The ____ layer of the osi model performs a series of miscellaneous functions necessary for presenting the data package properly
    6·1 answer
  • The PATH environment variable.
    5·1 answer
  • What is encyclopedia. Com considered to be?
    14·1 answer
  • How to build a communication network
    13·1 answer
  • . Use of communications and information systems that are familiar to users is a part of which key principle? A. Security
    14·2 answers
  • 2. Why don't all buses on a motherboard operate at the same speed?​
    6·1 answer
  • 2.Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
    10·1 answer
  • Who is the father of computer​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!