1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
4 years ago
12

Pressing and holding the what key while dragging a corner handle of an image proportionally resizes it

Computers and Technology
2 answers:
sasho [114]4 years ago
8 0
The left key I believe. I have a Mac so 
matrenka [14]4 years ago
8 0
Hey there!

Holding down the "Shift" key allows for you to resize your document or photo freely without distorting it in any way. It will stay the exact same ratio as before you resized, only the document itself will be proportionately larger. 

Hope this helped you out! :-)
You might be interested in
The smallest building block of a wireless lan is a ______.
Anarel [89]
Wireless LAN, or also denoted as WLAN is a Local Area Network that uses wireless communication. The standard for WLAN is given in IEEE <span>802.11 </span><span>
The smallest building block of a Wireless LAN is a basic service set (BSS).</span><span> This set consists of wireless stations which are executing the same MAC protocol and competing for access to the same shared wireless system.</span>
6 0
3 years ago
What influences my school my church and my leader on my society​
marissa [1.9K]

Answer:

The Church can play a vital role in assisting Christians to help others by providing: food banks – places where people living in poverty can go and collect some food. help for the homeless – Housing Justice is a Christian charity that tries to ensure everyone has a home.

Explanation:

7 0
2 years ago
Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
vfiekz [6]

Answer:

Encrypted message: CPONYIERTN

Explanation:

Message = ENCRYPTION

keyword = ONE

keyword ONE is of length 3 so the rows are of length 3

Permutation is given by the alphabetical order of the letters in the keyword ONE. Here E appears first in alphabet, then comes N and in last comes O so the order would be 321.

Now the message ENCRYPTION is written in tabular form with width of the rows defined by a keyword ONE

O     N     E

3      2      1

E      N     C

R      Y     P

T       I     O

N

Now this message is read by the column in alphabetic order of the keyword ONE.

Since alphabetic order of E is 1 so the column under E is read first which has the letters:

CPO

Then column under N is read which has the letters:

NYI

In the last the column under O is read which has the letters:

ERTN

So the encrypted message is:

CPONYIERTN

6 0
3 years ago
Q. Which protocol would best serve to authorize users to access directory services?
Arlecino [84]

Answer:

Lightweight directory access protocol (LDAP)

Explanation:

Lightweight directory access protocol is a protocol that provides a common open protocol for interfacing and querying a directory service information given by a network operating system. LDAP is an application layer protocol that uses port number 389 via tcp and udp. LDAP queries are transmitted in text and allows for all or some data be queried anonymously.

Lightweight directory access protocol, ordinarily does not require user authentication connection, but this can be configured to ask for user credentials.

6 0
3 years ago
How to print<br> 1<br> 321<br> 54321<br> 7654321<br> triangle pattern in python
krok68 [10]

Hope this helps, Upvote if you like it :)

6 0
2 years ago
Other questions:
  • A plan that outlines the steps and timeline for reaching a certain goal is called a(n):
    13·1 answer
  • Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read
    6·1 answer
  • Write a function named printtriangle that receives a parameter that holds a non-negative integer value and prints a triangle of
    7·1 answer
  • Given the strings s1 and s2 that are of the same length, create a new string consisting of the last character of s1 followed by
    10·1 answer
  • Kim is creating a PowerPoint
    13·1 answer
  • Which do switches create?<br> Networks<br> Wireless access points<br> Routes<br> Collision domains
    13·1 answer
  • Persuasion is when Someone speaks to crowd about love <br>○True<br>○False​
    10·1 answer
  • What is the value of the variable result after these lines of code are executed? &gt;&gt;&gt; a = 5 &gt;&gt;&gt; b = 2 &gt;&gt;&
    8·2 answers
  • Please help I’m not trying to fail
    7·2 answers
  • Is each of the following method identifiers (a) legal and conventional, (b) legal but unconventional, or (C) illegal?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!