1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
12

Discribe two ways to zoom in and out from an image

Computers and Technology
1 answer:
vredina [299]3 years ago
4 0

Option 1: Spread your fingers on your laptop's trackpad.

Option 2: Press Command (or control) and the + sign.

Hope this helps!

Have a wonderful day!

You might be interested in
Document could not be saved bad file handle
creativ13 [48]
To help fix this problem try reviewing the file and opening it on your own when your sure its good on your side then try to save it if all else fails make a new one
8 0
4 years ago
Print("Student" == "Teachers" or 99 != 88) will output False<br><br> true or false
ioda

Answer:

it will output True, so the statement is false

Explanation:

6 0
3 years ago
Professor Gekko has always dreamed of inline skating across North Dakota. He plans to cross the state on highway U.S. 2, which r
geniusboy [140]

The efficient algorithm by which he can determine which water stops he should make; <em>has been determined below and the strategy which is the greedy strategy has been proven to yield an optimal solution.</em>

<em />

To solve this question optimally, we will make use of the greedy solution.

In this method, we will maximize the distance that can be covered from a particular point in such a way that there must be a place where water can be gotten before a run out is experienced.

Now, the first point at which there will be a stop should be located at a point that is farthest from the starting position and is also made to be ≤ m miles from the starting position.

Now, this this situation is one that shows optimal substructure and since our  first stopping point will be made to be at p, it means that we are solving the sub-question with the assumption that our starting point is at p.

When we combine the two stated plans above, we will arrive at an optimal solution for the normal reasons via cut and paste.

B) Now we need to show that the greedy approach earlier used produce a first stopping point which is contained in the optimal solution.

Let O represent any optimal solution whereby the professor stops at positions o₁, o₂, o₃....oₙ.

Let h₁ represent the farthest stopping point that is reachable from the starting point. Then we can replace o₁ by h₂ to generate a modified solution H since o₁ - o₂ < o₂ - h₁.

Finally, we can really make it to the positions in H without having to run out of water and since H has the same number of stops, we can conclude that h₁   is contained in one of optimal solution.

Therefore our strategy which is the greedy strategy has been proven to work.

Read more about algorithms at; brainly.com/question/24793921

8 0
3 years ago
Your client has asked you to turn on warnings for duplicate check and bill numbers in their QuickBooks Online company. Take a lo
lana66690 [7]

Answer:

( 1 ) Select the gear icon

( 5) Select save

Explanation:

we have given that client ask turn on warning in Quick Books Online company so

we do 1st step that is

the first is step we we select the gear icon

after that select Account and Settings

and we go for advance tab

after that we perform the action that is Other preferences section

and  select the option there to warn when we use duplicate check number

then we select the save button for save over above performance

so here fill up are first ( 1 ) Select the gear icon and last ( 5) Select save

7 0
4 years ago
Multicurrency: There are several products that universal containers sells exclusively in Europe and the UK. Opportunities for th
ivanzaharov [21]

Answer:

D – Create a new validation rule that allows only EUR or GBP to be selected from all active currencies when an opportunity is created for these products.

Explanation:

Application containers are used to hold applications deployed to the internet during production. These containers are products of online hosting cloud services, used to control and maintain the application in production.

Access to the application's functionalities requires validation, the user must be authenticated and authorized to access certain services of the application.

5 0
4 years ago
Other questions:
  • Which type of system must you connect to and use to make changes to Active Directory?
    15·1 answer
  • Explain how applying different network topologies could have an impact on the security of a network
    11·1 answer
  • One of the most common causes of fires in the home and workplace is: a. All of the answer choices b. Arson c. Candle d. Faulty e
    6·1 answer
  • What is computer-aided design/computer-aided manufacturing (CAD/CAM)? a.A cultural trend that places value on an individual's ab
    12·1 answer
  • How to draw use case diagram
    13·1 answer
  • The metric unit used for length
    5·1 answer
  • Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the ar
    12·1 answer
  • Discuss at least 1 Microsoft Windows security features that could protect data?
    5·1 answer
  • It is a life long skills like spelling, it is a skill of typing data currently and quickly using a computer keyboard
    9·1 answer
  • An electronic display that senses physical touch by hands, fingers, or tool such as a stylus is a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!