1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
8

Maria wants to create an image for a Web page. Maria should use _____. help me

Computers and Technology
2 answers:
Inessa [10]3 years ago
8 0
Graphics software
Hope it helps
Irina-Kira [14]3 years ago
4 0

Answer:

Maria wants to create an image for a Web page. Maria should use a graphics software

Explanation:

A graphics software is a tool to create images, logos and graphics. Graphic software provide different options to make and edit an image. So if someone has to create an image, he/she should use a graphic software.

Hence,

Maria wants to create an image for a Web page. Maria should use a graphics software

You might be interested in
The most widely used presentation software program is Microsoft PowerPoint. You can produce a professional and memorable present
dolphi86 [110]

Answer:

B

Explanation:

Because you do not want to make your presentation be dark especially in a low lighted room.

(Certified MOS 2016 Powerpoint User)

8 0
3 years ago
In 1981, Ian Murphy broke into the AT&T online computer system and changed their clocks, allowing people to make calls durin
poizon [28]
A. intentionally or recklessly disrupt, degrade, or destroy information or services on the computer
5 0
2 years ago
Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code,
oksano4ka [1.4K]

Answer:

(a) Weak passwords

Explanation:

Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.

Examples of weak passwords are;

i. those generated from the name of a user.

ii. those generated for a user by default.

iii. those generated from words from dictionary or other similar materials.

iv. those that don't include a combination of letters and numbers and even symbols.

v. those that are short in length e.g less than 8 characters.

3 0
3 years ago
Read 2 more answers
QUESTION 9 / 10
In-s [12.5K]

Answer:

The answer is C. the bank will cancel your credit card.

Explanation:

5 0
2 years ago
I’ll mark who ever is first or last Doesn’t matter JUST PLEASE HELP
polet [3.4K]
I can’t really see it
8 0
3 years ago
Other questions:
  • When a crystal grows in unrestricted space, how does growth occur?
    14·2 answers
  • Which of the following would be considered a strong password?
    5·2 answers
  • If an ARQ algorithm is running over a 40-km point-to-point fiber optic link then:
    12·1 answer
  • Frank is a writer. He needs to work for long hours and type for long periods on the computer. What injury can Frank develop?
    15·2 answers
  • Consider the following code which deletes all the nodes in a linked list. void doublyLinkedList::destroy() { nodeType *temp; //p
    14·1 answer
  • What is a computer OPERATING SYSTEM?
    5·1 answer
  • What is a project?
    5·2 answers
  • Image-editing software is used to_____
    7·1 answer
  • Can someone help me with this code please explain it to me in simple way
    15·1 answer
  • Why is it important to continiously conduct penetration testing for a strong security system?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!