1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
beks73 [17]
3 years ago
7

derek is working with photo editing software what guidline should he follow A change the composition of the image B change the l

ighting in the image C work directly on the original image D work on layers if possible​
Computers and Technology
2 answers:
Sergeu [11.5K]3 years ago
6 0

Answer:

A

Explanation:

Masteriza [31]3 years ago
5 0

Answer:

D - work on layers if possible

Explanation:

Adding layers will make sure that if you mess up you can delete the layer instead of having to restart. Also I took the same test and got it correct.

You might be interested in
Select the six criteria for a baseline.
Karo-lina-s [1.5K]

Explanation:

nose pero también se usa para la musica electronica

6 0
3 years ago
Which structures protect the cell? Select two options.
Rzqust [24]

Answer:

cell wall

cell membrane

3 0
2 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Six security issues and six descriptions are shown below.
Trava [24]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question contains six securities terms and definitions.

The goal of this question is to properly map the term to its correct description/definition.

You can find the complete mapping in the attached image.

7 0
2 years ago
PLATO
storchak [24]

Answer: here is the answer ☀️keep on shining☀️

Explanation:

5 0
3 years ago
Other questions:
  • School computer labs are used often to teach technology skills or subject-specific skills ____ the rest of the curriculum.
    11·1 answer
  • Two electronics technicians are looking at the piece of testing equipment shown in the figure above. Technician A says that this
    8·2 answers
  • Match the spreadsheet features with their respective descriptions.
    9·2 answers
  • A bus topology network is most often deployed as a peer-to-peer network. <br> a. True <br> b. False
    7·1 answer
  • Enterprise application integration (eai) software enables users to model the business processes and interactions that should occ
    8·1 answer
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • Which type of operating system is usually used in personal computers
    13·1 answer
  • A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
    5·2 answers
  • In Outlook 2016, the Tell Me function can be accessed by
    15·2 answers
  • B. Some of Company X's new practices and systems are unethical. Business ethics is a set of codes
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!