1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
8

Which retouching action is unethical?

Computers and Technology
1 answer:
e-lub [12.9K]3 years ago
7 0

Answer:

B.) removing the saturation in a photograph intended as a magazine cover page

You might be interested in
Question 1 of 40
Novay_Z [31]

Answer:

D. Federal Work-Study

Explanation:

8 0
3 years ago
What is the oldest malware victor
arsen [322]

Answer:

The oldest malware vector was emails.

Explanation:

Websites were not widespread early on into the internet, however it was very easy to have a virus that uses an email contact list, where it can send itself to other email addresses and spread.

7 0
3 years ago
Read the scenarios below, then use the drop-down menus to decide if you should use a database.
Romashka [77]

Answer:

A. The parent-teacher orginization keeps a log of cookies sales to raise money for the elementary school.

Explanation:

5 0
3 years ago
Which statement best describes the concept of usability?
nordsb [41]

Usability emphasizes utility over aesthetics  statement best describes the concept of usability.

B.  Usability emphasizes utility over aesthetics.

<u>Explanation:</u>

Usability mainly speaks about the utility of an item. There are many wastes created in home and work place and those are sometimes thrown without knowing that it can be re-used for another purpose.

It is always better to re-use the product without considering aesthetic aspects though aesthetic is equally important. We can make the old objects to create a new one.

There are many videos in the social media to make the old objects to be used as a sub-product to create a new object and sometimes it looks better than an old one.

4 0
4 years ago
Read 2 more answers
Zbn-ivfh-ovm is the meet code enter there lol
RSB [31]

Answer:

bet

Explanation:

8 0
3 years ago
Other questions:
  • RDBMS stands for_________________
    12·1 answer
  • You can tell that the equals() method takes a ____ argument because parentheses are used in the method call.
    6·1 answer
  • What is the troubleshooting process?
    5·1 answer
  • What is the difference between an electronic notebook and electronic flash cards?
    8·1 answer
  • Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a
    11·1 answer
  • Select the correct answer.
    6·2 answers
  • Jack wants to save his PowerPoint file electronically. He should store his file in:
    6·2 answers
  • Which phrase best describes a scenario in Excel 2016?
    5·2 answers
  • How can you make a search phrase more effective?
    11·1 answer
  • A network device that is used to connect multiple devices together without segmenting a network is a __________.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!