1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
14

Why do we need the system requirements for Adobe photoshop?

Computers and Technology
1 answer:
babymother [125]3 years ago
7 0
I’m sorry and I do not know I just need credits thank have a nice day
You might be interested in
You are contacted by a project organizer for a university computer science fair. The project organizer asks you to hold a forum
Usimov [2.4K]

Answer:

Note this:

Nothing beats an open market community!

See below the explanations.

Explanation:

Linux Operating system was created in the early 1990s by Finnish software engineer "Linus Torvalds" and the Free Software Foundation.

1. Why choose Linux over windows.

2. Linux strength.

3. Linux concept.

3 0
4 years ago
Match the keyword to its definition. 1 . Pixel A device that is not central to the operations of a computer 2 . Peripheral Stand
photoshop1234 [79]

Answer:

1 . Pixel:  Smallest element of a picture on a computer display.

2 . Peripheral: A device that is not central to the operations of a computer.

3 . Small computer system interface: Interface for computer device that has its own control function

4 . Input: Devices that take information from the computer user and deliver it to the processor

5 . electrostatic discharge: The instantaneous flow of electricity between two objects when they touch

6 . storage: Devices like hard drives or floppy disks that store data .

7 . Integrated drive electronics: Standard that addresses the physical connection and transfer speed between a computer and a peripheral device

8 . Bluetooth: A wireless technology that uses radio waves to transmit data across short distances.

9 . Output: Devices that take information from the processor and deliver it to the computer user

10 . Megabits per second: Measurement of the speed of data transfer

4 0
3 years ago
Peter is software designer working at a big software company. He just found out that he has been shifted to their downtown branc
sweet [91]

The managers at Peter’s company have an Autocratic environment.

<u>Explanation:</u>

The managers who are autocratic in nature make decisions on their own. They will never get insights of their employees and they will not take the inputs of them in taking any decisions. This type of management is suitable in an organisation where there is an urgent need to taking decisions to any matter.

Managers who are autocratic in nature will make decisions without consulting anyone's advice.  This type suits those organisations wherein there are very less number of employees. Here, the manager of Peter did not consulted peter in making decisions related to him, the environment is authoritarian or autocratic.  

7 0
3 years ago
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
Which device is connected to a port on a switch in order to receive network traffic?
inysia [295]

Answer:

"Passive IDS" is the appropriate answer.

Explanation:

  • A framework that is designed mostly for monitoring and analyzing internet traffic operations and alerting a user or administrator about possible bugs, as well as disruptions, is known to be passive IDS.
  • This IDS cannot carry out certain preventive as well as remedial processes as well as operations by itself.
6 0
3 years ago
Other questions:
  • What best compares potrait and landscape orientations
    6·1 answer
  • Is ubisoft still making assassins creeds on xbox 360
    8·2 answers
  • It is a small hand tool used generally in decorative works such as making garnishes
    15·1 answer
  • ARP only permits address resolution to occur on a single network.could ARP send a request to a remote server in an IP datagram?w
    9·1 answer
  • Brian is a computer engineer who writes security software for a banking system. The
    13·1 answer
  • Cómo se hacían antes las cosas que hoy en día se hacen apoyadas en aplicaciones y software?
    10·1 answer
  • Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she i
    11·1 answer
  • What is the computer generation​
    15·1 answer
  • Which attributes does not come in tag?
    12·2 answers
  • Different between I time and E time​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!