1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
7

PLZZZ HELLPP... PhotoShop

Computers and Technology
1 answer:
Burka [1]3 years ago
4 0
LEFT SIDE :
Layer menu
Layer filters
Layer groups
Link layers

BOTTOM :
Layer effects
Layer menu
Visibility

RIGHT SIDE :
Add new layer
Opacity
Fill opacity

You might be interested in
Ndcdeviceid?????????????????????​
butalik [34]

YESS

Explanation:

YESSssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss

7 0
2 years ago
Students enrolled in a digital classroom participate in discussions and take field trips with classmates. watch instructional vi
krek1111 [17]

Answer:b

Explanation:gszrxewzgdtxherhzre

7 0
3 years ago
If she presses the left arrow , what will happened
Harman [31]
The keyboard will move
4 0
3 years ago
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
2 years ago
I was able to solve the question :))
Leviafan [203]

Answer:

ill take the points anyway

Explanation:

4 0
3 years ago
Other questions:
  • Your organization issues devices to employees. These devices generate one-time passwords every 60 seconds. A server hosted withi
    15·1 answer
  • Modify the program so the output is: Annual pay is 40000 Note: Whitespace (blank spaces / blank lines) matters; make sure your w
    9·1 answer
  • Smart art can be used to create _____that highlights relationships betweeen two items
    8·2 answers
  • Who was eqvtime tayaishvili?​
    13·2 answers
  • Which statement is used to create a file object that will append data to an existing file? BufferedWriter salesdata =
    7·2 answers
  • Which of the following correctly describes the function of an IP address
    13·1 answer
  • Many people in modern society have the notion that hard disks can be searched in an hour and files can be recovered from inciner
    10·1 answer
  • Is there a way of how to delete this if so pleas tell me
    11·1 answer
  • Chris needs to modify the default bullets that are used in a nonnumbered list in Word.
    12·2 answers
  • The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulat
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!