1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
2 years ago
14

What is the effect of flattening layers in image editing?

Computers and Technology
2 answers:
PolarNik [594]2 years ago
6 0
The answer to this blanks are black and visible
alina1380 [7]2 years ago
5 0

Answer:

Hello There!!

Explanation:

I believe the answers are:

-First blank=>c. transparent

-Second blank=>b. visible.

hope this helps,have a great day!!

~Pinky~

You might be interested in
Write a function called printBackwards() that will work with a C string. The function will print any C string backwards. You don
yaroslaw [1]

Answer:

void printBackwards(char s[])

{

   int n=strlen(s)-1;//finding the last index of the string..

   for(int i=n;i>=0;i--)//loop to print the string backwards..

   {

       printf("%c",s[i]);//printing the character of the string..

   }

}

Output:-

abcdefg

gfedcba

Explanation:

I have used strlen function that will be used after including the string.h header file.It returns the length of the string.After finding the last index I have iterated over the c string in reverse order and printing the character of the string one by one.

8 0
3 years ago
Which of the following offers more reliable antivirus protection? Question 43 options: A) antivirus software on user PCs B) anti
marissa [1.9K]

The option which offers more reliable antivirus protection is an installation of: B) antivirus software on the mail server.

<h3>What is an antivirus?</h3>

An antivirus can be defined as a software application that is designed and developed to prevent, scan, detect, delete and protect a computer from viruses and malwares that are capable of infecting and destroying both system and user files.

In this context, the option which offers more reliable antivirus protection is an installation of antivirus software on the mail server, rather than on user PCs.

Read more on antivirus here: brainly.com/question/17209742

#SPJ1

5 0
2 years ago
Price of ETH coin right now?<br> Don't answer if u don't know.
zzz [600]

Answer:

58,715.40

Explanation:

5 0
2 years ago
Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the
Morgarella [4.7K]

Answer:

POST

Explanation:

  • POST stands for Power On Self test.
  • The process of booting the system involves performing the self test POST.
  • POST involves testing the computer hardware which are required for proper functioning of the computer.
  • If the POST test fails, the computer performs the necessary action required for the proper functioning of the computer.It immediately raises alarm ( beeps ) . Different number of beeps represents different devices which are having trouble.
  • So, option (D) is correct option.
  • Option (A) IDE is not the test. So, option (A) is wrong option.
  • Option (B) POTS is not the test.So, option (B) is wrong option.
  • Option (C) QoS is not the test. So, option (C) is wrong option.
7 0
3 years ago
In addition to developing sketches, computer-aided design programs are used by fashion designers to perform which task?
nikdorinn [45]

Answer:

flat drawing, pattern making development, computerized marker planning and many other fashion designing related aspects.

Explanation:

6 0
2 years ago
Other questions:
  • Which computing component is similar to the human brain
    6·2 answers
  • What is the purpose of the chart feature in word?
    15·1 answer
  • A media scholar is trying to find out whether internet or television political ads are more persuasive. what kind of effects is
    7·1 answer
  • You have been asked to report on the feasibility of installing an IP CCTV camera system at your organization. Detail the pros an
    5·1 answer
  • What is a short sequence of characters that appears at the end of a filename and is preceded by a period called __________
    5·1 answer
  • Technology trends in education play a key role in a student’s
    15·1 answer
  • Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p
    14·1 answer
  • Indicate if the statement is true or false False 1. A spreadsheet cannot recalculate after you have changed data in your workshe
    15·1 answer
  • A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
    15·1 answer
  • Write l for law of enrtia,ll for law of Acceleration and lll for law of enteraction.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!