1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dennis_Churaev [7]
3 years ago
9

If you can photoshop please text me i need help for my digital media class 7862381441

Computers and Technology
1 answer:
yKpoI14uk [10]3 years ago
5 0

Answer:

I don't know what that is but what type of work you need help with

have a good day :)

Explanation:

You might be interested in
Which word is most appropriate to describe a laptop?
Thepotemich [5.8K]
The best word to describe a laptop would be Portable
8 0
3 years ago
Determine the hexadecimal value of a mask that can be used to complement the values of thefirst and third bits of f1ag and leave
Makovka662 [10]

Answer:

Let our mask be 1010000...000. Notice that, if we apply XOR operation to any number with this mask, the first and third bits will be complemented and all other bits will be unchanged. Since for each individual bit, XOR with 0 does not change the value of bit and XOR with 1 changes the value of bit.

Explanation:

To give a hexadecimal number, we should know the number of bits in representation of number.

8 0
4 years ago
What are the first steps that you should take if you're unable to get onto the internet
sergij07 [2.7K]
Restart phone or go to settings
7 0
3 years ago
Read 2 more answers
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
What is the function of the Enter key
spin [16.1K]

The enter key sends the cursor to the next line, or it executes a command or operation.

4 0
3 years ago
Other questions:
  • In a word processor, Tariq chooses Options from the Tools menu and then selects the Track Changes tab. Which of the following ta
    14·1 answer
  • What is wrong, logically, with the following code? if (x > 10) System.out.println("Large"); else if (x > 6 && x &l
    11·1 answer
  • 20 points
    5·1 answer
  • Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correc
    9·2 answers
  • What is the importance of charts and graphics in providing<br> information?
    15·1 answer
  • Who was dobri dobrev?​
    10·2 answers
  • _____ is confirming the significance of what another person is feeling.
    9·2 answers
  • You are writing a program using the Java language. Which of the following is a requirement of Java syntax?
    6·1 answer
  • Study the graph and answer the questions. The numbers on the left side of the graph are in thousands.
    13·1 answer
  • Whats is a better game?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!