1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nostrana [21]
4 years ago
7

Kim is creating a one-page presentation in Word about her parents’ home country, Vietnam. She has inserted images that are each

mostly yellow or mostly red, because these are the colors of the Vietnamese flag. However, she would like to make the images each appear even more yellow or red. In other words, she would like to keep the same colors in the pictures, but increase the amount of color in each image.
To do this, Kim should double-click on an image, click on the Color tool, and then click on an option shown under Color
Computers and Technology
2 answers:
Nostrana [21]4 years ago
8 0

so what really is the question //???:)


LenaWriter [7]4 years ago
8 0

The answer is Saturation. Put Saturation in the blank.

You might be interested in
Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
wolverine [178]

Answer:

data - Any form of value in a column of a table in a relational database.

DBMS - Short for Database management system, which is a software that can be used to create, manipulate and view databases, e.g. MS SQL Server.

database system - Same as DBMS.

database catalog - Place where the metadata of a Database, its tables, users etc. exists e.g. date created, size, number of columns etc. Also known as Data Dictionary.

program-data independence - Program-data independence refers to the capability of leaving data intact and accessible regardless of modifications to the database that contains the data.

DBA - Short for Database Administrator, person responsible for maintaining the database. Its main responsibility is to keep the data clean and safe i.e. data doesn't contain wrong or invalid data, and is safe from viruses and is backed up.

end user - Anyone who is not directly interacting with a database, but through some software like website and mobile application.

persisten object - An object of a class in a program, that interacts with the underlying database and is responsible for manipulating the database connected to.

transaction-processing system - A transaction process system is part of a software, responsible for making sure critical business transactions, like crediting or debiting money, either goes through cleanly or doesn't at all.

CRUD are the four main types of operations one can do in a database environment. It stands for creating, reading, deleting and updating.

Explanation:

4 0
3 years ago
PLEASE HELP!!!!!!!!!!!! IT'S VERY URGENT!!!!!!!!! Social Networks websites put the responsibility for intellectual property?
Tasya [4]
I think all the answers you picked were correct except the last one I think is B because even though the disc is copyrighted it's not considered intellectual property
7 0
3 years ago
Read 2 more answers
Recall that through either photographic or computer technology, researchers can make a composite (or "averaged") face out of any
kow [346]

Answer:

People prefer composite faces.

Explanation:

If we take some face's picture, and we make it digital, we could make a composite or averaged face, and when we compare composite faces with originals pictures, people prefer the composite faces because there was symmetry in those faces.

For example:

There was a research where a digitalized student faces men and women, researchers make a composite face for every original, people prefer composite face against the original face.

4 0
4 years ago
What is the difference between asking a question with few points and asking a question with many? New to Brainly :D
ANTONII [103]

Answer:

one would be more helpful and the other more vague and less convincing.

6 0
3 years ago
Which automated method for VPN connection deployment would work best in combination with Microsoft Intune or Microsoft Endpoint
maks197457 [2]

There are different kinds of automated method for VPN connection deployment. The automated method for VPN connection deployment would work best  is ProfileXML

  • ProfileXML is known to be often used as a delivery methods in Windows PowerShell, Microsoft Endpoint Configuration Manager, and Intune. For an individual to be able to use the ProfileXML VPNv2 CSP setting, one have to construct XML by using the ProfileXML schema.

An individual can configure the Always On VPN client by using the PowerShell, Microsoft Endpoint Configuration Manager, or Intune. They all need an XML VPN profile to configure the appropriate VPN settings.

Learn more from

brainly.com/question/25554117

3 0
3 years ago
Other questions:
  • Based on the chart below, which pie flavors make up approximately one-half of the total? A pie chart shows the following pie fla
    7·2 answers
  • What does this say:<br> √ans
    6·2 answers
  • 11. What is the hexadecimal representation of each of the following binary numbers? a. 1100 1111 0101 0111
    6·1 answer
  • The large program that controls how the CPU communicates with other components is the​
    9·1 answer
  • What is the basic purpose of the International Space Station that will be completed in 2010?
    11·1 answer
  • ANo _____ works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling pr
    12·1 answer
  • The Federal Trade Commission FIP principle of Notice/Awareness states that
    5·1 answer
  • I GOT A 65% LAST TIME AND IM DOING RETAKE! PLEASE DONT FAIL ME THIS TIME
    8·2 answers
  • Which statement about routers is !!!FALSE!!!
    10·1 answer
  • Define print_shape() to print the below shape. Example output:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!