1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
3 years ago
14

what is a program or collection of programs that enable a person to manipulate a visual images on a computer​

Computers and Technology
1 answer:
kifflom [539]3 years ago
3 0
In computer graphics, graphics software refers to a program or collection of programs that enable a person to manipulate images or models visually on a computer. ... In addition to static graphics, there are animation and video editing software.
You might be interested in
Code written by computer programmers is translated to binary code, so computers can understand the instructions. True or False
san4es73 [151]

Answer:

True

Explanation:

High-level languages such as Java, C++, Ruby, Python, etc need to be translated into binary code so a computer can understand it, compile and execute them.

Machine language is the only language that is directly understood by the computer because it is written in binary code. But writing codes in Machine Language is tiring, tedious, and obsolete as no one really uses it anymore.

7 0
3 years ago
Which of the following Web 2.0 tools can aid in searches using key words? (1 p
svet-max [94.6K]

Web 2.0 Tools can aid in searches using key words

Explanation:

Web 2.0 Tools can aid in searches using key words .The followings are some tool like face book and you tube and google search that allow users to searches using key words. web 2.0 tools can be used to teach curriculum content, store data, create and edit video, edit photos,etc.,

Web 2.0 tools are easy to use websites designed to encourage creativity, team work, also helps in higher order thinking skills in classroom .The important thing is to teach students to think critically with whatever tools they have in front of them using key words while searching.

3 0
3 years ago
Write a for loop to populate vector userGuesses with NUM_GUESSES integers. Read integers using cin. Ex: If NUM_GUESSES is 3 and
Tanzania [10]
#include <iostream>
#include <vector>

#define NUM_GUESSES 3

int main()
{
  std::vector<int> userGuesses;
  for (int i = 0, input; i < NUM_GUESSES; i++)
  {
    std::cin >> input;
    userGuesses.push_back(input);
  }
}
8 0
4 years ago
Read 2 more answers
Aaron is stating the main idea of what he read in his own words. He is _____.
Feliz [49]

Answer:

summarizing

Explanation:

when someone explains in their own words the main idea of a story, it is summarizing.

8 0
3 years ago
Read 2 more answers
Your company needs to develop an Apex trigger in a sandbox to work with large amounts of records. The trigger needs to be tested
Svetllana [295]
C. Partial Copy Sandbox

5 0
3 years ago
Other questions:
  • Write the formal descriptions of the following sets: (a) The set containing the numbers 5, 9, and 27. (b) The set that contains
    5·1 answer
  • What online resource name does a major University end with
    7·2 answers
  • Which examples demonstrate common Network Systems workplaces and employers? Check all that apply.
    13·2 answers
  • What term describes a wireless network topology in which access points work as peer devices on the same network?
    14·1 answer
  • Write an expression that prints 'You must be rich!' if the variables young and famous are both True. Sample output with inputs:
    9·1 answer
  • The ____ option must be used when running a program in order to see the results of assert statements.
    7·1 answer
  • Everytime my daughter tries to ask for an app, or a money thing inside an app.. The request won't go through. Anybody know how t
    12·1 answer
  • A traffic signal system will only operate if it receives an output signal (D=1) This only can occur if: Either (a) signal A is R
    6·1 answer
  • Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be
    13·1 answer
  • NFPA 780, Standard for the Installation of Lightning Protection Systems provides information on the installation of _____ for li
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!