1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
photoshop1234 [79]
2 years ago
9

How to scan a screenshot on Brainly?

Computers and Technology
2 answers:
Anton [14]2 years ago
7 0

Answer:

Yes I did did did Explanation:

yulyashka [42]2 years ago
5 0

Answer:

You go to the option that says "snap to solve" an that's it

You might be interested in
2. What is the name for an action performed by the VR Robot?
pychu [463]
Parameter is the answer you wanted
4 0
3 years ago
Read 2 more answers
Back in the mid-1800s, who was one of the first artists to retouch negatives to reduce or eliminate any imperfections in the sho
tia_tia [17]

Answer:

Calvert Richard Jones

Explanation:

Just five years later, in 1846, the first known act of photographic retouching was performed by a Welsh colleague of Talbot's named Calvert Richard Jones, or perhaps by one of Jones's associates

6 0
2 years ago
Read 2 more answers
When you connect several home devices using a wireless router, what network topology are you using? A. bus B. mesh C. star D. ri
bonufazy [111]

Answer:

Star Topology

Explanation:

Because the definition of Star Topoplogy is: In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a device must have to communicate through hub. If one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that data to the designated device.

3 0
2 years ago
An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.
Bumek [7]

Answer:

A and B

Explanation:

EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.

Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.

There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.

4 0
3 years ago
What is a reason for zipping a file?A. to encrypt themB. to return them to their original sizeC. so they display properly on a W
Morgarella [4.7K]

A reason for zipping a file is:

  • D. to combine multiple files into one.

<h3>What is Zipping a File for?</h3>

When a person converts any file to a Zip, it may have one of the following reasons:

  • Reduce the size of the files.
  • Merge files into one.
  • Facilitate the sending of files by mail or others.

Therefore, among the given options, it is possible that a person has as objective to combine multiple files into one, in this way you will be able to find in a single file the information concerning a specific topic and send or transport it more easily.

If you want to learn more about Files, you can visit the following link: brainly.com/question/4461652

5 0
2 years ago
Other questions:
  • Does any body like animal jam
    11·2 answers
  • The part of the computer that provides access to the internet is the?
    14·1 answer
  • Which is an advantage of programming with a procedural language?
    12·2 answers
  • What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning? mail b
    6·1 answer
  • Which of the following changes would be LEAST LIKELY lead to economic growth in a country?
    12·1 answer
  • The Windows Operating System: A) is a web-based operating system for the Internet era. B) is a data management application used
    15·1 answer
  • What is the difference between a switch and a hub?
    8·1 answer
  • Suppose that the instruction format for a modified Little Man Computer requires two consecutive locations for each instruction.
    5·1 answer
  • A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
    6·1 answer
  • ACTIVITY NO. 5 (DAY 5) FACT OR BLUFF. Write Fact if the statement is correct and write Bluff if it is incorrect.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!