1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
2 years ago
10

1. image-editing software

Computers and Technology
1 answer:
Snezhnost [94]2 years ago
8 0
  • PDF:-Portable Document Format
  • Database software:-software that organizes a collection of information
  • image-editing software :-software used to enhance photographs
  • presentation software :-software used to create a slide show
  • CAD:-software used to create technical drawings.

Done

You might be interested in
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
a department chair decides to change a little-used computer lab into a lounge so that students will interact more between classe
tekilochka [14]

Option D discursive and planned is the correct option.

Which of the following best describes the organizational hierarchy system of communication?

It is a multi-tiered structure of reporting levels and system checks provided for a regular flow of information between managers and employees.

What is the meaning of discursive writing?

Well, a discursive essay is a genre of writing that asks you to investigate a topic; gather, read and evaluate evidence; and present a position on your topic based on the evidence gathered.

What is an example of planned change?

The introduction of employee welfare measures, changes in the incentive system, introduction of new products and technologies, organizational restructuring, team building, enhancing employee communication, as well as technical expertise, fall under the category of Planned Change.

What are the three types of change give examples.

Ackerman (1997) has distinguished between three types of change:

Developmental – May be either planned or emergent; it is first order, or incremental. ...

Transitional – Seeks to achieve a known desired state that is different from the existing one. ...

Transformational – Is radical or second-order in nature.

Thus , option D is the correct option:

To know more about planned changes:

brainly.com/question/25594630

#SPJ4

3 0
1 year ago
When researching using the internet, you should always ensure that the information you find on a website is ________.
Schach [20]

The answer is the last choice, "Credible."


Fun and entertaining websites are good for your personal time, but not for research. Persuasive websites may seem convincing, but usually persuade through emotions rather than facts. Therefore, you should make sure the information/website is credible and is supported by facts and reliable individuals.

4 0
4 years ago
A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a
Anna11 [10]

Answer: vulnerability

Explanation:

3 0
2 years ago
Taran is concerned with the security of his macros in a database. Which security option could he use to provide protection?
Lynna [10]

Answer:security VBA code

Explanation:

6 0
3 years ago
Other questions:
  • Which of the following is not a feature of Hootsuite?
    14·1 answer
  • Select the term used to describe the process, within the context of Active Directory, that allows a person with higher security
    5·1 answer
  • What is the square root of 1600 and 36 ?​
    6·1 answer
  • What are the three primary separation of concerns on the client-side of a dynamic web application? (Check all that apply)
    13·1 answer
  • How many bits long is a autonomous system number?
    13·1 answer
  • A network administrator enters the service password-encryption command into the configuration mode of a router. What does this c
    11·1 answer
  • Discuss the term business information SYSTEMS ​
    15·1 answer
  • It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet. True False
    9·1 answer
  • O
    14·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!