1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
2 years ago
10

1. image-editing software

Computers and Technology
1 answer:
Snezhnost [94]2 years ago
8 0
  • PDF:-Portable Document Format
  • Database software:-software that organizes a collection of information
  • image-editing software :-software used to enhance photographs
  • presentation software :-software used to create a slide show
  • CAD:-software used to create technical drawings.

Done

You might be interested in
What is the best response to cyberbullying?
astra-53 [7]
Answer is C





Braine list please:)
5 0
3 years ago
Read 2 more answers
Which are ways action buttons can be used in presentations?
Luda [366]
You could Do Ctrl + F5 to present your google slides

You could Animate Objects/Units by one of the drop down menus in google slides

You could add a link by copying the link you want to put in by highlighting the link, pressing Ctrl + C (to copy) and Find where you would like to place it and press Ctrl + V
(To Paste)

If you press on a google slide and do not do anything else, at the top it should say theme Or background, there you could select a image from your device or a solid color or Gradient of a color for your background.
6 0
3 years ago
Read 2 more answers
What is a Caesar cipher? As part of your answer demonstrate encrypting the plaintext messages: CS IS COOL with a caesar cipher.
sweet [91]

Answer:

A Caesar Cipher is a basic encryption type.

Explanation:

Its implementation is very easy and straightforward. It uses a one-to-one of characters in a character set. The input needed is the plain-text message and the encryption number.

For example, using the character set A-Z, encrypting the text CS IS COOL using the key of 3 generates FV LV FRRO. What has been done here is to take each character in the plain-text message and move it by "encryption number steps" in the character set.

8 0
3 years ago
Folktales have characters with good or bad traits here are some good wise clever kind hardworking I have too add one more good t
s2008m [1.1K]

Answer: good generous bad greedy

Explanation:

5 0
3 years ago
TRUE OR FALSE!!! <br> Your location can be tracked via your digital footprint.
laiz [17]
Sadly this statement is true
3 0
3 years ago
Other questions:
  • Which type babshshshhsshshhshshshhshs
    13·1 answer
  • What does the presence of the cydia app on an ios device indicate?
    14·1 answer
  • Before his job interview, Shabnam took the time to carefully wash and iron his best khaki pants and a button-down shirt. He even
    15·2 answers
  • If an M:N relationship is mandatory on both sides, and if both relations resulting from the entities involved in the relationshi
    12·1 answer
  • How to study program ?
    11·1 answer
  • Why are free web based providers so popular?
    12·1 answer
  • How many passes will it take to find the five in this list?
    6·2 answers
  • Value appears on the left hand side of cell <br> true or false
    15·2 answers
  • Identify and explain groups that may be impacted by nanotechnology.
    13·1 answer
  • What is the name for data generated by a computer using an algorithm?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!