subject

Select the correct answer from each drop-down menu. You would like to implement the rule of thirds to present high-resolution images in an IT scrapbook. The scrapbook includes images of computer and other IT devices. How can you do this for the scrapbook?
You can implement the rule of thirds by placing the
part of the image along the
lines.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 14:00
Just a heads up these questions are relating to a program known as gimp. (these are all fill-in-the-blank)will give brainliest-! the tool option allows you to blur the edges of the selection making it look less sharp.which option do you choose in the add layer mask dialog box to turn your selection into a mask? is a type of filter that distorts a layer making it appear like you’re looking through dirty glass.in which drop-down menu do you find the option to add a blur to your background image layer? what shape appears when you’ve completed making your selection with the free select tool (to let you know you’ve reached the beginning of your selection)? when using the toggle quick mask, everything outside of the selection becomes a color.when painting with the color with the toggle quick mask on, it removes part of your selection making it smaller.when painting with the color with the toggle quick mask on, it adds to your selection making it larger.to use the paths tool, click and add (a tiny circle).to close your selection when using the paths tool, press and hold while clicking the first anchor point you created.the tool works just like the free select tool by clicking around an image to select it.
Answers: 2
question
Computers and Technology, 22.06.2019 06:20
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
question
Computers and Technology, 22.06.2019 11:40
Design a pos circuit that displays the letters a through j on a seven-segment indicator. the circuit has four inputs w, x, y, and z which represent the last 4 bits of the uppercase ascii code for the letter to be displayed. thus, if wxyz = 0001 then "a" will be displayed. (any answer with 22 or fewer gates and inverters, not counting any for the inputs, is acceptable)
Answers: 2
question
Computers and Technology, 22.06.2019 13:30
Use the keyword strategy to remember the meaning of the following word. the meaning for the word has been provided. write your keyword and describe the picture you would create in your mind. centurion: a commander in the army of ancient rome. keyword: picture:
Answers: 2
You know the right answer?
Select the correct answer from each drop-down menu. You would like to implement the rule of thirds...
Questions
question
History, 15.07.2021 02:30
question
Mathematics, 15.07.2021 02:30
question
Mathematics, 15.07.2021 02:30
question
Mathematics, 15.07.2021 02:30
Questions on the website: 13722361