A(n) _________________________ is a special effect that changes the look of your image or selection by altering the pixels either via their physical location or via a color change.

Fill in the blank(s) with the appropriate word(s).


filter

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A computer with IP address 10.10.5.1 sends a data packet with destination IP address 10.10.5.20 using subnet mask 255.255.255.0. The packet stays in the LAN. 2. A computer with IP address 10.10.5.1 sends a data packet with destination IP address 10.5.10.10 and subnet mask 255.0.0.0. The packet stays in the LAN. 3. Discrete multitone is a single-carrier technique used for transporting digital data over copper telephone lines. A test is initiated at start-up to determine which of 256 subchannel frequencies should be used to carry the digital data. 4. The data transfer for V.92/90 is called asymmetric operation because the data rate connection to the ISP is at V.24 speeds, whereas the data rate connection from the ISP is at V.92/90 speeds. 5. The following is the sequence of commands and prompts used to change the hostname of a router to Network: router> enable router# enable router# conf t router# hostname Network Network#

Computer Science & Information Technology

The ____________________ encoding method also known as Delay encoding, is a bi-phase encoding method that uses only half of the bandwidth of the other bi-phase method but has all of their advantages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is not a keyboard event?

a) KeyPress b) KeyDown c) KeyUp d) KeyClicked

Computer Science & Information Technology

Which of the following statements describes a worm?

a. A program that disguises itself as something useful but actually harms your system. b. A process that runs automatically, without requiring a person to start or stop it. c. A program that runs independently of other software and travels between computers and across networks. d. A program that locks a user's data or computer system until a ransom is paid.

Computer Science & Information Technology