answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Readme [11.4K]
2 years ago
15

Jason has decided to use his name on all the images to protect them from misuse. He has also decided to use the logo of his comp

any across all
the images to be extra sure about its protection in the digital world. Select the phrases or sentences that describe the two types of watermarking
options has he used to get the results.
Types of Watermarking Options
Jason wants to tag his name or logo somewhere on the image, preferably in the corner of the photo. He uses an online editing tool to add his
name at the corner of the image. He can prevent misuse of his Images online by adding a watermark over the image. Text watermarking
involves adding the imageer's name at the corner of the image. This is usually done with the help of online editing tools or software. In this form
of watermarking, he can use the logo of his company over the image to protect his identity.
Just to be sure, Jason also uses tiled watermarking, which involves placing his company logo in a pattern spread across the image. First, he
creates a copy of the original. This is to make sure that the watermarked version is saved separately. If needed, he can always access the
original image. Then he opens the logo that he wants to use as the watermark, coples It, and pastes it onto a new layer, above the image. He
turns down the opacity of the layered image. Then he merges the layer to join the watermark with the image.
L

Computers and Technology
2 answers:
Mila [183]2 years ago
6 0

Answer:

Text watermarking involves adding the photographer's name at the corner of the image.

Explanation:

This was one of the correct answers when I took the test, I got it wrong because I didn't pick all the correct answers. I hope that this was helpful to you! If you know the other correct answer(s) please comment and let me know and i'll edit this answer! :)

Kruka [31]2 years ago
6 0

Answer:

Text watermarking involves adding the imageer’s name at the corner of the image

tiled watermarking, which involves placing his company logo in a pattern spread across the image

Explanation:

on edmentum

You might be interested in
Which advertising medium has the widest reach on a global front?
lesya [120]

Answer: B

The internet would allow businesses to easily expand globally with the help of social media and the ever expanding resources being poured onto the internet, reaching customers anywhere in the world.

8 0
2 years ago
Identify two entities and 2 of their attributes from the given scenario.
polet [3.4K]

Bookstore and BookSearch are the two entities for the given scenario.

Explanation:

  • For the given Book.com virtual store, there can be two entities like Bookstore and BookSearch.
  • Bookstore can have all the details of the books in the virtual store. hence the attributes can be
  • Bookstore attributes: bookname, Authorname, Publisher, Publishedyear, Agegroup, category.
  • BookSearch entity can be used to search the books in the virtual store.
  • Booksearch attributes: bookname, category, bookid, authorname.
8 0
2 years ago
1⁰=?<br> Is equal to...........
Murrr4er [49]

Answer:

1

Explanation:

Anything to the 0th power is 1. However, 0⁰ is undefined.

5 0
2 years ago
Read 2 more answers
Janice usually works on a particular workbook. She decides to keep a backup of all the data in a separate workbook. She opens a
likoan [24]
She would use Ctrl and C bc thats the copy short cut

Ctrl and v is pasting
Ctrl and a is selecting all text and 
Ctrl and z is for cutting the text
4 0
1 year ago
Read 2 more answers
1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwo
Citrus2011 [14]

Explanation:

1 make sure only you know the password

2 having weak security on one browser is basically a doorway for someone to get into your network

7 0
2 years ago
Read 2 more answers
Other questions:
  • Jack is an accountant. He can't access the spreadsheet software, which is installed on the server. What should Jack do?
    5·2 answers
  • A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplic
    9·1 answer
  • In 2–3 sentences, describe how you would change the background of a group of cell
    6·2 answers
  • Theresa is a certified teacher. She just had a baby and would like to stay home, but still wants to teach. Which career would be
    11·2 answers
  • A slide in Blake's presentation contained the following information:
    11·1 answer
  • Who is currently using which computer at WP? Create an appropriate SQL query to answer this question. Show SerialNumber, Make, a
    7·1 answer
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    10·1 answer
  • In this question, you will experimentally verify the sensitivity of using a precise Pi to the accuracy of computing area. You ne
    14·1 answer
  • When drivers have no control over their driving environment and are stuck in traffic, the lack of control over the traffic event
    13·1 answer
  • What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!