A flatten file is distinguished by...
Layers are used in an image to...
The tool used to outline sections of an image.
When a person hurt or embarrass another person using their cell phone or other technology to send or post text or images.
A range of abilities or competencies that a person may develop during their life through their education, training, work experience, interests, and extra-curricular activities.
The place where each task in Photoshop/GIMP is recorded.
Shows a miniature image of a layer's content.
What is the key to creating and manipulating Photoshop/GIMP images?
Spyware is...
An unwanted fringe or halo surrounding a selection that can be eliminated.
Found in 1976
A person can be safe on the Internet...
A user can modify a layer without losing their original work by...
Determines the percentage of transparency in a layer.
Marquee
A worm...
Students who are participants in a Career and Technology Student Organization develop...
CTSO
If a computer virus continues to spread, what will it do to itself?
Found in 1946
A belief in the moral benefit and importance of work and its inherent ability to strengthen character.
An image editing program that allows a person to edit or manipulate an image.
Derivative work
Found in 1965
An irreversible process process used to reduce the size of Photoshop/GIMP files.
Sharing files with others or giving others an opportunity to look at files can cause a computer to have...
Adobe Photoshop/GIMP
by keeping their personal information safe and secret. Also, thinking carefully before sharing photographs of themselves, family, and friends.
an area that is surrounded by dashed lines which is also called "marching ants."
work ethics
opacity
duplicating a layer.
flattening
Distributive Education Clubs of America
employability skills
DeFringe
cyberbulling
layers
a virus
control individual elements.
visible layers only.
SkillsUSA
Health Occupations Students of America
layer thumbnail
history panel
Career and Technology Student Organizations
lasso
a serious computer threat that monitors a person's online activities or installs programs without the users' permission or knowledge.
has a negative affect on a computer system which has the ability to self-replicate itself.
a new, original product that is based upon content from one or more previously existing works.
learning, thinking, communication, technology, and interpersonal skills which are essential skills.
replicate