1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
2 years ago
8

Select the correct answer.

Computers and Technology
1 answer:
gayaneshka [121]2 years ago
4 0

Looking at the image, the effect is used in the image is known as selective focus.

<h3>What is Selective focus?</h3>

This is known to be a photography method that is often used when i the subject of an image is said to be in focus and the other parts of the image is said to be  blur.

Therefore, Note that Looking at the image, the effect is used in the image is known as selective focus.

Learn more about image from

brainly.com/question/25938417

#SPJ1

You might be interested in
You develop an app, and you don’t want anyone to resell it or modify it. This is an example of: A
Maru [420]

Answer:

C, proprietary software

Explanation:

Proprietary software, also known as non-free software, is computer software for which the software's publisher or another person reserves some rights from licensees to use, modify, share modifications, or share the software. It sometimes includes patent rights.

7 0
3 years ago
A goal should be___.
Luda [366]

Answer:

D

Explanation:

5 0
3 years ago
Read 2 more answers
The if/else if statement is actually a form of the __________ if statement.
romanna [79]

Answer:

The answer to this question is "nested".

Explanation:

The answer to this question is nested because, In programming languages, there is a concept of nested if-else statement. In nested if-else statement placing if statement inside another IF Statement that is known as nested If in C Programming.

Example of nested if can be given as

#include <stdio.h>

int main()

{

  int a,b,c;

printf("Enter 3 number\n");

scanf("%d",&a);

scanf("%d",&b);

scanf("%d",&c);

   if(a>b)

   {

    if(a>c)

    {

        printf("A is greater: %d",a);

    }

   }

   else

   {

       if(b>c)

       {

           printf("B is greater: %d",b);

       }

       else

       {

           printf("C is greater: %d",c);  

       }

   }

   return 0;

}

output:

Enter 3 number  

4

7

9

c is greater: 9

8 0
3 years ago
_____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a
meriva

Answer:

Data base administrator

Explanation:

The data base administrator is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field , constraints and access methods. Database is structured from of data sets.  

The data in database use to come from different sources that data must have some boundaries. Database administrator is a part of DBMS. The authorized DBA is responsible for the integrity of data and keeping the data in good manner so at the time of need the data could be accessed rightly. Storage of data has to be  done in a way that at time of use or at the time of retrieval the data must be accessed frequently and easily.  

Database administrator is responsible to put constraint on the database, for example a person could enter how many digits or alphabets in the required fields or records. Otherwise user could enter irrelevant and lengthy data in the fields so it would be hard to manage data on server due to shortage of the memory. By putting such constraints the size of data could be managed and relevant data could be saved. Secondly, constraints use to be put for security purpose to keep information confidential and secure the  certain constraints are mandatory and the data base administrator is responsible for such constraints.

Once the user use to store data on database the data safety and integrity is most important for them. So that DBA will arrange the data in organised form which will give quick access and data length will be managed properly so user could not enter lengthy data to full the repository. DBA put security constraint as well for the satisfaction of user and secure use of the database.

So we could say that dba is most important part of DBMS of any organization.

5 0
3 years ago
Your boss it trying to console into an old switch that he found in storage and wants to configure it. he asks you to describe wh
nika2105 [10]
I believe that the correct answer is c. look for a male connector with 9 pins.
5 0
3 years ago
Read 2 more answers
Other questions:
  • The process of making raw materials into a finished product is known as
    14·2 answers
  • Look at the circuit shown in the figure above. Switch S1 is open as shown, and R1 and R2 each have a value of 100 k. If you conn
    11·1 answer
  • What is the Code of Conduct/Ethics for the company/of Department of Defense?
    7·1 answer
  • Janice, who is 15, posts a picture of herself drinking alcohol and making an obscene gesture on her social networking page. Whic
    11·2 answers
  • Which of the preventive strategies is described below: Violence often escalates. Behaviors like excessive complaing, hostility,
    10·1 answer
  • What keyboard combination can you use to open the windows tool context menu, which contains options such as power options and di
    5·1 answer
  • A utility program that makes a copy of all files or selected files that are in the libraries is called ______
    6·1 answer
  • Emily is deciding whether to buy the same designer jacket her friends have. The jacket is much more expensive than a similar one
    8·2 answers
  • What are the minimum number of bits an address bus must have in a byte addressable memory system containing only 4 KiB of memory
    8·1 answer
  • An operating system with _____ capabilities allows a user to run more than one program concurrently.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!