1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
8

WILL MARK BRAINLIEST HELP

Computers and Technology
2 answers:
Katarina [22]3 years ago
4 0

Answer:

One drawback of transferring RAW files directly to his computer to save and share them is that the photos have a much larger file size than JPG files ( A )

Explanation:

Raw format of pictures keeps the original characteristics of the picture such as the contrast and the sharpness of the pictures without compression or processing . The raw file format is larger than the JPG file format because in the JPG file format the pictures undergo some sort of compression and formatting.

Smaller file sizes are easier to share and transfer, hence the disadvantage to Miguel using the raw format is the difficulty in transferring he file to his computer and also sharing it.

using RAW doesn't make picture look smaller in anyway.

hichkok12 [17]3 years ago
3 0

My guess would be A.

You might be interested in
All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonym
RoseWind [281]

Answer:

Data use policies

Explanation:

Technically data use policies are not specifically made to protect user privacy, however it also should not violate user privacy. Data use policies are required by law. They are compulsory disclosures that list the various ways in which data in the form of personal data of individuals is collected, shared or used by digital companies(companies that operate on the internet, make use of email lists, etc ) are used.

4 0
3 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
4 years ago
5. What are some situations where you might find it useful to use the “!” symbol in a program?
svlad2 [7]

Answer:

The most common use of symbols by programmers is for performing language reflection (particularly for callbacks), and most common indirectly is their use to create object linkages. In the most trivial implementation, they have essentially named integers (e.g. the enumerated type in C).
<u>Help Me By Marking Me as Brainlist ...</u>

5 0
2 years ago
Read 2 more answers
In the Dread Pirate Roberts case, U.S. Ulbricht, 31 F. Supp. 3D 54D (S.D.N.Y. 2014), one of the issues that the court addressed
LUCKY_DIMON [66]

Answer:

True.

Explanation:

One of the problems described by that of the court through the Dread Pirate Roberts case was about whether Bitcoin was currency of cash-laundering laws reasons. The following court decided in the following scenario that somebody might breach the money-laundering law through using bitcoin.

So, the following scenario is true about the case of Dread Pirate Roberts.

6 0
3 years ago
Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She
Nezavi [6.7K]

Answer:

hcjcbfbdndndjjxjdjdjfjf

Explanation:

v

6 0
3 years ago
Other questions:
  • If a local DNS server cannot find an IP address for a specified URL, it does this.
    9·1 answer
  • Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P
    7·2 answers
  • One of the Employee responsibilities to LOTO is:
    5·1 answer
  • What feature of virtualization software allows you to revert to a previous point in time in the event you make an unrecoverable
    9·1 answer
  • Grading on the curve is a method of grading that is based on the belief that letter grades for any given class should be distrib
    8·1 answer
  • What method of technical drawing uses converging lines?
    7·1 answer
  • Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swing
    13·1 answer
  • The enhanced for loop _____ Group of answer choices reduces the number of iterations necessary to visit all elements of an array
    12·1 answer
  • Identify what algorithm or concept the following code relates to. void Sort(int array[], int tempArray[], int left, int right) {
    6·1 answer
  • What enforces the location in which an app can function by tracking the location of the mobile device?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!