1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maru [420]
3 years ago
13

One of the major advantages of digital photography is the ability to see the shot as soon as you take it.

Computers and Technology
1 answer:
FrozenT [24]3 years ago
3 0
A. most cameras will let you see the shot you took for a second afterwards witch allows you to see errors like motion blur,focus,white balance and other things. 
You might be interested in
Which term accurately describes agile and devops
Elza [17]

Answer:

Answer: Agile is refers to an interative approuch which focuses on collaboration, costumer feedback,and small rapid releases,DevOps is considered a practice bringing development and operations teams together

Hope this is helpful for you

7 0
3 years ago
What type of values are typically stores in unweighted graphs
Strike441 [17]

Answer: A) 0 and 1

Explanation:

0 and 1 are the values that typically store in unweighted graph. Unweighted graph define as when an edge does not associate with the weight and does not contain any type of cost.

It is also known as edge weighted graph as, it is associated with the edge values and weight.

0 and 1 are typically store in the unweighted graphs because it is a very easy to store and simple to represent the graph in an array in the form of list.  

4 0
4 years ago
What laws are broken when you hack someone?
postnew [5]

Answer:

it depends

Explanation:

if you are hacking for a purpose that is benefiting the person being hacked, that is ethical hacking. ethical hacking is not illegal, as long as you get permission from the person being hacked.

if you hack someone without their knowledge, that is unethical hacking, and that is in many cases, a crime, and if it has enough of a detrimental effect on a companys process, it could land you into prison and earn you a hefty fine.

ethical hacking is good for testing a networks security, and if all is well, the ethical hacker shouldnt be able to get into a network if it is secured properly.

6 0
3 years ago
What is 1 and 3/4 in grams?
Mice21 [21]
<span> 1 and 3/4 in grams is 
</span>1.75grams
8 0
3 years ago
Read 2 more answers
As we move up a energy pyrimad the amount of a energy avaliable to each level of consumers
AleksandrR [38]

Explanation:

As it progresses high around an atmosphere, the amount of power through each tropic stage reduces. Little enough as 10% including its power is passed towards the next layer at every primary producers; the remainder is essentially wasted as heat by physiological activities.

8 0
3 years ago
Other questions:
  • Today’s mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer.
    7·1 answer
  • A simple way to think of the Excel application is as a giant ______.
    5·2 answers
  • Which acronym describes technology in which all or most of a deviceâs electronic circuitry is on a single microchip?
    12·1 answer
  • How many electrons are there in an atom of carbon? A. Four B. Eight C. Six D. One
    15·2 answers
  • When configuring services, what linux directory typically contains server configuration files?
    8·1 answer
  • In 4-bit two's complement representation, what is the binary encoding of the number -5?
    8·1 answer
  • To add text to a slide when using presentation software, you need to add a text box. To add a text box, click the Text Box butto
    8·2 answers
  • Instructions
    8·1 answer
  • Which statement best describes how the programming layer of abstraction in
    10·1 answer
  • A social service agency hires accenture to improve training and experiences for caseworkers. What is one way accenture can use v
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!