1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
3 years ago
10

Which type of lenses shrinks the image in front of it rather than magnifying it? A)Telephoto B)Optical zoom C)Digital zoom D)Wid

e-angle
Computers and Technology
1 answer:
Bingel [31]3 years ago
8 0

Answer:

D. Wide angle

Explanation:

Wide angle camera is specifcally designed to shrinks the image using the lens with  smaller focal length compared to average camera.This type of camera is commonly used to capture wider area of scenery. Or to give an impression that the objects that near the camera seems larger than they actually are.

You might be interested in
Task 2 Design a 1st order low-pass filter with cutoff frequency 1kHz, 1) with roll-off and 2) without roll-off. For each filter,
miskamm [114]

You can get complete answer in attached document.please have a look.

Explanation:

(2) Without rolloff, as given fc =1kHz Let us assume it is a first order RC filter ats transfer function is H(s)-RC RC withou

Then the transfer function becom

and step response is flat zero for without rolloff..

6 0
3 years ago
Which of these statements about the truck driving occupation in the U.S. are accurate?
Airida [17]

Answer:

I'm unsure 38373672823

8 0
3 years ago
Read 2 more answers
Which is the primary use of a word processor? create, edit, format, and print text-based documents maintain a database of record
qaws [65]
<span>Which is the primary use of a word processor? 
</span>
create, edit, format, and print text-based documents

------------------------------------------------------------------------------------------------

Hope This Helps :)

P.S
If you could mark me as brainiest that would be great! :D
3 0
3 years ago
The OSI model is currently the most widely implemented network model used to develop and build networks of any size, including t
natta225 [31]

Answer:

The correct answer to the following question will be "False".

Explanation:

  • The Open Systems Interconnection model is a conceptualization that describes and vastly simplifies a telecommunication or computer system's communication features, regardless of its inner structure and technologies underlying them.
  • This model aims is to direct manufacturers and creators so that they would modularize with the digital communication devices and computer programs they build, and to promote a consistent context that defines the roles of a network or telecom device.

Therefore, the given statement is false.

7 0
3 years ago
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th
Dmitriy789 [7]

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

7 0
3 years ago
Other questions:
  • Which computing component is similar to the human brain
    6·2 answers
  • What is the root of the tree?
    6·1 answer
  • The best place to start when you are looking for information about a device or an application is the ____ of the company that ma
    14·1 answer
  • Suppose that f is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointer
    6·1 answer
  • Name three types of hard drives, along with its speed and size.
    8·1 answer
  • In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:
    12·2 answers
  • 2.
    11·1 answer
  • A character that <br>is raised and smaller above the baseline is called​
    6·1 answer
  • WHO WANT P O I N T S.................................................
    9·1 answer
  • Write code that outputs variable numCats. End with a newline.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!