1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
3 years ago
8

Ted wants to go out to a neighborhood park and shoot pictures of dew drops on grass. He wants to get a low-level angle of the de

w drops. Which support equipment should Ted use?
A.
mini tripod
B.
pistol grip
C.
monopod
D.
body mount
Computers and Technology
2 answers:
daser333 [38]3 years ago
8 0

i believe that the answer to this question is c


Ierofanga [76]3 years ago
4 0

I believe that the answer would be A, mini tripod. If not though it could possible be B, pistol grip.

You might be interested in
A power supply serves as both a rectifier and transformer to convert AC house current to DC and to step down voltage from 110 V
ohaa [14]

Answer:

True

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

Generally, a computer is composed of five (5) main components and these include;

I. Input unit.

II. Output unit.

III. Central processing unit (CPU).

IV. Storage (memory) unit.

V. Power supply unit (PSU).

A power supply also referred to as power supply unit (PSU) can be defined as a hardware component of a computer that converts and step-down the domestic alternating current (AC) electrical power to a low-voltage regulated direct current (DC) power, so that the internal components of a computer can be supplied with power.

Hence, the power supply unit (PSU) serves as a rectifier by converting alternating current (AC) house current to direct current (DC) and as a transformer to step-down voltage from 220 Volts or 110 Volts to 50, 30, or 20 Volts depending on the requirements of a computer.

8 0
3 years ago
Texture fills are available to add as a slide background true or false
IrinaK [193]
I belive its true but i am not a 100% sure
6 0
3 years ago
Read 2 more answers
That's my email address​
rodikova [14]
Okay then that’s pretty cool
3 0
2 years ago
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
2 years ago
Select the correct answer.
Crank

Answer:

Sensing elements.

Explanation:

Sensing elements are the device which connect channels feedback and return it to the control system input. There are many sensors used for feedback control such as Tachometer, Encoders, Accelerometers and rate gyroscopes.

3 0
3 years ago
Other questions:
  • Describe some advantages of a 64-bit versus 32-bit version of windows.
    9·1 answer
  • Try writing pseudo code that describes how your device uses input data to perform the action that you want.
    9·1 answer
  • During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the gener
    11·1 answer
  • ________ programming is a method of writing software that centers on the actions that take place in a program.
    8·1 answer
  • 1. Which of the following statements are true about routers and routing on the Internet. Choose two answers. A. Protocols ensure
    9·2 answers
  • "You have installed a point-to-point connection using wireless bridges and Omni directional antennas between two buildings. The
    8·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • How to square a number in java.
    15·1 answer
  • Write a short note on Ms - Excel...​..
    7·1 answer
  • Write a program that accepts the lengths of three sides of a triangle as inputs. the program output should indicate whether or n
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!