1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
3 years ago
8

2. Technically speaking, how does Wilkes go about achieving his “Day to Night” concept?

Computers and Technology
1 answer:
Marrrta [24]3 years ago
8 0

He believes it will change how people look at the world. By the compressing photographs from both night and day he mixes already great photographs and makes on phenomenal photograph.

_____________________________________________

PLS MARK AS BRAINLIEST

_____________________________________________

You might be interested in
To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
nasty-shy [4]

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
7 0
3 years ago
What advantage do ExpressCard modules and U.S.B adapters offer over expansion cards?
sladkih [1.3K]
The advantage does of ExpressCard modules and U.S.B adapters offer over expansion cards is that it can connect a variety of devices to a computer. The technical standard of ExpressCard specifies the design of slots built into the computer and of expansion of cards to insert in the slots including the mobile broadband modems. It is sometimes connectors for externals devices such as flash drives, USB connectors and other ports that need to connect to the computer.
4 0
4 years ago
Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order. 
SpyIntel [72]

I think she's using Excel.

6 0
4 years ago
_________________ allows cloud controller to locate instances on separate zones to boost redundancy.
kogti [31]

Answer:

_____Router___ allows the cloud controller to locate instances on separate zones to boost redundancy.

Explanation:

A router, as a networking device, forwards data packets between one computer network and other networks.  With a router, one can use wired and wireless devices to connect to the Internet.  Unlike a modem, which connects the home network to a wider internet, a router can enable the networks to interact with one another without using the Internet.

8 0
3 years ago
Suppose a local area network requires eight characters for a password. The first character must be a letter, but the remaining s
Elis [28]

Answer: 2037468266496

Explanation:

The question says first character must be a letter = A - Z ( 26 characters )

Others can either be letters or digits = digits with range 0-9 ( 10 digits )

From the second to the seventh character can either be digits or letter hence we have ( 10 +26 ) = 36 chances

Considering rule of product

Number of chances/outcomes of the password = ( 26×36⁷)

The power of 7 was as a result of remaining seven characters can be either a letter or digits.

5 0
3 years ago
Other questions:
  • What is a bus master?
    14·1 answer
  • Select the correct answer.
    8·2 answers
  • Anti-bullying laws in most states are designed to provide
    14·2 answers
  • A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.
    10·1 answer
  • Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
    14·1 answer
  • Use the following global structure declaration as an example only. You will need to create your own data structure based on a da
    5·1 answer
  • Translate the following C++ program to MIPS assembly program. *Please explain each instruction of your code by a comment and sub
    5·1 answer
  • WILL GIVE BRAINLEIST PLZ HELP PLZ AND THANK YOU
    7·1 answer
  • In Python, while loops will repeat during the time the test condition is true.
    7·2 answers
  • Describe the layout of an article on Wikipedia​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!