1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna11 [10]
3 years ago
15

What is the code for loading image in matlab

Computers and Technology
1 answer:
MA_775_DIABLO [31]3 years ago
7 0

Answer: Using imread command

Explanation:

For loading images in matlab we can use the imread command. Some example regarding how to use the code is as follows:

A = imread('ball.tif');

Here suppose the image file name is saved as ball and is in tif format. Here the image is stored in an array named A.

We can view the image using

imshow(A);

You might be interested in
PLEASE DON'T DELETE THIS QUESTION!!!!
USPshnik [31]

you can only have one picture on here ¿¿¿¿¿¿¿¿¿¿¿¿¿

3 0
3 years ago
Read 2 more answers
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
Many languages distinguish between uppercase and lowercase letters in user-defined names. What are the pros and cons of this des
Korvikt [17]

Answer:

Explanation:

The reasons why a language would distinguish between uppercase and lowercase in its identifiers are:

(1) So that variable identifiers may look different than identifiers that are names for constants, such as the convention of using uppercase for constant names and using lowercase for variable names in C.

(2) So that the catenated words such as names can have their first letter distinguished, as in Total Words. The primary reason why a language would not distinguish between uppercase and lowercase in identifiers is it makes programs less readable, because words that look very similar are actually completely different, such as SUM and Sum.

7 0
3 years ago
I'm trying to network two laptops together using ethernet cable but it isn't working. Why isn't it working
Nonamiya [84]

On modern network cards, this should just work.

It is advisable to give each laptop its own fixed IP address, such as 192.168.1.1 and 192.168.1.2 (with a netmask of 255.255.255.0)

However, you need to define what you expect to work. The first thing to try is ping <em>the other</em> machine from the command prompt, e.g.:

C:\> ping 192.168.1.2

Then, you can try to access shared network drives if you have enabled that. In the file explorer, try typing: \\192.168.1.2

5 0
3 years ago
Can anybody tell me how to screenshot on a PC with no "print screen" button?
Liono4ka [1.6K]

There is a extension from google chrome webstore that allows to take a screnshot

8 0
3 years ago
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • Whenever you are passing or another vehicle is passing you, _______ is particularly important to avoid collisions. A. Turning. B
    9·2 answers
  • When using vlookup, the _____argument is optional?
    8·1 answer
  • What are you guys doing?
    13·2 answers
  • Which principle of animation deals with imparting a unique identity to the animated character?
    5·1 answer
  • _____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub
    14·1 answer
  • If there are 18 people in your class and you want to divide the class into programming teams of 3
    7·1 answer
  • Does anyone have Rblx? if so write your username
    6·1 answer
  • How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.
    15·1 answer
  • Do you trust machine learning application?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!