1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
4 years ago
10

Which photographer invented the Zone System?

Computers and Technology
2 answers:
tia_tia [17]4 years ago
6 0
<span>Ansel Adams & Fred Archer</span>
Hoochie [10]4 years ago
5 0
Ansel Adams and Fred Archer
You might be interested in
Kayla is working on a document for her business meeting. She wants to save this document with another name. Which option should
Fittoniya [83]
Kayla could use “save as” to rename the document.
5 0
3 years ago
When you right-click certain areas of the Word or other Office app windows, a command menu will appear. Group of answer choices
klasskru [66]

Answer:

The answer is "False".

Explanation:

In the word or other office application when we right-click on a certain area of the office, it will provide a common task, like double-click and pick objects.

  • The right mouse button also refers to use and open the pop-up menu, which changes depending on where you select.
  • It allows the computer to mouse additional features, typically known as an optional lowering screen, that's why the given statement is "false".
3 0
4 years ago
There is something wrong with the arguments the function is getting; a precondition is violated​
Evgesh-ka [11]

Answer:

It indicates that either the argument is not corresponding to the perimeter or not returning the same as the variable or function. They arise a syntax error and Python parser is unable to understand a line of code.

Explanation:

8 0
3 years ago
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
Select all that apply.
Nat2105 [25]

Answer:

  • Inserting headers or footers
  • Inserting a watermark

Explanation:

A Master Page is a page which can be used with the majority of the documents of your paper as a reference. Master pages may have visuals elements, such as headlines, footers, column headings, etc that occur on all publishing pages.

7 0
3 years ago
Other questions:
  • Complete the sentences to describe file options categories
    14·2 answers
  • Which is the correct formula to add the values in cells A1 and B1? A. SUM(A1+B1) B. =SUM(A1+B1) C. =SUMA1+B1 D. A1+B1
    9·2 answers
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace, which is your best option?
    7·1 answer
  • You tried to access an external html page, which can not be opened on the device for preview. open the page in dreamweaver to pr
    13·1 answer
  • What does pdf stand for in computer terms?
    15·1 answer
  • What are the three primary separation of concerns on the client-side of a dynamic web application? (Check all that apply)
    13·1 answer
  • What is the central idea of the second section:
    14·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • Hello everyone. New ppl on Ro.blox? I want to play sometime.
    11·1 answer
  • This software application can be used to organize, analyze, and illustrate data?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!