1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
4 years ago
10

Which photographer invented the Zone System?

Computers and Technology
2 answers:
tia_tia [17]4 years ago
6 0
<span>Ansel Adams & Fred Archer</span>
Hoochie [10]4 years ago
5 0
Ansel Adams and Fred Archer
You might be interested in
1. How many bits would you need to address a 2M × 32 memory if:
Dominik [7]

Answer:

  1. a) 23       b) 21
  2. a) 43        b) 42
  3. a) 0          b) 0

Explanation:

<u>1) How many bits is needed to address a 2M * 32 memory </u>

2M = 2^1*2^20, while item =32 bit long word

hence ; L = 2^21 ; w = 32

a) when the memory is byte addressable

w = 8;  L = ( 2M * 32 ) / 8 =  2M * 4

hence number of bits =  log2(2M * 4)= log2 ( 2 * 2^20 * 2^2 ) = 23 bits

b) when the memory is word addressable

W = 32 ; L = ( 2M * 32 )/ 32 = 2M

hence the number of bits = log2 ( 2M ) = Log2 (2 * 2^20 ) = 21 bits

<u>2) How many bits are required to address a 4M × 16 main memory</u>

4M = 4^1*4^20 while item = 16 bit long word

hence L ( length ) = 4^21 ; w = 16

a) when the memory is byte addressable

w = 8 ; L = ( 4M * 16 ) / 8 = 4M * 2

hence number of bits = log 2 ( 4M * 2 ) = log 2 ( 4^1*4^20*2^1 ) ≈ 43 bits

b) when the memory is word addressable

w = 16 ; L = ( 4M * 16 ) / 16 = 4M

hence number of bits = log 2 ( 4M ) = log2 ( 4^1*4^20 ) ≈ 42 bits

<u>3) How many bits are required to address a 1M * 8 main memory </u>

1M = 1^1 * 1^20 ,  item = 8

L = 1^21 ; w = 8

a) when the memory is byte addressable

w = 8 ; L = ( 1 M * 8 ) / 8 = 1M

hence number of bits = log 2 ( 1M ) = log2 ( 1^1 * 1^20 ) = 0 bit

b) when memory is word addressable

w = 8 ; L = ( 1 M * 8 ) / 8 = 1M

number of bits = 0

5 0
3 years ago
To what extent do you think st. cyprian was effective in his efforts to bring inherited christian teachings to bear on the unpre
Pepsi [2]

St. Cyprian of Catharge is a bishop who is often called the African Pope. His martyrdom justified his status and showed his holiness through the judgments of the church. His assertions strongly propose that he is conscious that he is in a situation that he is being slated for intensifying and spreading the factional partition through rigorist inflexibility by his adversaries in Rome. He knew that the advertising line” Feticissimus” together with his troupe would be vending in Rome. 

4 0
3 years ago
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
4 years ago
You are having a problem with your Windows computer that is isolated to a single graphics editing program that you use every day
Murljashka [212]

Answer:

I'm not a big tech head but I know that creating a restore point is highly recommended for changing anything that you aren't 100% sure about to your computer.

8 0
3 years ago
Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
Juli2301 [7.4K]

Answer: Filler content

Explanation: I think what the question is getting at is using filler content. This includes filler images and sample text. Once the website is all set up, the filler content is replaced with the actual content.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Assume you previously entered these lines of code.
    14·2 answers
  • Anna’s computer will not power on. What aspect of the computer should Anna check (hardware or software)? How can Anna work to re
    5·1 answer
  • Web and mobile applications are created for users to only read information. True False
    15·2 answers
  • Can web sites contain copyright material? <br> Yes <br> No
    10·2 answers
  • Write a Unix (Linux) find-like command (myFind) in Python3 where the function will return the full paths of all the files contai
    9·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • What do I do if my friend wants me to watch a video at my house?
    8·2 answers
  • Which is the best choice to explain why a human resource manager is so
    5·1 answer
  • What might a designer need to consider when choosing an appropriate energy source for products and power systems
    15·1 answer
  • Which option ensures that items in a text box or table cell will be in the absolute center of that element?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!