1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
3 years ago
13

1.Which type of camera tool pushes the picture back and makes it wider, exaggerating the distance between the background and for

eground?
a.telephoto lens
b.neutral density filter
c.wide-angle lens
d.jib

2.What is the possible final effect if a director uses the wrong kind of filter or uses filters too much?

a.It can look cheap.
b.It can look unrealistic.
c.It can look too bright.
d. It can look too dark.
Computers and Technology
2 answers:
notsponge [240]3 years ago
8 0
Hello,

Your brainliest answer would be:

1.

a.telephoto lens

2.

b.It can look unrealistic.

Plz mark me brainliest!

Hope this helps!
sladkih [1.3K]3 years ago
6 0
1. Telephoto lense
2. It can look unrealistic
You might be interested in
State the name of the following computer components​
olga2289 [7]

Answer:

Memory.

Hard Drive or Solid State Drive.

Video card.

Motherboard.

Processor.

Power Supply.

Monitor.

Keyboard and Mouse.

Explanation:

6 0
2 years ago
Read 2 more answers
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
3 years ago
The set of instructions that directs the computer to perform a variety of tasks is known as a
Vilka [71]
Answer: software (answer not long enough)
5 0
3 years ago
Factor f(x)=x^3-6x^2+9x
liq [111]
Since all terms have an x in them, you can first factor that out, yielding:

f(x) = x(x² - 6x + 9)

Then you are looking for numbers that multiplied give 9 and added give -6, which is -3 and -3. So the final factorization is:

f(x) = x(x-3)²

6 0
3 years ago
What name is given to the assurance that requested information is available to authorized users upon request
mrs_skeptik [129]

Answer:

Availability

Explanation:

With Data availability, it means that we are saying that information is accessible to users. This gives the assurance of the system and also the data being accessible to authenticated users anytime they have the need for it.

It is simply saying that information would be operable by users with authorization whenever they request to.

5 0
3 years ago
Other questions:
  • What does using indirect quotations allow a writer to do?
    7·2 answers
  • Why is Copyright important?
    5·1 answer
  • Over the past few years a very definite need has arisen in the electrical trades for:
    15·1 answer
  • Help me with A,b and c
    11·1 answer
  • Host Y sends the first TCP ACK message for the transaction?<br><br> a. true<br><br> b. false
    9·1 answer
  • Visual basis,C, C++ and Java are all examples of computer programming ________.
    15·1 answer
  • Unlike oracle, access does not support the decimal data type.​<br><br> a. true<br><br> b. false
    9·1 answer
  • This is the number of items arranged in an order.
    7·2 answers
  • At Moore High, 456 students attended the prom. This is 65 more students than
    13·2 answers
  • Who is this wrong answers only
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!