1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
2 years ago
10

How do you change exposure to allow for greater DoF

Computers and Technology
1 answer:
SpyIntel [72]2 years ago
7 0
Well, for photography, usually you raise the Aperture. this makes the picture darker, but also increases Depth of Field 
You might be interested in
The Technology Librarian asks you to find out how many hops it takes to get to the first Wi-Fi kiosk. What Windows command can y
V125BC [204]

Answer:

The number of routers arrived in the path of a packet from sender to receiver are called hops. It is term used usually in computer networking.

<u>Command Used to find Hops</u>

In windows command prompt is used to find the number of hops.

1. In Command Prompt type "<em>tracert</em>" after host name and IP address of destination.

<u>Hardware devices Represented by Hop</u>

The main devices that is counted as hop in networking is <em>Router</em>. Nut Sometimes many devices such as <em>switches, repeaters and access points</em> are also count as hops. It depends on the configuration and role of the devices.

8 0
2 years ago
A program that will ring a bell six times is what kind of program?
amm1812

Answer:

D

Explanation:

because it is a sequence it does more than one thing

6 0
3 years ago
Read 2 more answers
sara has just started using the Internet. She would like to be more efficient . In 3-4, give sara some advice about how to be mo
natta225 [31]

Hello,

Well my advice for Sara when using the web would be 3 things.

1: Never tell anyone where you live,Your name, Or any other personal information.

This is important as it will keep you safe and others that are in your family.

2: Get anti virus hardware on your devise.

This will help to stop bad people, and bugs/glitches,this will also protect you from information thieves.

3: Make sure to keep your passwords saved on paper.

I know a lot of people use, google(ect.) to save there passwords to make everything easy, but a good way to never loss them is to wright them down.

Have a great day!



7 0
3 years ago
Which of the following Web sites would be MOST credible?
Luba_88 [7]
I think that A could be the correct answer. The others are not as credible as A.
4 0
3 years ago
Read 2 more answers
What type of network is the Internet? The Internet is an example of a_____network.
7nadin3 [17]

The Internet is an example of a WAN: Wide Area Network

5 0
3 years ago
Other questions:
  • 4
    10·1 answer
  • "The fact that we could create and manipulate an Account object without knowing its implementation details is called"
    9·1 answer
  • User-system interaction is?
    11·1 answer
  • Which of the following BEST describes an extranet?
    13·1 answer
  • Which location-sharing service offers items for users as a gaming component and also allows them to collectively link their chec
    9·2 answers
  • Write a program that prompts the user to enter a point (x, y) and checks whether the point is within the rectangle centered at (
    12·1 answer
  • Logical design is tied to a specific hardware and software platform. a. True b. False
    9·1 answer
  • If a citation has a volume, title, and page numbers, it is a:
    9·2 answers
  • What are general purpose computer and special purpose computer?​
    10·2 answers
  • If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of__________.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!