1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
3 years ago
10

How do you change exposure to allow for greater DoF

Computers and Technology
1 answer:
SpyIntel [72]3 years ago
7 0
Well, for photography, usually you raise the Aperture. this makes the picture darker, but also increases Depth of Field 
You might be interested in
Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
Nesterboy [21]

Answer:

c. both the user and the provider of encrypted data.

Explanation:

In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.

5 0
3 years ago
The process of a web server adding a tcp header to a web page, followed by adding an ip header, and then a data link header and
kumpel [21]
<span>Encapsulation is defined as the process of adding a header in front of data supplied by a higher layer (and possibly adding a trailer as well).</span>
7 0
3 years ago
#Write a function called "scramble" that accepts a string #as an argument and returns a new string. The new string #should start
mojhsa [17]

Answer:

def scramble(s):

   if len(s) % 2 == 1:

       index = int(len(s)//2)

   else:

       index = int(len(s)/2)

   

   return s[index:] + s[:index]

Explanation:

Create a function called scramble that takes one parameter, s

Check the length of the s using len function. If the length is odd, set the index as the floor of the length/2. Otherwise, set the index as length/2. Use index value to slice the s as two halves

Return the second half of the s and the second half of the s using slice notation (s[index:] represents the characters from half of the s to the end, s[:index] represents the characters from begining to the half of the s)

8 0
4 years ago
When receiving your bank account, you should immediately do what
maxonik [38]

Answer:

give ur account details to everyone in the world

Explanation:

6 0
3 years ago
Which of the following involved a digital designer? The hardware that lets your hard drive work. A computer animated movie An ol
sergejj [24]

Answer: An old cartoon from the 1930's! :)

4 0
4 years ago
Other questions:
  • There are several different types of RAM, each with its own purpose. Name the three types of RAM and briefly describe their func
    8·2 answers
  • A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i
    15·2 answers
  • ________________are programs that designed to help users to be more productive with their personal tasks
    11·2 answers
  • What does it mean to clear a setting in a dialog box?
    14·1 answer
  • Im getting hit offline can someone help or give me some advice
    6·1 answer
  • How does a computer work
    13·1 answer
  • What is one advantage of using object-oriented programming?
    14·2 answers
  • Combination of one or more columns used to identify particular rows in a relation is a (n)<br>​
    8·1 answer
  • One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
    13·1 answer
  • ________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!