1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
3 years ago
8

Match the different supports with their explanations.

Computers and Technology
1 answer:
Amanda [17]3 years ago
4 0

Answer:

monopod: a vertical support with a single leg for the camera to attach to

minipod: a foot-long support for the camera to achieve low-angle shots

Side rail: a horizantal moving attachment for the camera to move through

Selfie stick: a long support that holds the camera away from the body

:)

Explanation:

You might be interested in
How to jail break iphone 7 with <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="7617023602">[email&#160
GarryVolchara [31]
I do not think so i honestly do not know
6 0
3 years ago
Read 2 more answers
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
Higher Order Functions used for simulations of dice rolls. Definition: An n-sided dice function takes no arguments and always re
tiny-mole [99]

Answer:

#include <iostream>

#include <time.h>

#include <string>

using namespace std;

int main(){

srand(time(NULL));

cout<<"Throw dice"<<endl;

int b =0;

int a=0;

a=rand()%6;

b=rand()%6;

for (int i =0;i<1;i++)

{cout<<"dice one: "<<a<<endl;}

for (int i =0;i<1;i++)

{cout<<"dice two: "<<b<<endl;}

if(a>b)

{cout<<"first dice won"<<endl;}

if(b>a)

{cout<<"second dice won"<<endl;}

else{cout<<"they are same"<<endl;

return main();

}

return 0;

}

Explanation:

/*best dice roll game just for you change it as you want but all necessary things are there/*

5 0
3 years ago
Suzanne has inserted an image into her document and would like to adjust the color and contrast of the image.
ch4aika [34]

Answer: I believe it is the second one or third one

Explanation:

8 0
4 years ago
Which of these is not an execution status of a computer program?
777dan777 [17]

A part of a computer program that performs a well-defined task is known as an algorithm<span>. A collection of computer programs, </span>libraries<span> and related </span>data<span> are referred to as </span>software<span>. Computer programs may be categorized along functional lines, such as </span>application software<span> or </span>system software and running

7 0
4 years ago
Other questions:
  • Pls help me. ask yourself what would jesus do...
    14·1 answer
  • Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft c
    14·1 answer
  • The syntax used for referencing cells with their worksheet names is the sheet name, followed by ____, then the usual column lett
    8·1 answer
  • To find and engage in Twitter conversations happening in specific geographical areas that are relevant to your company, you shou
    6·1 answer
  • The GeForce GTX 1060 graphics card requires 120 W of power. You plan to install it in a PCIe 3.0 ×16 slot. Will you need to also
    13·1 answer
  • The frequency of a sine wave is defined as:
    8·1 answer
  • What file name would allow you to easily find and edit your document later in Word Online?
    14·2 answers
  • Peer collaboration helps develop critical-thinking skills, which is the ability to
    9·2 answers
  • What do you call the processing of converting an image to binary?
    7·2 answers
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!