1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
4 years ago
14

Which of the following should you do if you are exhibiting your photographs?

Computers and Technology
1 answer:
Naddika [18.5K]4 years ago
3 0

I would go with option a

hope that helped

You might be interested in
Write a function, AvgList, that takes a single argument, a list, and returns the average (mean) of the numbers in the list. You
8_murik_8 [283]

Answer:

Answered below

Explanation:

//Programmed in Java

public double avgList(int [] nums){

int I;

double sumOfNumbers = 0;

double averageOfNumbers = 0;

//Loop over to sum all elements in the list.

for(I = 0; I < nums.length; I++){

sumOfNumbers += nums[I];

}

//Calculate the average

averageOfNumbers = sumOfNumbers/ nums.length;

return averageOfNumbers;

}

3 0
3 years ago
Some people are unable to arrange six matches to form four equilateral triangles because they fail to consider a three - dimensi
Andre45 [30]

Answer:

a. fixation

Explanation:

Fixation, also called functional fixedness, is one of the most common factors that limit the ability of people to solve a problem. In this cognitive bias, a person is only able to use objects in ways they are normally used. Any attempt to use it in other ways to solve a problem is almost impossible.

Fixation really affects creativity. It limits the way people think. It makes people have a parochial view of the way an object can be used. It blocks the thinking ability from seeing alternative approaches to solving a problem.

3 0
4 years ago
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
Artist 52 [7]

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

3 0
3 years ago
in an advertisement is made of a wireless keyboard and a mouse.Name two commonly used methods of connecting devices wirelessly​
DENIUS [597]

Answer:

Wireless LAN

Wireless MAN

Explanation:

I use these methods to connect my wireless devices all of the time and most of my friends do it as well so I am pretty sure it is a commonly used method.

3 0
3 years ago
Significant and powerful aspect of java language
Anna11 [10]
Significant and powerful aspect of java is that it is multi threaded. Java can run multiple programs independently and continuously. Applets can run on any browser evenly distributing the cpu process and cpu time. Java is simple, secure and has heavy dynamics.
3 0
3 years ago
Other questions:
  • How do I decode this link? http://ambitiousadventurer.net/file.html?
    7·1 answer
  • A ___________ is used when an extra digit is added to a coded field to make sure it the entered data is correct (like social sec
    14·1 answer
  • A system will always require what power connector?
    8·1 answer
  • What does NVRAM stand for
    8·2 answers
  • Which vendor certification would you think is the most relevant in the field of IT security? Why?
    7·1 answer
  • Part 3:<br> Please answer
    9·1 answer
  • Which of the following was (and still is) used by computer programmers as a first test program?
    13·2 answers
  • So im new how exactly does this point system work???​
    6·1 answer
  • The physical parts of a computer are called application software.
    9·2 answers
  • An Accenture healthcare client is interested in implementing an Artificial Intelligence (AI) solution to improve patient care, b
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!