C)Hydroelectric I believe.
Answer:
A. f/2.8
Explanation:
A hole within a lens, through which light travels into the camera body is referred to as the APERTURE.
It is typically expressed as "f number" in photography. Basically, a fast lens is any lens with a maximum aperture of f/4 or more i.e f/2.8 , f/1.8 , f/1.4 etc.
The smaller the number is the bigger the maximum aperture is. Hence, the bigger the maximum aperture the more light that your lens will allow in.
Therefore, the ideal aperture settings for a fast lens is f/2.8
Answer: D) Content creator
Explanation:
- Content creator are responsible for creating the original content of the website. They contribute writing the blog posts about various topics and promote the content with the help of digital and social media.
- Content creator are basically responsible for writing blog post on the industry based topics, graphic design and video editing.
Content editor uses data and evaluation from the users for analysis. It basically includes design and development to enhanced the material on the website.
Static and dynamic information are related to computer terminologies.
Therefore, (D) option is correct.
Answer:
NFC(Near Field Communication).
Explanation:
When user wants to share pictures quickly between the mobile devices which are in very close proximity we can use NFC(Near Field Communication).
Near Field Communication(NFC):-It is a group of communication protocols that lets two devices most of the times these are mobile phones to establish connection and the distance between them should be less around 4 centi meter.
A big question or problem in the tech field that i would like to solve is Data security.
<h3>What is Data security ?</h3>
Data security can be regarded as process of protecting data from unauthorized user as well as protection from data corruption .
I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.
Data security are;
- data encryption
- hashing
- tokenization
Learn more about Data security at;
brainly.com/question/17493537