1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alika [10]
3 years ago
10

ILL GIVE BRAINLIEST You are taking a photograph of a valley and want to draw attention to a hamlet hidden amid the hills. Which

natural element can you use to emphasize and lead the viewer’s eyes toward the hamlet?
A.
a stream snaking through the valley and past the hamlet
B.
a field of poppies in the foreground
C.
clouds behind the hills
D.
the setting sun
Computers and Technology
2 answers:
mr Goodwill [35]3 years ago
8 0

Answer:

C

Explanation:

lana [24]3 years ago
7 0
Answer: A
Explanation: Because it’s close to the hamlet but not blocking it like option B or drawing attention away from it like option C or D
Hope this helps!
You might be interested in
Which of the following is used to allocate memory for the instance variables of an object of a class?1. the reserved word public
kodGreya [7K]

Answer:

The correct answer to the following question will be 2. the operator new.

Explanation:

New operator is used to allocating the memory to the instance object.The new object can be created by using a "new" keyword in java .

Syntax of using 'new' operator is :

class_name object_name=new class_name() // it allocated the memory to the class

For Example :

ABC obj = new ABC;  

Now, this time obj points to the object of the ABC class.

obj = new ABC ();

call the construction of ABC class

3 0
3 years ago
Why is art important to heritage?
Sophie [7]
<span>but of culture, values and traditions. Cultura</span>
7 0
3 years ago
In order to use SliIn order to use Slicers to filter some data, what must you first do to that data?cers to filter some data, wh
lakkis [162]

Answer:

<em />

<em>Splicers provide buttons that you can click to filter tables, or PivotTables. In addition to quick filtering, slicers also indicate the current filtering state, which makes it easy to understand what exactly is currently displayed animation</em>

<em />

8 0
3 years ago
Which wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
Korolek [52]

Answer:

WEP, WPA Personal, and WPA2 personal, these are the wireless security method which are used common shared key configured on the wireless access point and wireless clients. WEP is the wired equivalent privacy and WPA stands for wifi protected access.

These are the wireless security protocols, which basically provide the wireless security to the system. Wireless network are transmitted within the range for every direction. WPA modern application used the pre shared key system and this system are developed for link the device to the access point easily.

4 0
3 years ago
Todd, a manager at Dexter Manufacturing, has received a grievance filed by a group of his subordinates who are union members. Wh
romanna [79]

Answer:

B. The employees contact the labor union arbitrator, who then sends an e-mail to Todd.

Explanation

Todd, 5he manager has just received a grievance filed by his subordinates who are union members because of a dispute.

A grievance can be filed when there is dissatisfaction at work, or anger at policy or something else that is a work related grievance.

The likeliest scenario for escalating their dissatisfaction to their employee would be to present their grievance through their union arbitrator who is charged with protecting the work interests of its union members.

This is necessary because the employer knows the anger of the employees and dialogue can take place.

7 0
3 years ago
Other questions:
  • Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
    11·1 answer
  • Big Project, Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly
    9·2 answers
  • Which should be addressed by stakeholders when reviewing the problem statement? Select all that apply. All possible outcomes hav
    12·1 answer
  • What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
    15·1 answer
  • When we type there Is blue like thing blinking what's that called ​
    8·2 answers
  • Creating Classes
    10·1 answer
  • What is the error in this?<br><br> userGuess = int(input(“Guess a number between 1 and 20: “))
    12·1 answer
  • PLS REPLY ASAP WILL MARK BRAINLIEST
    5·2 answers
  • Question 4 of 25
    6·1 answer
  • 9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!