1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dafna11 [192]
3 years ago
6

How do you take a picture underwater with my phone that is not waterproof?

Computers and Technology
1 answer:
LenaWriter [7]3 years ago
6 0

Answer:

try putting it in a clear glass cup or sealing it tightly in a zip lock bag

Explanation:hope i helped love yall and can iget brainliest i only need two more

You might be interested in
Questions
Jet001 [13]

I know you're going to delete my answer... But I have an essay which needs to be completed online and I need to ask a urgent question!

If you have a better reason WHY you need me to answer the RIGHT answer...Please reply

5 0
3 years ago
Write a program to find the sum of given series: (a) S = 1 + (1/2) + (1/3) + ...... + (1/20)
Snowcat [4.5K]

total = 0

numerator = 1

denominator = 1

while denominator != 20:

   total += numerator/denominator

   denominator+=1

print(total)

I wrote my code in python 3.8. I hope this helps.

3 0
3 years ago
How can your web page design communicate your personal style
Levart [38]

Answer:

Web design is very unique, you can express your feelings through creating a page.

7 0
3 years ago
Software that instructs the computer how to run applications and controls the display/keyboard is known as the
saw5 [17]
Answer is : operating system
8 0
4 years ago
Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget th
never [62]

Answer: key escrow

Explanation:

Using key escrow we are able to recover data if passphrase is forgotten. this technique uses a bypass link to get all the keys to the system only if it is an authorized entry.

7 0
3 years ago
Other questions:
  • The text discusses three approaches to combining overall cost leadership and differentiation competitive advantages. Which of th
    10·1 answer
  • Please reply only in CORAL. I am not sure how to get the numbers between the negative version and positive version of the input
    10·1 answer
  • If a given router can connect to at most k networks, how many routers, r, are required to connect n networks? write an equation
    7·1 answer
  • The main workplace of a Windows computer is called the
    14·1 answer
  • Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
    12·1 answer
  • Which input device can advanced computer users use instead of a mouse to perform tasks such as opening new windows and saving or
    15·1 answer
  • The development of computer languages is classified into two categories .<br><br>true or false​
    11·1 answer
  • Lydia is trying to take an aerial shot from the window of an airplane. Where should she hold her camera to get the best shot?
    8·1 answer
  • This question is related to linked-list representation of disjoint sets. Consider two sets Sx and Sy that have 3 and 5 elements,
    14·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!