1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
12

A metallic reflector provides what kind of bounced light

Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
5 0
<span>a reflector is an improvised or specialised reflective ... Also known as plane reflectors, "flats" or bounce boards, this kind of reflector is located independent of a light source; ... Hence bounce lighting may provide either the primary or secondary (fill) light source, depending on its intensity.</span>
You might be interested in
Consider what fact-finding techniques you would use to identify the important facts needed to develop a database system. Please
8090 [49]

Answer:

Examples of Fact-finding techniques includes:

  1. Prototyping
  2. Questionnaires
  3. Research and sites visit
  4. Interviews

Explanation:

It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.

<u>Prototyping </u>

<em>Advantage:</em>  enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.

<em>Disadvantage:</em> Training and Development cost consumes resources.

<u>Research and site visit </u>

<em>Advantage :</em> better time management if the problem has been researched upon before.

<em>Disadvantage:</em> appropriate permission is often needed before using research materials.

<u> Questionnaires </u>

<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.

<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.

<u>Interviews</u>

<em>Advantage:</em> The body language of interviewees is been perceived.

<em> Disadvantage: </em>Interviewing is time consuming and costly.

3 0
3 years ago
How can i address inv file in c for open it?
Paul [167]
Launch a .inv file, or any other file on your PC, by double-clicking it. If your file associations are set up correctly, the application that's meant to open your .inv file will open it.
Or else
With a extension?
5 0
3 years ago
Array elements must be ________ before a binary search can be performed.
Sladkaya [172]
In order.
You have to be able to see if its on the left or right side of the midpoint
7 0
3 years ago
Summarize who you believe cyber criminals are, and why?
sergij07 [2.7K]

Answer:

 The cyber criminals are the people that are engaged with getting the data in an unapproved way and furthermore mischief to the association henceforth are considered as cyber criminals.

Cyber criminals are people or groups of individuals who use innovation to committed the malicious exercises on computerized frameworks or systems with the aim of taking the organization data or individual information and producing benefit.

There are many types of cyber criminals that are:

  • Internet stalkers
  • Cyber terrorist
  • Identity thieves

5 0
3 years ago
What is a table in excel
tekilochka [14]
A table in excel is responsible for keeping track of numerical data.

Meaning information in the form of numbers.
8 0
3 years ago
Read 2 more answers
Other questions:
  • witch of the following is a good way to choose your location as you develop your study method? A. Going where most of your frien
    6·1 answer
  • This is a free point thing!! I am giving 100 points!! Anyone wanna talk!!!!
    11·2 answers
  • A car holds 16 gallons of gasoline and can travel 312 miles before refueling. Write aC++ program that calculates the number of m
    9·1 answer
  • What are the problems with security when working on a Web Page?
    13·2 answers
  • Complete the sentence
    6·2 answers
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • What is another term used for next generation firewalls
    12·1 answer
  • What is a program that includes a function parameter capable of doing?
    8·1 answer
  • , how do you make this user <br> XtraCrispyIzzy<br> 12 characters or less for microsoft?
    8·1 answer
  • In C++ please (read the image below for instructions)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!