1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
12

A metallic reflector provides what kind of bounced light

Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
5 0
<span>a reflector is an improvised or specialised reflective ... Also known as plane reflectors, "flats" or bounce boards, this kind of reflector is located independent of a light source; ... Hence bounce lighting may provide either the primary or secondary (fill) light source, depending on its intensity.</span>
You might be interested in
Create an interactive program to use class a LightsOut class to allow a user to play a game. Each step in the game will require
expeople1 [14]

Answer:

9+10=21

Explanation:

wyd boy

8 0
3 years ago
Initially, later, and finally are examples of what kind of words
Klio2033 [76]
Im pretty sure that the correct answer is Transition words.
3 0
3 years ago
When you use the mvc pattern for a java web application, you often add ________________________ to the request object before you
aivan3 [116]
Hi,

JVM - Java Virtual Machine

Hope this helps.
r3t40
6 0
3 years ago
Which of these is NOT a sign that someone might be drunk
earnstyle [38]

Answer:

what are the signs someone would or would not be drunk

7 0
3 years ago
Read 2 more answers
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
Other questions:
  • While moving into a new apartment, Titus needed to hold the door open with something heavy. It suddenly dawned on him that he co
    9·1 answer
  • How to search multiple microsoft word documents?
    15·1 answer
  • When a server crashes and goes offline on a network, which of the following helps to determine that the server is unavailable?
    9·1 answer
  • A file to which information is written is referred to as a(n) ____ file.
    8·1 answer
  • Which of the following is an example of new and emerging classes of software?
    11·1 answer
  • What is the meaning of the word joystick
    6·2 answers
  • The relational database is the primary method for organizing and maintaining data today in information systems. It organizes dat
    9·1 answer
  • Write a for loop that computes the following sum: 5+10+15+20+...+485+490+495+500. The sum should be placed in a variable sum tha
    7·1 answer
  • Why do we use a design process?
    13·2 answers
  • Which of the following is the best way to keep up with trends in your industry?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!