1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
3 years ago
11

When doing black and white photography, which file format should you use if possible? JPEG TIFF PNG RAW

Computers and Technology
2 answers:
Ivahew [28]3 years ago
8 0
Use the file format RAW.

Good luck! 
Airida [17]3 years ago
3 0

RAW would still be the best, as the RAW format gives you the full color information of your image.

If you have access to a RAW+JPEG function, it would benefit you more as the RAW+JPEG function will show you how the picture will look like in black and white.

This function is actually found in the newer DSLR cameras.

You might be interested in
Ethernet ensures that _____ on a shared network never interfere with each other and become unreadable.
Dmitry [639]

Answer:

Signals.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Ethernet ensures that signals on a shared network never interfere with each other and become unreadable through the use of encapsulation and standard encryption protocols.

In Computer Networking, encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).

The TCP/IP model comprises of four (4) layers;

1. Application layer: this is the fourth layer of the TCP/IP model. Here, the data unit is encapsulated into segments and sent to the transport layer.

2. Transport layer (layer 3): it receives the segment and encapsulates it into packets and sends to the internet layer.

3. Internet layer (layer 2): packets are encapsulated into frames.

4. Network layer (layer 1): frames are then converted into bits and sent across the network (LAN).

Hence, the data unit encapsulated inside a packet is known as segment, which is typically referred to as packet segmentation.

Additionally, these data, segments, packets, frames and bits transmitted across various layers are known as protocol data units (PDUs).

8 0
3 years ago
Open this link after reading about Ana's situation. Complete each sentence using the drop-downs. Ana would need a minimum of ato
Arte-miy333 [17]

bachelor degree and grow

6 0
3 years ago
Read 2 more answers
which of the following is not an e-reader you would use as a alternative to carrying around a set of textbooks?
musickatia [10]

I have a kindle paper white that I downloaded all of my avalible textbook onto if that helps I find it much better then carrying around a bunch of textbooks
4 0
3 years ago
The input to the following algorithm is a positive integer. The goal is to find the digit in the hundreds place of the integer.
Serggg [28]
The first division should reduce the hundreds digit to the units digit by dividing by 100.  Ignoring remainder means ignoring the previous units and tens digits.
The second division, where we keep the remainder is to extract the units digit by ignoring the quotient.  So we divide by 10.  The discarded digits are the tens and higher digits.

4 0
3 years ago
Read 2 more answers
Please Answer these following Question very urgent "file attch"
Tanya [424]

Answer:

1. ∑ numbers=57

Overall ∑ is 57 hence.

And each number is less than 15, and hence they can be represented in 4 bits

However, we cannot write 57 in 4 bits.

However, 111001 is 57 in binary, and it is as well greater than 4 bits.

Hence, we are adding the two extreme left bits to right 4 bits as mentioned below.

Left are 11, right bits are 1001

1001

   11

1110 is the checksum

=14 and this is 14 bits.

2. The degree of given polynomial is 3, and hence,

The divisor is X3+1 =1001

Original data word=10110

Since the size of CRC is 3 bits, we should place 3 zeros to the right of the original data

And thus we get,  

10110000

         10100

1001√10110000

         1001

         00100000

         1001

         --------------

         0100   CRC

We send our data 10110 its reminder (CRC) will be added with it like 10110100

Receiver will receive 10110100 with same divisor 1001

         10100

1001√10110100

         1001

---------------------------

         01001

           1001

--------------------------------

           000

And since the last 3 bits are zero, and hence its error free.

3.

At 7 and 5 we have 1 and similarly in 2nd at 8, 4 and 0

  Bits    Polynomial

1010000        X7+X5+0

10001001 X8+X4+1

Explanation:

Please check answer.

3 0
3 years ago
Other questions:
  • Once jaden has decided upon the telecommunications technology his team will use, he will have completed the last step of the dec
    8·1 answer
  • A custom information field that helps users to find a specific document is called
    8·2 answers
  • Does a triangle with sides of lengths 1.5 ft, 2.5 ft, and 2 ft form a right triangle? How do you know?
    13·1 answer
  • PLEASE HELP!!!!
    7·1 answer
  • Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    14·1 answer
  • How do you find specific words on a web page ...?? I know theres a shortcut for highlighting a specific word on a webpage on fir
    15·1 answer
  • Name an analog quantity other than temperature and sound
    13·1 answer
  • What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sen
    11·1 answer
  • A. All methods in an interface must be _________________ _________________________.
    5·1 answer
  • How each programming language differs in terms of constructs, techniques, use and requirements?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!