1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
10

why might a portrait be both a portrait of the subject and the photographer? how is a photographer present in a portrait?

Computers and Technology
2 answers:
Nataliya [291]3 years ago
5 0
Because of the reflection on the window or mirror.
harkovskaia [24]3 years ago
3 0

Answer:

Because of the reflection on the window or mirror.

Explanation:

You might be interested in
B. Identify the purpose of each of the following types of utility programs
olya-2409 [2.1K]

<u>These are the types </u>:

1. Antivirus software : Detects and removes virus and malwares from   computer system.

2.Disk defragmenter : Reduces the fragmented space in the disk.

3.Disk cleaner : Build to find and delete unwanted files to free the disk space.

6 0
4 years ago
Why is it difficult to enforce laws against intellectual theft?
Mnenie [13.5K]

Answer:

The best answer is: all intellectual theft occurs online and through digital networks.

Explanation:

<em>Because the implementation is online and through the network, it is difficult to monitor and justify the safety of the victim and the theft. Internet is widely available to all individuals who has access to it. No matter what is the age, gender and nationality of the victim. It is difficult to maintain a law with its very wide scope and the audiences involved. </em>

3 0
3 years ago
Arrange the steps of the basic decision-making process in the correct order.
Maru [420]
Identify, gather information, identify any alternatives, weigh the evidence, choose among alternatives, take action, review you decision 
8 0
3 years ago
Read 2 more answers
01001110 01100101 01110110 01100101 01110010 00100000 01100111 01101111 01101110 01101110 01100001 00100000 01100111 01101001 01
Scorpion4ik [409]

The Binary code translation are: Never gonna give you up\nNever gonna let you down\nNever gonna run around and desert you\nNever gonna make you cry\nNever gonna say goodbye\nNever gonna tell a lie and hurt you\n.

<h3>Binary code translation</h3>

Binary code can be defined as machine language which a computer understand.

This binary code are often used in digital computer and the  data code  mostly use are zero (0) and one (1) and  they help to represent information.

Therefore the Binary code translation are: Never gonna give you up\nNever gonna let you down etc.

Learn more about binary code here:brainly.com/question/9480337

#SPJ1

7 0
2 years ago
A rootkit uses a directed broadcast to create a flood of network traffic for the victim computer.a. Trueb. False
Lady_Fox [76]

Answer:

The following statement is False.

Explanation:

The following statement is not true because the rootkit is an application that provides unauthorized access to the computer or any program and it is the software that is intended to harm the computer system. So, that's why the rootkit is not used to create a flood of the network traffic in the user's system.

6 0
3 years ago
Other questions:
  • Which of the following characteristics of an e-mail header should cause suspicion?A. Multiple recipientsB. No subject lineC. Unk
    12·1 answer
  • Form the recurrence relations (RRs) for the number of vertices and the number of edges of a hypercube of n dimensions, Hn. Solve
    13·1 answer
  • Tissues of the same kind make up _____________ .
    7·2 answers
  • Si la velocidad del sonido en el aire es de 330m/s , calcula la longitud De onda en metros, de una nota musical de frecuencia 55
    5·1 answer
  • Which one of these tasks is part of the pre-production phase of game development?
    5·2 answers
  • An inserted graphic in Excel is
    12·2 answers
  • The third generation of computers was marked by the introduction of ____.
    8·1 answer
  • Characteristics of at-risk drivers
    10·2 answers
  • If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
    15·1 answer
  • Technical safeguards involve the hardware and software components of an information system. group of answer choices true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!