1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
3 years ago
9

When he takes a picture, Simon freezes an action without blurring it, to show movement. Which type of photographer is he?

Computers and Technology
2 answers:
Jlenok [28]3 years ago
6 0

Answer:

freezing action photographer i think this is the type.... i don't know much about photography yet

Explanation:

Alchen [17]3 years ago
4 0

Answer:

he'd be a portrait photographer :)

Explanation:

You might be interested in
Which type of photographer documents plants and weather in their natural habitat?
mario62 [17]
B, plants and weather are part pf nature.
7 0
2 years ago
An administrator needs to make sure that video conferencing is allocated a high portion of bandwidth within a company network. W
frosja888 [35]

Answer:

QoS

Explanation:

We could use a blacklisting or a MAC filtering to remove from the network, and in this way, we're going to get a high portion of bandwidth, but other must work too, and the whitelisting have almost the same function, but QoS Quality of service is specifically for these cases where we need high bandwidth for a video conference, we can make this with some tools or techniques like jitter buffer and traffic shaping.

4 0
3 years ago
What is a sorting algorithm
alexdok [17]

Explanation:

In computer science, a sorting. algorithm is an algorithm that puts elements of a list in a certain order. The most frequently used orders are numerical order and lexicographical order. Efficient sorting is important for optimizing the efficiency of other algorithms that require input data to be in sorted lists

8 0
3 years ago
Select all True statements! Question 1 options: a) Host A is sending Host B a large file over a TCP connection. Assume Host B ha
VikaD [51]

<u>Solution:</u>

a)   False. Piggyback is used only for efficiency. If there's no data packet to be piggybacked to, then B will just send the acknowledgement packet.

b)  False. It is the size of the receiver's buffer that's never changed. RcvWindow is the part of the receiver's buffer that's changing all the time depending on the processing capability at the receiver's side and the network traffic.

c)  The given statement is True.

 d) False. The sequence number of the subsequent segment depends on the number of 8-byte characters in the current segment.

e)  True. Every TCP segment has a current value of rwnd in the receive window.

f)  False. Next_RTT = alpha * last_estimated_RTT + (1-alpha)*newly_collected_RTT_sample. In this case even though the last sampleRTT which is the newly_collected_RTT_sample is 1sec, the next_RTT still depends on alpha and last_estimated_RTT. Therefore, the next_RTT is not necessarily greater than 1sec.

g) False. The acknowledgement number has nothing to do with the sequence number. The ack. number indicates the next sequence number A is expecting from B.

5 0
4 years ago
What is 01010101 converted to denary
Lisa [10]

Answer:

85

Explanation:

0 + 64 + 0 + 16 + 0 + 4 + 0 + 1 = 85

3 0
3 years ago
Other questions:
  • Which utility would you use to return the common name of the computer you're at? Execute this command and submit screen shots.
    11·1 answer
  • A computer's fqdn is pc42042.east.contoso.corp. which option in the advanced tcp/ip settings dialog box must be enabled to allow
    14·1 answer
  • What is the Java source filename extension? What is the Java bytecode filename extension?
    14·1 answer
  • )the number of levels in a tree is called
    6·1 answer
  • Which statement in switch case structure transfers the control flow outside the structure? switch statement break statement case
    5·2 answers
  • How would you use Microsoft Excel to
    10·2 answers
  • How was the addition of an improvement over early web design?
    11·1 answer
  • Which Windows feature allows secure printing over the Internet?​
    11·1 answer
  • Which one of these is NOT an indicator that an email is spam?
    5·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!