1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
14

Which is an acceptable practice when a photographer shoots in windy conditions?

Computers and Technology
1 answer:
VARVARA [1.3K]3 years ago
5 0

Answer:

d) attach a bag of weights to the tripod

Explanation:

You might be interested in
How is cropping different from scaling?​
Keith_Richards [23]

Answer:

Scaling changes the size of the whole image by resampling it(duplicating the pixels). in cropping you only get a part of the original image/ remove the outer area of it .

Explanation:

8 0
3 years ago
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless c
Lera25 [3.4K]

Answer:

hotspots.

Explanation:

Hotspots is a small geographical location with at least one access point in an outdoor/indoor setting, that provide people with maximum wireless coverage within that area and its mostly uses a wireless local-area network (WLAN) using a router to connect to an Internet service provider.

7 0
3 years ago
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
Renting provides _________ flexibility but can lead to _________ costs in the long-term.
docker41 [41]
Renting provides greater flexibility but can lead to higher costs in the long term.
3 0
4 years ago
Read 2 more answers
Why is it important to begin development of a software solution with a programming design in place? A programming design summari
Svetlanka [38]

Answer:

A programming design communicates decisions about the programming approach and saves time, money, and effort.

Explanation:

It is important to decide upon a programming design before developing a software solution. Starting out with a design benefits a project because:

1. it communicates decisions about the programming approach to all project team members.

2. it helps to ensure that different parts of the code developed by different programmers will integrate properly.

3. it helps to ensure that code will be easy to read and maintain.

4. it saves time, money, and effort.

7 0
3 years ago
Other questions:
  • This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
    8·1 answer
  • Assuming that the message variable contains the string "Happy holidays", the statement message.find("days"); returns a. -1b. 10c
    6·1 answer
  • The main trade-off that all investors must consider is
    11·2 answers
  • Ann wants to save her presentation so she can work on it later. Which device on her computer can store this data long term?
    14·1 answer
  • What command displays detail information about the OSPF interfaces, including the authentication method?
    7·2 answers
  • Python 3 (not java)1.Assume that word is a variable of type String that has been assigned a value. Write an expression whose val
    14·1 answer
  • What will you see on the next line?<br> &gt;&gt;&gt;int(12.8)<br> ___
    15·1 answer
  • Use the drop-down menus to explain what happens when a manager assigns a task in Outlook.
    6·2 answers
  • 9.2 lesson practice ​
    6·1 answer
  • 14. How do digital libraries address the problem of digital exclusion?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!