1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
insens350 [35]
3 years ago
9

Need help with this is photography :)

Computers and Technology
1 answer:
mestny [16]3 years ago
8 0

Answer:

UV filter, This filter blocks UV light and removes the blue cast from images taken in very bright sunny conditions. ... With old film cameras it was often necessary to use a UV filter because film is extremely sensitive to UV light.

You might be interested in
When a device or service causes the system to hang during a normal boot, boot into __________ and disable the device or service
Olenka [21]

You should boot into <u>safe mode</u> and disable the device or service when it causes the computer system to hang during a normal boot.

<h3>What is safe mood?</h3>

Safe mood can be defined as a boot option in which the operating system (OS) of a computer system starts in <u>diagnostic mode</u> rather than in a normal operating mode, so as to enable the user correct any problems preventing the computer system to have a normal boot.

This ultimately implies that, safe mood is a diagnostic mode of the operating system (OS) of a computer system that is designed and developed to fix most problems within an operating system (OS) and for the removal of rogue software applications.

Read more on safe mood here: brainly.com/question/13026618

5 0
1 year ago
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
2 years ago
____________ approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is o
Vitek1552 [10]

Answer:

Symmetric encryption or single key encryption

8 0
3 years ago
To create a query, users can either type a query using sql or, more commonly, use the query tools built into the dbms (such as a
sattari [20]
The answer is : wizard
8 0
1 year ago
Font issues arise when you attempt to run a presentation on a computer that does not have the fonts you used when creating the p
jenyasd209 [6]

Some computers have fonts that differ from one another – it could be because the user downloaded a different font styles from the various sources available from the Internet; it could also be because the user is creating his or her presentation in a computer with different operating systems.

In order to mitigate any error that might occur in the font style due to these circumstances, you should embed the font to the presentation while creating it. This ensures that the same font displays across all system.

3 0
3 years ago
Other questions:
  • Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
    8·2 answers
  • Write a program that asks the user to enter two dates (in YYYY-MM-DD format), and then prints which date is earlier. Your progra
    15·1 answer
  • When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________
    7·2 answers
  • Lewis is using a stylus with his touch screen computer in order to draw a
    8·1 answer
  • Olivia is trying to save for a new laptop computer. To help her save, she should start a _____. database financial statement per
    7·2 answers
  • Which type of systems development is characterized by significantly speeding up the design phase and the generation of informati
    11·1 answer
  • A seven-octet pattern of alternating 0s and 1s used by the receiver to establish bit synchronization is a _______
    11·1 answer
  • In C, a switch construct can have ________ number of default case(s). *
    14·1 answer
  • A computing company is running a set of processes every day. Each process has its own start time and finish time, during which i
    11·1 answer
  • In disc brakes, pads are forced against the of a brake disc​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!