1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
3 years ago
15

PHOTOGRAPHY PLEASE HELP!

Computers and Technology
1 answer:
BARSIC [14]3 years ago
8 0
1. Portfolios, folders, or drives
2. To make small touch ups and enhance your photos
3. People can steal your photos
4. Because they are trying to capture a story in a photo, and others can change the original intent of their work.
You might be interested in
A page-replacement algorithm should minimize the number of page faults. We can achieve this minimization by distributing heavily
tekilochka [14]

Answer:If you think that a blank sheet of paper or a blinking cursor on the computer screen is a scary sight, you are not alone. Many writers, students, and employees find that beginning to write can be intimidating. When faced with a blank page, however, experienced writers remind themselves that writing, like other everyday activities, is a process. Every process, from writing to cooking to bike riding to learning to use a new cell phone will get significantly easier with practice.

Just as you need a recipe, ingredients, and proper tools to cook a delicious meal, you also need a plan, resources, and adequate time to create a good written composition. In other words, writing is a process that requires steps and strategies to accomplish your goals.

These are the five steps in the writing process:

Prewriting

Outlining the structure of ideas

Writing a rough draft

Revising

Editing

Effective writing can be simply described as good ideas that are expressed well and arranged in the proper order. This chapter will give you the chance to work on all these important aspects of writing. Although many more prewriting strategies exist, this chapter covers six: using experience and observations, freewriting, asking questions, brainstorming, mapping, and searching the Internet. Using the strategies in this chapter can help you overcome the fear of the blank page and confidently begin the writing process

Explanation:

4 0
2 years ago
How to get on website?
Nitella [24]

Answer:

You are probably blocked from that website or your schools program blocks that website from your device

Explanation:

4 0
2 years ago
During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.
borishaifa [10]

Answer:

b. Try to convince the owner of the computer to give you to decryption key/password.

Explanation:

Encrypted hard drives have maximum security and high data protection. to access them you need to enter a password to unlock them.

The image filtering technique is a method that serves to selectively highlight information contained in an image, for which it does not work.

The encryption algorithm is a component used for the security of electronic data transport, not to access data on an encrypted hard drive.

The encryption key is used in encryption algorithms to transform a message and cannot be exposed by disconnecting the hard drive from its power source.

4 0
3 years ago
Blank text has a darker apperance than normal texts
sammy [17]
That's cool, I guess. What was the question?
4 0
3 years ago
Make a webpage that shows news <br>​
Nataly_w [17]
Well it all depends how you plan on making it as you would need to know Web Development or you could just copy paste code from YT
8 0
2 years ago
Other questions:
  • Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek res
    15·2 answers
  • Variable costs are __________.<br><br> A. decreasing<br> B. increasing<br> C. static
    10·1 answer
  • What would happen if a pc that contains a power supply that does not automatically adjust for input voltage is set to 230 volts
    13·1 answer
  • Which of the following statements is false? People tend to shortcut security procedures because the procedures are inconvenient.
    13·1 answer
  • When using a file name you have to use only lower case letters<br>true or false
    11·1 answer
  • Complete the sentence to identify advantages of top-down programming design. Choose all that apply.
    15·2 answers
  • How do you delete answers on Brain.ly?
    11·2 answers
  • Advantages of Linux include_____.
    6·1 answer
  • Louis is a civil engineer and wants to use a line on a floor plan that is indicative of the position from which a section is tak
    5·2 answers
  • Can someone help me with python
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!