1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
4 years ago
9

(40 pointsAnd brainliest answer ASAP) Maria is recording her friend’s graduation ceremony. How can Maria ensure that the video i

s recording correctly?
Maria can ensure that the video is recording correctly by checking the _____.
Computers and Technology
1 answer:
snow_lady [41]4 years ago
3 0

Answer:

camera

Explanation:

You might be interested in
What will be the output of following python code? a,b=3,4 a,b,c=b,a+3,b-1 print(a,b,c)​
Novosadov [1.4K]

Answer:

6 3 4

Explanation:

A=3+3

b=4-1

c=b=4

6 0
3 years ago
What does aperture control? A)amount of light the image sensor captures when taking a photo. B)how sensitive the camera is to in
My name is Ann [436]

Answer:

How sensitive the camera is to incoming light.

Explanation:

8 0
4 years ago
Read 2 more answers
Riser cards on some proprietary systems plug into a unique socket or slot on the motherboard. These are also called________
inysia [295]

Answer: Daughter board

Explanation:

A daughter board is refers to the circuit board and it is basically connected to the motherboard directly without any interruption.

It is also known as a daughter card which plugs and then extended the circuitry by connecting with the another circuit board. A mezzanine card and the riser card are the examples of the daughter board that used in the system.

According to the question, the riser card basically plus into the unique socket or the slot in the board and this is known as the daughter board.

Therefore, Daughter board is the correct answer.          

8 0
4 years ago
What type of attack is dependent on sending packets too large for the server to handle?
Art [367]
I think the answer is a kernel attack. Kernel attacks often send corrupted packets, but they also send large packets, allowing the server to crash and make an opening.
7 0
4 years ago
What is difference between local method invocation and remote method invocation?
Vlad [161]

Answer:

 Local method invocation parameters are passed by reference with the same object. Local innovation having the source code on the form of class and it basically try to invoke various methods by importing in the form of packages.

On the other hand, in remote methods invocation the parameters are passed by the copy when the given parameters are not object class. It basically allow an object that existed in another address capacity. This methods works on the client side transport.

8 0
3 years ago
Other questions:
  • Devices used for viewing images from one computer to another over the internet
    6·1 answer
  • One of the best examples of outcome control is the re-hiring of Steve Jobs by Apple as CEO
    14·1 answer
  • What does the hard disk drive do?
    9·2 answers
  • Which PowerShell command will upgrade the VM configuration version to take advantage of the new features in Windows Server 2016?
    12·1 answer
  • Which category of app does word processing software fall into?
    13·1 answer
  • An example of negative self-talk is:
    13·2 answers
  • Necessary component of creativity
    11·1 answer
  • You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA
    14·1 answer
  • What is the output?
    11·2 answers
  • The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database be
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!