1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tamaranim1 [39]
3 years ago
5

Photography Class help!

Computers and Technology
2 answers:
Pachacha [2.7K]3 years ago
7 0
Yes, I think that the answers are D and C. I think thats correct.
Hope I helped!
bagirrra123 [75]3 years ago
3 0

Answer:

1. Moderate overcast light is identified by soft, grey shadows.

2. Bright sunshine is defined by dark, well defined shadows.

Explanation:

Grey Shadows is a soft, warm, sandy gray with a brick undertone.

You might be interested in
Why is it important to continiously conduct penetration testing for a strong security system?.
katovenus [111]

Answer:

- Because even though your implementation may not change, new vulnerabilities in frameworks and libraries may be found that affect your security.

- If your implementation does change, there could be unwanted side effects on security.

- Operating system updates that happen behind your back could introduce new vulnerabilities.

6 0
2 years ago
How does communication produce clarity and direction​
Svetllana [295]
Employees and clients are on the same page and heading in the right direction when communication is clear. It signifies that the message you sent was received in the manner in which you meant.... Eliminating ambiguous terms like "soon," "a lot," and "many" might assist enhance and clarify the message.
3 0
3 years ago
Statement Widgets or gadgets are _____ programs that appear on the desktop and display little pieces of information such as a ca
Phoenix [80]

Answer:

The answers of the following blanks are:  

1). utility  

2). malware

3). Trojan horses

4). platform

5). device drivers

Explanation:

Utility Program, these programs are that program which appears when you start your system at your desktop window. Such as, calculator, calendar, CPU meter, and many other little programs. It also known as gadgets and widgets.

Malware is also known as malicious software, it is a program or a file that corrupt your software and it is a virus that harms your system.

Trojan Horses is a program or a file which access your password and personal details. It not just like a virus because it does not harm your computer but it access your things.

Operating system is also known as a Platform that manages your software and the hardware.

Device Drivers are the drivers that are needed in your system to work the hardware devices and without it, some of the important software and the hardware do not work.

5 0
4 years ago
Hypertext Markup language (HTML) version _____ added support for style sheets to give web designers greater control over page la
Ipatiy [6.2K]

Answer:

4.01 version .

Explanation:

A hypertext Markup language is used for designing the web page when we added the CSS on the web page we can create the web page more efficient manner and also there is more control over the web page because we can easily call the classes of CSS.

The Hypertext Markup language version 4.01 provides greater flexibility on the web page also We can also control the page layout in a very easy manner. The appearance of the web page is good as compared to version HTML 4

8 0
4 years ago
1.which screen appears after the password is typed (welcome, lock)​
jenyasd209 [6]

Answer:

it should be the welcome screen I will hope so lol

4 0
3 years ago
Read 2 more answers
Other questions:
  • Explain why this scenario points towards a potential problem with BIOS.
    10·2 answers
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • Brenda's working on improving a Google Search Ads quality score so it potentially gets a better ad rank and performs better in t
    9·1 answer
  • The business case for using grid computing involves all of the following except: speed of computation. cost savings. agility. in
    5·1 answer
  • Networks that are designed to connect similar computers that share data and software with each other are called:
    10·1 answer
  • Python 3 (not java)1.Assume that word is a variable of type String that has been assigned a value. Write an expression whose val
    14·1 answer
  • Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a compet
    15·1 answer
  • What is keyboard? answer me <br>​
    12·2 answers
  • SOMEONE PLEASE HELP ME OUT WITH THIS PLEASE
    13·1 answer
  • Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!