1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
3 years ago
10

How can you exaggerate the height of a jump in a photograph

Computers and Technology
1 answer:
Nataliya [291]3 years ago
8 0

If you take the photo with one person on the ground that way when they take the photo it will look like the person jumping is jumping higher then they really are.


I hope this helps

You might be interested in
Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused a
Soloha48 [4]

The best way to explain the difference is option A: Jitter is the up and down variation in latency.

<h3>What are VoIP services?</h3>

Voice over Internet Protocol (VoIP), is known to be a form of a technology that gives one room to be able to make voice calls via the use of a broadband Internet connection.

In the case above, The best way to explain the difference is option A: Jitter is the up and down variation in latency as it is the only best option.

See options below

Jitter is the up and down variation in latency.

Latency is the up and down variation in jitter.

Jitter is caused by an inadequate codec.

Latency is caused by sampling; jitter is not.

Learn more about latency from

brainly.com/question/27013190

#SPJ1

8 0
2 years ago
The collection of all possible vulnerabilities that could provide unauthorized access to computer resources is called the:
Salsk061 [2.6K]
<span>The collection of all possible vulnerabilities that could provide unauthorized access to computer resources is called the: </span>attack surface
5 0
3 years ago
We can include following item(s) during configuration itemidentification:
Ainat [17]

Answer:

d) All of the above

Explanation:

In configuration management, the Identify configuration items, work products and related components are present.

  • All the documents which are related to the work,the manuals how that the system works are present in the configuration item identification.
  • The source code that is implement for the functioning of the products.These are implemented at the time of generation of products.
  • Software Requirement Specifications are also specified by SRS it is present in design stage of software development life cycle,it is also a part of configuration item identification.
5 0
3 years ago
Suppose that the domestic production of computer games creates enjoyment for those who play the games. Domestic production of co
kirill [66]

Answer:

a

Explanation:

Based on the information provided within the question it can be said that the best possible policy to encourage this would be to impose tariffs on computer game imports. This would force company's to begin domestic production of computer games in order to continue making the profits from the domestic market as opposed to losing out on all of the opportunities that the domestic market offers them.

6 0
3 years ago
What is the maximum number of communication paths for a team of twenty people?
MAVERICK [17]
Each of the 20 people has 19 other people to communicate to. If you add that all up you get 20*19 paths, but then each path is counted twice (back and forth), so we divide this by 2. 20*19/2 = 190.

The general forumula is n(n-1)/2
6 0
3 years ago
Other questions:
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    7·1 answer
  • James has been asked to build a low-profile computer for his friend to use as a home theater system. James needs to choose parts
    15·1 answer
  • If you delete an imessage does the other person see it
    12·1 answer
  • What is the drawback of the linear model?
    5·2 answers
  • Jennifer recently bought a new computer to type a new manuscript she’s been working on. She also stored a lot of movies on it to
    10·1 answer
  • Jamal is creating a presentation for a report on engineers. He wants to use a template. How can he access different options for
    14·1 answer
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • When should you stop where you are, drop to the
    11·1 answer
  • How should excel Identify social security numbers: as a text, numbers, or date and time? Why?
    11·2 answers
  • Question 8 of 10
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!