1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmasim [6.3K]
4 years ago
5

15

Computers and Technology
2 answers:
valina [46]4 years ago
7 0

Answer:

B.

shutter priority mode

Explanation:

Shutter Priority, which is mentioned as S on the mode dial, and the mode is  the time value, and is demoted as Tv, that points out to the setting in different forms of cameras that allows all to select a particular shutter speed, and as meanwhile the camera balances the aperture to ensure correct exposure in the image.

patriot [66]4 years ago
3 0

Answer:

The best answer is "A"

Aperture priority mode

Explanation:

Aperture priority mode: aperture priority mode is used when shooting long exposures, combined with a low ISO in low light, a small aperture like f/20 will create a longer exposure, helping to blur the moving subjects.

Shutter priority mode: It's a setting that allows the user to choose a specific shutter speed while the camera adjusts the aperture to ensure correct exposure automatically.

Automatic exposure bracketing: process whereby a camera automatically takes two or more exposures but with different exposure values simultaneously.

You might be interested in
kayah has created a website that explains what her business does. what type of computer program is needed to access/view kayah's
soldier1979 [14.2K]

Answer:

web browser

Explanation:

A web browser is a program that allows users to view and explore

information on the World Wide Web.

8 0
3 years ago
Read 2 more answers
. Reorder the following efficiencies from smallest to largest:
alexdok [17]

Answer:

The order of the efficiencies is as following:-

10,000 < 2n < nlog(n) < n5 < n!.

Explanation:

10,000 is constant time whatever will be the size of the problem the efficiency will remain the same.

2n this efficiency is linear it will grow proportionally as the size of the problem increases.

nlog(n) this efficiency is is a bit greater than 2n though it will grow faster than 2n but slower than n2 as the size of the problem increases.

n5 this efficiency is very poor.It is growing very rapidly as the size of the problem increases.

n! is the worst efficiency of them all.

n!=n*(n-1)*(n-2)*(n-3)*(n-4)*.......2*1.

It will grow beanstalk in jack and the beanstalk.

3 0
3 years ago
"ikev2 requires the use of which of authentication protocol?"
katen-ka-za [31]
Ikev2 requires the use of authentication protocol called Extensible Authentication Protocol (EAP).  It is <span>is a protocol for wireless networks that ampiflies on the authentication methods for the Point-to-Point Protocol (PPP).</span>
4 0
3 years ago
When determining the cost of an item, the seller will often analyze the demand as well as the supply before setting the price of
juin [17]

Answer:

The price of a commodity is determined by supply and demand. therefore the answer is COMMODITY. that other person is wrong

7 0
3 years ago
Which binary signaling technique uses a scheme in which zero voltage represents a 0 bit and the voltage for a 1 bit does not dro
prisoha [69]

Answer:

In binary signaling, Non Return to Zero (NRZ) is the technique in which zero voltage is represented by 0 bit while high voltage is represented by 1 until the voltage level change from high to low.

Explanation:

There are different techniques to encode the signal for transmission between transmitter and receiver. These techniques includes return to zero, non return to zero. In return to zero technique, the if the voltage is high the signal will become 1 for half of the time period and then after half time period it return to 0.

In NRZ the signal is 0 if the voltage level is zero. In case of high voltage of the signal the binary bit remains 1 until the next zero voltage level arrive in the signal until the end of the time period of bit.

6 0
4 years ago
Other questions:
  • Each​ _____ in a relational database table is a unique record of something that users want to track.
    14·1 answer
  • TCP will guarantee that your packets will arrive at the destination, as long as the connection is still established. True False
    11·1 answer
  • How can I change it to accepted file types: .ppt, .pptx, .xls, .xlsx, .doc, .docx, .zip, .pdf, .accdb, .msg on Inkscape?
    15·2 answers
  • Technology offers a variety of rich opportunities available to teachers and students. According to Inan and Lowther (2010), ther
    6·1 answer
  • Write a function that takes an integer value and returns the number with its digits reversed. for example, given the number 7631
    10·1 answer
  • What keyboard functions lets you delete words
    9·2 answers
  • Write a function in Java to implement the following logic:
    13·1 answer
  • Does anybody know how to fix my Minecraft??? My character isn’t loading and realms aren’t working?? Look at the picture!
    5·1 answer
  • Anyone know the friends song by Marshmello? It's stuck in my head.
    12·2 answers
  • HELP ME ON THIS PLEASE ILL GIVE BRAINLY!!!! If U GET IT RIGHT !!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!