1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
6

Ally is taking a photograph of her friend. What is the orientation of her phone's screen?

Computers and Technology
1 answer:
In-s [12.5K]3 years ago
8 0

Answer:

portrait

Explanation:

?

You might be interested in
Which TWO of the following are input devices that are parts of a laptop computer?
vampirchik [111]

Answer:

Mouse and Keyboard.

3 0
3 years ago
Read 2 more answers
1 Explain the difference between using a computer program and programming a computer.
Zanzabum
Well when you are using a computer program you are using a program. If you are programming a computer you are making the computer do a desired task. 
7 0
3 years ago
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
Murljashka [212]

Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack.

<h3>What is downgrade security attack?</h3>

A downgrade attack is known  to be a kind of of cyber attack that is made up of the fact that an attacker is known to often forces a network channel to make a switch to a kind of an unprotected or one that is said to be less secure data transmission standard.

Note also that the  Downgrading of a given protocol version is said to be a key element of  a type of a  man-in-the-middle attacks, and it is known to be one that is often used to take or hijack encrypted traffic.

Hence, Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack

Learn more about Downgrade attack from

brainly.com/question/24304791

#SPJ1

3 0
2 years ago
_____ creates a border or space that separates information.
KATRIN_1 [288]
A. Padding
*************
7 0
3 years ago
An important piece of a project is past due date.
bixtya [17]
Budget and time is the answer
4 0
3 years ago
Read 2 more answers
Other questions:
  • Please draw a diagram of a complete graph with 5 vertices (K5), its adjacency matrix and adjacency list representations.
    13·1 answer
  • ____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other
    9·1 answer
  • At age 16 Cheyanne just got her drivers license
    5·2 answers
  • An application needs to calculate sales tax for purchases. You decide to simplify the code by putting the sales tax calculation
    9·1 answer
  • If you want to change the smart quote settings, what steps should you follow to find them?
    5·1 answer
  • About how long did it take to photograph Daguerre's photograph of the street?
    7·1 answer
  • What are the process of boots up a computer?​
    15·2 answers
  • SeleCT all correct text​
    5·1 answer
  • A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.Wha
    8·1 answer
  • Put these numbers in order from smallest to largest:<br> 1. 00101112<br> 2. 011110<br> 3. 011110112
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!