1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ierofanga [76]
2 years ago
6

Photography Questions 100 points!!!

Computers and Technology
2 answers:
dlinn [17]2 years ago
8 0

Answer:

repeated

Add a person or frame it in a different way

Look at it from different angles

man-made

In front of you

Add color

Explanation:

Shtirlitz [24]2 years ago
7 0

Answer:

<h2><u>Fill in the blanks</u></h2><h2><u>Question 1</u> </h2>

Patterns are <u>repeated</u>  shapes, colors, tones or objects.

<h2><u>Question 2 </u></h2>

What are two things you can do to strengthen a pattern image?

-Add in a person or frame it in a different way

-Look at it from different angles and frame it in different ways

<h2><u>Question 3</u></h2>

Patterns can be <u>man - made</u> and they can be found in nature.

<h2><u>Question 4 </u></h2>

When you are looking for man made patterns in a town or city, don't forget to look i<u>n front of you</u>

<h2><u>Question 5</u></h2>

What is one technique you can use to show scale and perspective in your photo?

- <u>add color </u>

You might be interested in
Suppose 8 people want to communicate with each other using public key encryption. The communication between any pair of them is
ludmilkaskok [199]

Answer:

The answer is "64"

Explanation:

There has been 1 Private Key 1 Public Key for every person. The private key is used for other app messages. All else uses the Public Key to encrypt messages with that user. Those keys are numerically related. Even if you have 5 users, you will be given 5 Personal keys and 5 Public keys.

  • All user will have a duplicate of other public keys, which indicates (n*n-1) copies of n public keys on different systems to make sure shared contact between all users, plus n private keys.
  • The unique key count is 2n, with n^2 distributed private and public keys on different systems.
  • 8 people,  where 8 is a number, that is equal to n so, n^2 = 8^2 =8 \times 8 = 64
5 0
3 years ago
The part of the computer that contains the brain or the Central Park nursing unit is also known as
Mice21 [21]
The tower of the computer. <--- Answer

The big square thing lol.
4 0
3 years ago
An equation that performs a calculation is a formula. True or false quest
Natali5045456 [20]
This is a TRUE statements
6 0
3 years ago
I'm trying to move the figure a little away from, the column line and every time I move it and click ok it goes back to being be
Luba_88 [7]

Answer:

Try to click the center button layout.

Explanation:

8 0
3 years ago
Xercise 1<br>1.<br>What is system? Explain the components of system in brief.​
noname [10]

Answer:

A system is a collection of elements or components that are organized for a common purpose. ... A computer system consists of hardware components that have been carefully chosen so that they work well together and software components or programs that run in the computer.

Explanation:

4 0
3 years ago
Other questions:
  • Don is the superintendent of the county school system. What task might Don
    8·1 answer
  • Which protocol is often used to publish web pages to a web server?
    5·1 answer
  • If you are trying to improve your budget and spending, which option would save you the most money?
    13·2 answers
  • When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may
    5·1 answer
  • Why use LinkedIn automation for LinkedIn?
    10·1 answer
  • Which of these is an example of collective voice?
    8·2 answers
  • Match each example to the type of component, either Input, Process, or Output.
    12·1 answer
  • Which conditions make using an array a better choice than a list? Select 3 options.
    12·2 answers
  • HELP 100 points
    9·1 answer
  • What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!