1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
14

Which folder does the ipad saves my pictures?

Computers and Technology
2 answers:
Stolb23 [73]3 years ago
7 0
When you take a photo, the photo is saved to the Photo Gallery, and you can see the picture from there.
saw5 [17]3 years ago
4 0
It will save it in the pre-installed iphotos application.
Hope this helps. <span />
You might be interested in
Which is the short structure that Redis provides for the compact representation of Sets?
Svetllana [295]

Answer:

Answered below

Explanation:

Redis provides a short structure representation for the Sets data structure, called Intset.

Intsets reduce the data size and presents short sets as a sorted array of integers. This provides an advantage of fast performance during sets operations and also low overhead.

Redis always uses inset representation so long as the set size is smaller than the configured size.

6 0
3 years ago
You have enabled IP routing on PLABSA01 after enabling the IPRouter in the registry. How will you verify whether the IP routing
drek231 [11]

Answer:

By typing ipconfig at the command prompt

Explanation:

To check if an ip router is enabled in a registry, simply do the following:

1. launch your command prompt from accessories in your windows start button

2. Type this command IPconfig

3. Strike the enter button on the keyboard

It will display the various pack of upload and download indicating how packages are routed.

4 0
3 years ago
Which adaptation of eap utilizes eap-mschapv2 inside of an encrypted tls tunnel?
cluponka [151]

Main Answer:

<h3>which adaptation of eap utilizes eap mschapv2 inside of an encrypted tls tunnel? <u>protected (EAP)</u></h3>

sub heading:

what is meant by protected( EAP)?

Explanation:

1.The protected extensible authentication protocal also known as protected (EAP).

2.transport layer security tunnen

Refference link :

https//brainly.com

Hashtag:

#SPJ4

7 0
2 years ago
Write a C++ program to find if a given array of integers is sorted in a descending order. The program should print "SORTED" if t
LenKa [72]

Answer:

The cpp program for the given scenario is as follows.

#include <iostream>

#include <iterator>

using namespace std;

int main()

{

   //boolean variable declared and initialized  

   bool sorted=true;

   //integer array declared and initialized

   int arr[] = {1, 2, 3, 4, 5};

   //integer variables declared and initialized to length of the array, arr

   int len = std::end(arr) - std::begin(arr);

       //array tested for being sorted

    for(int idx=0; idx<len-1; idx++)

    {

        if(arr[idx] < arr[idx+1])

           {

               sorted=false;

            break;

           }

    }

    //message displayed  

    if(sorted == false)

     cout<< "UNSORTED" <<endl;

 else

    cout<< "UNSORTED" <<endl;

return 0;

}

OUTPUT

UNSORTED

Explanation:

1. An integer array, arr, is declared and initialized as shown.

int arr[] = {1, 2, 3, 4, 5};

2. An integer variable, len, is declared and initialized to the size of the array created above.

int len = std::end(arr) - std::begin(arr);

3. A Boolean variable, sorted, is declared and initialized to true.

bool sorted=true;  

4. All the variables and array are declared inside main().

5. Inside for loop, the array, arr, is tested for being sorted or unsorted.  The for loop executes over an integer variable, idx, which ranges from 0 till the length of the array, arr.

6. The array is assumed to be sorted if all the elements of the array are in descending order.

7. If the elements of the array are in ascending order, the Boolean variable, sorted, is assigned the value false and for loop is exited using break keyword. The testing is done using if statement.

8. Based on the value of the Boolean variable, sorted, a message is displayed to the user.

9. The program can be tested for any size of the array and for any order of the elements, ascending or descending. The program can also be tested for array of other numeric data type including float and double.

10. All the code is written inside the main().

11. The length of the array is found using begin() and end() methods as shown previously. For this, the iterator header file is included in the program.

4 0
3 years ago
When should students practice netiquette in an online course? Check all that apply.
ser-zykov [4K]

Answer:

The answer to this question is given below in the explanation section. However, the correct answer is: student should practice netiquette in an online course when they are participating in online discussion board.

Explanation:

It is important for you as a student to recognize that the online classroom is in fact a classroom, and certain behaviors are expected when you communicate with both your peers and your instructors. These guidelines for online behavior and interaction are known as “netiquette”.

So, the correct option of this question is: students should practice netiquette in an online course when they are participating in an online discussion board. Because the discussion board is opened by the instructor/tutor, he constantly looking for student behavior throughout the discussion. so, students should use netiquette practice during the discussion in the online class.

However, other options are not correct because, in these options, there is not the presence of teacher/instructor. And, also noted that netiquette is practiced in online class by the student.  

8 0
4 years ago
Read 2 more answers
Other questions:
  • Use of the Internet for recruiting is: a. popular with job seekers, but not recruiters. b. the most commonly used search tactic
    5·1 answer
  • Advantage of realtime processing​
    14·1 answer
  • The variable named var2 declared above will include an ending NULL character.
    9·1 answer
  • PLEASE HURRY PLEASE HELP THIS CLASS ENDS TODAY AND I NEED HELP
    7·1 answer
  • 4) Short answer questions<br>c) What is Cyber Law?​
    7·1 answer
  • JAVA
    12·1 answer
  • Why do we use the internet so much?​
    6·1 answer
  • . . ........Sad + sad= very sad
    7·2 answers
  • Decrypt this secret message if your able to a lot will come..
    14·2 answers
  • When a client PC is booted, it broadcasts a __________________________ message over the network to locate DHCP servers on the sa
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!