1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alekssr [168]
3 years ago
14

One of the best ways to shoot a picture is to frame the subject in the middle of the screen or viewer. T or F

Computers and Technology
2 answers:
malfutka [58]3 years ago
4 0

the correct answer is True (T)



I hope that this helps you

and

that you have a wonderful day!

Ronch [10]3 years ago
3 0
Your answer is T for True
You might be interested in
Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. If necessary, use
aliya0001 [1]

Answer:

125.28₁₀ in hexadecimal = 7D.47AE147AE1₁₆

Step-by-Step Explanation:

To convert decimal number 125.28, we convert its integer and fraction part individually and then add them to get the equivalent hexadecimal number, as below:

To convert integer 125 to hexadecimal, follow these steps:

Divide 125 by 16 keeping notice of the quotient and the remainder. Continue dividing the quotient by 2 until you get a quotient of zero.

Then just write out the remainders in the reverse order to get the equivalent hexadecimal number.

125 / 16 = 7 with remainder 13 (D)

7 / 16 = 0 with remainder 7

Here is the answer to 125 decimal to hexadecimal number:

7D

For converting decimal fraction 0.28 to hexadecimal number, follow these steps:

Multiply 0.28 by 16 keeping notice of the resulting integer and fractional part. Continue multiplying by 16 until you get a resulting fractional part equal to zero (we calcuclate upto ten digits).

Then just write out the integer parts from the results of each multiplication to get equivalent hexadecimal number.

0.28 × 16 = 4 + 0.48

0.48 × 16 = 7 + 0.68000000000001

0.68000000000001 × 16 = 10 (A) + 0.88000000000011

0.88000000000011 × 16 = 14 (E) + 0.080000000001746

0.080000000001746 × 16 = 1 + 0.28000000002794

0.28000000002794 × 16 = 4 + 0.48000000044703

0.48000000044703 × 16 = 7 + 0.68000000715256

0.68000000715256 × 16 = 10 (A) + 0.88000011444092

0.88000011444092 × 16 = 14 (E) + 0.080001831054688

0.080001831054688 × 16 = 1 + 0.280029296875

Here is the answer to 0.28 decimal to hexadecimal number:

0.47AE147AE1

Therefore, decimal number 125.28 converted to hexadecimal is equal:

7D.47AE147AE1

5 0
3 years ago
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
1 year ago
The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi
bija089 [108]

Answer: Query

Explanation:

The Search Criteria is entered and any when a related Query is logged, it speedily bring out the linked details for exploration.

5 0
3 years ago
What is the output of the following program?
Minchanka [31]

Answer:

the answer is t

Explanation:

7 0
3 years ago
Any changes done to the software during the operational phase of the software before project wind up is called as maintenance. S
ruslelena [56]

Any changes done to the software during the operational phase of the software before project wind up is called as maintenance is a false statement.

<h3>What are operational phases?</h3>

The operational phase is known to be that phase in course of the making or construction where a given flow of the stresses is known to be mad in the medium via which the tunnel advances that is deviated.

Hence, Any changes done to the software during the operational phase of the software before project wind up is called as maintenance is a false statement because any change that is made to the software after it is deployed is known as maintenance.

Learn more about software from

brainly.com/question/28400365

#SPJ1

5 0
1 year ago
Other questions:
  • Bit rate is a measure of how many bits of data are transmitted per second. Compared to videos with a higher bit rate, the same v
    13·1 answer
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • List and explain the error in the code
    14·1 answer
  • The amount of data produced worldwide is increasing by ___% each year.
    5·1 answer
  • These items describe guidelines for the effective use of presentation graphics. Graphics should be large enough to be seen by th
    9·1 answer
  • Justin has started a lawn mowing business in his neighborhood. He is running a weed-pulling special this month. What is the most
    8·2 answers
  • Last bittttt of points
    8·1 answer
  • How do you loop a makebeat in earsketch
    11·1 answer
  • write a program that asks the user for a month number and displays the number of days that month has?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!