1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
3 years ago
11

You should avoid “S” curves in your photographs. True or False?

Computers and Technology
1 answer:
WINSTONCH [101]3 years ago
5 0

Answer:

The answer to this question is false.

Explanation:

The S-curve is the natural curve of some object. S-curve is a line or path of the image that curves backward and onward horizontally. we can proceed vertically as much similar to the word S. It is exactly like the letter S. It is not a bad thing. So the S curve is not avoiding in the photographs.  

You might be interested in
Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
borishaifa [10]

Based on the information given the data should be stored in flash memory.

<h3>What is flash memory:</h3>

Flash memory is a memory storage space that is used to store data or information on a computer.

Flash memory is vital as it help to retain information or data that are stored on a computer after power is removed which inturn means that store data can be retrieve when needed.

Example of flash memory are:

  • CompactFlash  
  • Memory Stick
  • BIOS chip etc

Inconclusion the data should be stored in flash memory.

Learn more about flash memory here:brainly.com/question/6835146

7 0
2 years ago
Use conversion tool to convert the binary numbers to decimal.
Neko [114]
It’s real my easy you can use a calculator or an online converter. Or division

(111001)₂ = (1 × 2⁵) + (1 × 2⁴) + (1 × 2³) + (0 × 2²) + (0 × 2¹) + (1 × 2⁰) = (57)₁₀

(1100000)₂ = (1 × 2⁶) + (1 × 2⁵) + (0 × 2⁴) + (0 × 2³) + (0 × 2²) + (0 × 2¹) + (0 × 2⁰) = (96)₁₀

(1010101)₂ = (1 × 2⁶) + (0 × 2⁵) + (1 × 2⁴) + (0 × 2³) + (1 × 2²) + (0 × 2¹) + (1 × 2⁰) = (85)₁₀

(1001000)₂ = (1 × 2⁶) + (0 × 2⁵) + (0 × 2⁴) + (1 × 2³) + (0 × 2²) + (0 × 2¹) + (0 × 2⁰) = (72)₁₀
7 0
2 years ago
Read 2 more answers
Ftp is a _________ that is utilized to copy and manage files over the internet
Marizza181 [45]
<span>Ftp is a network protocol that is utilized to copy and manage files over the internet.  </span>FTP<span> is widely </span>used<span> for transferring </span>files<span> between computers </span>over<span> a TCP/IP-based network, such as the </span>Internet<span>.</span>
5 0
4 years ago
List and briefly describe passive and active security attacks.
Rama09 [41]

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

4 0
3 years ago
A constructor can be overloaded with more than one function which has the same name but with what two different things
andreyandreev [35.5K]
<h2>Answer:</h2>

i. Number of parameters

ii. Type of parameters

<h2>Explanation:</h2>

When there are two or more constructors, definitely with the same name, in a given class, then the constructors are said to be overloaded. An overloaded constructor appears declared many times in a class but each time with different number of parameters and/or type of parameters.

For example, given a class Test, the following combination of constructors can exist;

i. public Test(int x){

   

 }

ii. public Test(String m){

     

  }

iii. public Test(int a, String b){

 

}

<em>The following should be noted;</em>

In the case of combination (i) and (ii), the constructors have the same number of parameters but different type of parameter. In other words, they both have 1 parameter but while the first one has a parameter type of <em>int</em>, the second has a parameter type of <em>String</em>.

In the case of combination (ii) and (iii), the constructors have different number of parameters and of course different type of parameters. In other words, the second constructor has 1 parameter of type <em>String</em> while the third constructor has 2 parameters of types <em>int</em> and <em>String</em>.

5 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • What is imagined risk
    12·1 answer
  • The first widely adopted windows product, ____, featured a standardized look and feel, similar to the one made popular by apple'
    11·1 answer
  • Write the function "zipper". the function will take two array/list/table parameters and return a new array/list/table which will
    15·1 answer
  • What are the advantages and disadvantages of malware maintenance?
    12·1 answer
  • Why is it a mistake to put email addresses of people who don't know each other in the "To:" field?
    8·2 answers
  • Which of the following is not a method for opening Word software?
    8·2 answers
  • Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
    9·1 answer
  • Which option best explains the goal of computer science?
    9·1 answer
  • 1. What are the advantages and disadvantages of technology in communication?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!