1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madam [21]
2 years ago
11

What type of photography is represented by a photograph of a dog on a beach ?

Computers and Technology
1 answer:
yan [13]2 years ago
6 0

Answer:

• portrait photography

• nature photography

Explanation:

First identifying the subject of the photograph. The image shows a dog on the beach, therefore the subject is the dog. Since the picture is of a dog, it represents what is known as ‘Pet Photography.’ This type of photography is part of several different categories in ‘Portrait Photography.’

Because the dog is on a beach, and a beach is a part of nature, the photograph also represents nature photography.

In conclusion, a photograph of a dog on a beach represents portrait photography and nature photography.

You might be interested in
When was the first analog device, the phonautograph, launched?
Nataly_w [17]

Answer:

1860

Explanation:

4 0
2 years ago
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
_____ create computer programs by using their knowledge of computer science, math, and other disciplines.
zimovet [89]
B.) Software designers
5 0
3 years ago
HELPPP
Westkost [7]

Answer:

D. 30 or more

Explanation:

All other ones are canceled out ad the score adds 10.

7 0
3 years ago
To save a presentation, tap or click the save button on the Blank
frozen [14]
If this is a true or false statement then the answer is true unless you have it on automatic save 
4 0
3 years ago
Other questions:
  • It is a good idea to use more than one typeface in a document when _____.
    8·2 answers
  • Can you please help on number 1 and 2?
    13·1 answer
  • Write an SQL statement to list the Name of employees who have worked on a property in New York .
    7·1 answer
  • How does a linear algorithm perform compared to a quadratic one on our imaginary race track?
    5·1 answer
  • Which process centers the spreadsheet's content on the page?
    15·1 answer
  • Which term is used in object-oriented programming to reference characteristics of an object?
    15·1 answer
  • What is a hardware device that allows you to connect to several computers and other devices to a single internet connection
    6·1 answer
  • Write a C function named apply_all that expects two arrays of integers and their sizes and dynamically allocates a new array of
    7·1 answer
  • How can we avoid falling victim to a phishing or pharming scheme
    14·1 answer
  • A friend of mine had a samsung j2 phone and someone with a iphone placed something in her phone she thought was malware in her p
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!