1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
6

What tips or techniques should you keep in mind when shooting photographs on a rainy day?

Computers and Technology
1 answer:
SashulF [63]3 years ago
7 0
Simple: Keep your camera protected from the rain

Here are some tips for photographing during rainy day: 1) Use image stabilization or tripod.
2) Choose a larger aperture.
3) Change the object on which you focus.
4) Have a well-defined center of interest.
5) Review all images.
6) Use exposure compensation.

You might be interested in
In a singing competition, there are 34 more men than women
djverab [1.8K]

Answer:

94 women are there

Explanation:

it is easy subtraction you only have to 128-34

4 0
3 years ago
Read 2 more answers
What is the impedance mismatch problem? Which of the three programming
kykrilka [37]

Answer:

The problem that created due to the difference in the model of programming language and the database model.

Explanation:

The practical relational model has three components which are as follows

1. Attributes

2. Datatypes

3. Tuples

To minimize this problem  

1. We switch low pass L-Network to high pass L-network

2. We switch high pass L-Network to low pass L-network

3. We use the impedence matching transformer

3 0
4 years ago
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
3 years ago
Hjnjjjhhbbfg66ui998876dch
GalinKa [24]
What is your question? I’ll try my best to help
4 0
3 years ago
Someone plzzzz help me
IgorC [24]

Answer:

Data base

Explanation:

Database holds all your information.

8 0
3 years ago
Other questions:
  • 1. Create a view named customer_addresses that shows the shipping and billing addresses for each customer.
    15·1 answer
  • X2/3-2x1/3-35=0
    14·1 answer
  • What is wrong, logically, with the following code? if (x > 10) System.out.println("Large"); else if (x > 6 && x &l
    11·1 answer
  • Most licensing agencies offer an orientation meeting for applicants who want to obtain licensing for a child care facility or a
    12·2 answers
  • Which of the following functions does a browser perform?
    7·2 answers
  • How are clustering and Network Load Balancing similar?
    13·1 answer
  • What are factors that limit a technological design
    11·2 answers
  • In an information systems framework, ________ is the bridge between the computer side on the left and the human side on the righ
    14·1 answer
  • What is the awnser ?
    11·1 answer
  • Write a chemical reaction to show that nitric acid contains nitrogen​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!