1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
2 years ago
11

Laura is photographing her son’s baseball game. What ISO setting should she use?

Computers and Technology
1 answer:
zmey [24]2 years ago
7 0

Answer:

C High

Use a fast ISO setting on a digital camera when taking baseball photos, often professional photographer for baseball need to shoot with extremely high ISOs such as 1600, 3200, even 6400.

Explanation:

Professional sports photographers use shutter speed 1/1000 of a second to stop motion. and on today's camera that had the use of the perception of excess noise on cameras, which means noise has been virtually eliminated from today's cameras, so you'll get best result with higher ISO setting.

Learn More:

If you’re interested in learning more about photographs we recommend you to also take a look at

How are 3D photographs taken brainly.com/question/2879609

#LearnWithBrainly

You might be interested in
Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
Zanzabum

Answer:

/*

Student: Hugo Meza

Date: February 15, 2019

Description: This program mimic the cat command from Linux. Checks whether the source file

has the right permissions, and then writes in the console its content.

*/

#include <stdio.h>

#include <fcntl.h>

#include <unistd.h>

#include <errno.h>

int hasPermission(char *filepath){

int returnval;

// Check file existence

returnval = access (filepath, F_OK);

if(errno == ENOENT){

printf ("%s does not exist\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n", filepath);

return 0;

}

// Check read access

returnval = access (filepath, R_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

// Check write access

returnval = access (filepath, W_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

return 1;

}

int main(int argc, char* argv[]){

if(!argv[1]){

printf("Error. Specify file to open\n");

return 0;

}

int fd;

char *fp = argv[1], content[fd];

if(hasPermission(fp) == 0)

return 1;

fd = open(fp, O_RDONLY);

int bytes = read(fd,content,sizeof(content)-1);

write(1, content, bytes);

close(fd);

return 0;

}

Explanation:

7 0
3 years ago
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
Agata [3.3K]

Answer:

The answer is "ICANN"

Explanation:

In the given question some information is missing, that is option, which can be described as follows:

A) IAB

B) ICANN

C) W3C

D) ISOC

It manages the installation and processes of multiple databases concerning the Network domain and  provides a stable and safe networking service, and wrong choices were explained as follows:

  • IAB, It provides a protocol to manage IETF, that's why it is wrong.
  • W3C is used in web development.
  • ISOC is used to provide internet accessibility.
6 0
3 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
2 years ago
A computer scientist from the 1960's who developed the mouse, computer networking, and used a small musical keyboard to control
PIT_PIT [208]
Steve Jobs im pretty sure
7 0
3 years ago
Who are the key players in the internet
Anna007 [38]
Gamers my dude, dank memes are also the internet's finest minds
4 0
2 years ago
Other questions:
  • Consider the following scenario: "You are an assistant to the accounting manager for a small company that sells sports equipment
    5·1 answer
  • Writenames of eight output device.​
    8·1 answer
  • It is important to ____ the line in the code editing window in the exact location where you want to insert a code snippet to pro
    10·1 answer
  • What percentage of people with internet access use emojis?
    11·1 answer
  • A computer processes data using only 1s and 0s true or false?
    9·2 answers
  • Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
    10·1 answer
  • Please answer that and i'll gave you branlliest
    15·1 answer
  • Which of the following is not an operating system a) boss b) window xp c) linux d) bindux​
    15·1 answer
  • How can i find these services
    10·1 answer
  • My assignment asks me to write a python program using if, elif, and else that takes a user's salary and calculates the tax based
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!