1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nignag [31]
3 years ago
6

UDAL Pretest: Using Digital Cameras 15 Select the correct answer. Which mode of shutter speed helps to capture creative effects

such as star trails? O A. Fluorescent O B. Bulb OC. Incandescent O D. Night Mode Reset Next please help me​

Computers and Technology
1 answer:
Nikitich [7]3 years ago
4 0

Answer:

It isn't A

Explanation:

I'm taking the same class, good luck.

You might be interested in
List three things that scientists learned about earth beginning in the 1800s
Nataly [62]
They learned the earth was much older than they had previously thought.
Gradual processes changed the earth's surface.
Fossils could tell the age they came from.
8 0
4 years ago
In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
algol13

Answer:

One of the biggest social media giants has faced many such security and privacy risks in the past 3 years. 10 are listed below:

1. No one can forget the New Zealand attack on the mosque, and it was telecast live via it. And that is certainly a security risk. And if someone is able to stream live, the AI is in question definitely as this cannot be telecast.

2. Can you forget the various US shooting cases in the past 5 years? And many out of them where telecast lives on it. Again the AI, and the authentication is in question.

3. Many evils have many times advertised itself through it, and that is a security risk. This put up the question on the Data Scientists of the company.

4. It's a huge data on it, and many users have been able to misuse it, and that is a security risk. This put up the question mark on the application of the Big Data.

5. Once, the UK parliament questioned it to sell the secret data, and that was a privacy risk.

6. An Engineer was caught negotiating to sell secret users data to a third party, and that is a privacy risk as well as a question on management technology, as its possible now to check these kind of frauds.

7. Its accounts have been hacked many times, as well as millions of user-profiles, were stolen. This is a security and privacy risk.

8. Its data is still not safe as evils have proved they can break the authentication. However, it has reacted well, and they look like being a safe destination now.

9. Once, someone from Russia was caught collecting a lot of data from it. That was a security and privacy risk. And surely if someone is uploading a lot of complicated and confidential data, must be checked through proper AI implementation.

10. In India too there have been claims that a lot of personal information during elections 2014 was sold. That was a security and data risk. And the data scientists were proved vulnerable again. Its quite sure hence, a lot of work has to be done in Data Science and Artificial intelligence still.

However, its owner is one of the finest souls on earth. He donated all his money when he was blessed with a child. Some out of his team cheated, and else some technology failure or the huge amount of data was the reason for the fault. However, other companies are also facing such problems. And hence, he cannot be blamed for this. And the company now definitely has recovered from the nightmare that they faced in the past 3 years.

Explanation:

The answer is self explanatory.

8 0
3 years ago
Scenario2: Now suppose the LAN must support both voice and data and you must choose one of these multiple access strategies in o
AleksandrR [38]

Answer:

The RTP (real time protocol) which uses the UDP ( user datagram protocol) and Real-time control protocol.

Explanation:

The RTP of a voice over IP protocol (VoIP) which is used to prioritise the transfer of video and audio data over text data. It is used for video conferencing and telephony services in an enterprise.

It uses the user-datagram protocol to transfer or access videos and audio data for its real time effect and the real-time control protocol for quality of service analysis and maintenance.

4 0
3 years ago
PLEASE HELP ME!!!!
White raven [17]
The answers are D and A
5 0
3 years ago
Read 2 more answers
Which action should be done throughout the mail merge process
Wittaler [7]
C. Save and proof answe for apex. ;)

5 0
3 years ago
Read 2 more answers
Other questions:
  • 3) Write a program named Full_XmasTree using a nested for loop that will generate the exact output. This program MUST use (ONLY)
    6·1 answer
  • What is the Difference between raw_input and input?
    6·1 answer
  • Which sentence in the passage conveys the message that drones can be used in the study of history?
    11·2 answers
  • When you schedule an appointment, Outlook adds the appointment to the ____ folder by default.
    10·1 answer
  • How do you scan a qr code on your iPhone
    5·2 answers
  • Hey! Would you please help me do this program?
    14·1 answer
  • Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and
    5·1 answer
  • The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless acce
    13·2 answers
  • NEED HELP! BRAINLIEST FOR WHOEVER ANSWERS CORRECTLY FIRST!!!
    14·1 answer
  • Just a smol question how do i change my username on this?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!