1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreev551 [17]
3 years ago
5

FOR DIGITAL DESIGN/ PHOTOGRAPHY

Computers and Technology
2 answers:
zysi [14]3 years ago
6 0

Answer:

Its D DLSR and Mirrorless

Explanation:

Tell me if you get it wrong or right :3

zhuklara [117]3 years ago
4 0
It’s D I think!
Sorry if wrong!
Hope this helps!
You might be interested in
What is the Most popular game out today?
belka [17]

Answer:

Roblox

Explanation:

People over a million people are playing that game FAM!!!

7 0
3 years ago
Read 2 more answers
Over the past year alone, more than _________ have been stolen from Target.
jasenka [17]
40 million (google said so)
6 0
3 years ago
Read 2 more answers
A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more
Varvara68 [4.7K]
The answer is C) Availability.

Although the company is addressing scalability by adding more servers, the question is asking for security requirement. Therefore we need to choose one of the principles from CIA triad which includes confidentiality, integrity, and availability.

Integrity involves keeping the data accurate and confidentiality involves keeping the data between the sender and intended recipient(s). That being said, scalability and availability are the possible answers.

C) Availability is the best answer because it is part of the CIA triad.

Note: Another resource to look at for cyber security principles would be the Parkerian Hexad.
5 0
3 years ago
Read 2 more answers
Which of the following is the fastest way to open an Access database? a. Right-click the database icon. b. Start Access from the
STALIN [3.7K]

Answer:

C. Double-click the database icon.

5 0
3 years ago
Read 2 more answers
What are the methods used in research methodology?
earnstyle [38]
Experiments. ...
Surveys. ...
Questionnaires. ...
Interviews. ...
Case studies. ...
Participant and non-participant observation. ...
Observational trials. ...
Studies using the Delphi method.
5 0
2 years ago
Other questions:
  • Hi <br> What exactly does this project want from me?thanks for riding
    5·1 answer
  • Find every number from 1 to n (inclusive) that is a palindrome which starts with the digit 3. Do not user a helper function.
    10·1 answer
  • A way to minimize technical problems with your computer
    14·1 answer
  • Stress results from _______. A. Outside stimulus b. Internal stimulus c. Outside calm d. Internal calm
    12·2 answers
  • What error occurs when you perform an illegal math operation such as divide by zero
    13·1 answer
  • What term is used to refer to the way companies collect and process data in order to create new information to make important bu
    13·1 answer
  • A commercial depicts a teenager on a skateboard vandalizing a brick wall. This is an example of:
    11·2 answers
  • The operating system’s application programming interface (API) provides software developers with tools they use to build applica
    5·1 answer
  • Firefox, Chrome, Opera, and Safari are examples of
    15·1 answer
  • To create a program in Scratch, you need to think systematically about the order of steps. This is known as
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!