1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
14

A professional photographer working for a top newspaper would like control over the quality and editing

Computers and Technology
2 answers:
Arlecino [84]3 years ago
4 0

Answer: raw

Explanation: got a 100%

Anna007 [38]3 years ago
3 0

Answer:

RAW

Explanation:

raw usually gives you the best quality possible and its easy to go through the editing process with flexibility compared to the other options.

You might be interested in
Richard is shopping online and has to enter a password to access his bank account. Which method attribute will securely submit h
kotykmax [81]

Answer:

password

Explanation:

It is certainly the password method attribute, and this can enable Richard to securely submit the credentials. If we set the method attribute or input type as a password, then the password is sent in the encrypted form, and it remains secure. And hence, the password cannot be copied by anybody, and it remains safe. This is the characteristic of a secure web form. And remember we are dealing with an HTML form.

6 0
3 years ago
Read 2 more answers
How are engineers are related to technology
vichka [17]
Engineering is the application of knowledge and technology is the body of knowledge:)
4 0
3 years ago
Which Traffic Source dimensions does Google Analytics automatically capture for each user who comes to your site?A. Source, Keyw
LenaWriter [7]

For each user who comes to your site the google analytics automatically capture the traffic source dimensions Source, Medium, Campaign name.

<u>Explanation:</u>

Source:

  • There cannot be any reference to a website without an origin source.
  • The source is basically the origin of your traffic such as a search engine (google) or a domain (ex: Twitter).

Medium:

  • Every referral to a website also has a medium along with the source.
  • examples are -:  unpaid search, "cost per click", referral, mail.

Campaign name:

  • The campaign Name is the name referring to the google ads campaign.
5 0
4 years ago
What does N represent when analyzing algorithms?
Mademuasel [1]

Answer: "N" is considered as the size of the input that is being given in the algorithm.

Explanation: During a problem solving process , a algorithm is used to analyze the problem . Many function and  steps are to be taken care of while analyzing algorithm. Among analyzing step, input is also given which is usually zero more than that . An input has a certain size which is given by the initial "N".  The input size defines the length of the string for the input.

4 0
3 years ago
Cyberstalking is an example of a:
babunello [35]

Answer:

A cyber crime

Explanation:

Cyberstalking is a type of cybercrime that uses the internet and technology to harass or stalk a person. It can be considered an extension of cyberbullying and in-person stalking.

7 0
2 years ago
Other questions:
  • Why is knowledge of percent composition important in the mining process?
    7·1 answer
  • Which of the following corresponds to the computer interface technology that uses icon, etc?
    6·1 answer
  • Explain the design and development proccess?
    15·1 answer
  • Which option offers predesiged formatting and design elements to facilitate the process of creating a document?
    8·1 answer
  • What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans
    11·2 answers
  • Two good guidelines for good readability on a website are ______ (choose two)
    14·1 answer
  • Briefly explain what are JavaScript librairies​
    12·1 answer
  • Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.
    7·1 answer
  • Write a program that allows the user to input a total dollar amount for an online shopping order and computes and outputs the sh
    14·1 answer
  • A(n) __________ looks and acts just like a publicly accessible website and uses the same software, hardware, and networking tech
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!