1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
8

Why do photographers use umbrellas? What benefits do they offer?

Computers and Technology
1 answer:
lbvjy [14]3 years ago
3 0
The reflective surface inside of the umbrella reflects light onto the subject
 
You might be interested in
What is the mid-square method?
Rom4ik [11]

Explanation:

Mid-Square Method:-In this method some it takes some digits from the square of a number.This number is a random number.This number can be used as a key for hashing.

This technique is mostly used in hashing so decrease the collision in hash maps.

This method has  a limitation that when we square a large number it may go out of range of integer so we have handle those cases.

8 0
3 years ago
High quality pages in a task should all get the same Needs Met rating. For example, a high quality page for a common interpretat
marysya [2.9K]

Answer:

False

Explanation:

High quality page for a common interpretation always have different Needs Met rating than the high quality page for a minor interpretation of the query.

Although, both of this pages are of high quality we must differentiate the common from a minor interpretation of a query.

Needs Met should always know to place the high quality pages in a resolution hierarchy.

7 0
3 years ago
In the event that a software product fails within a predetermined. Clients use a​
Musya8 [376]

Answer:

try to update product software it will working

Explanation:add license product of a software

5 0
4 years ago
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
3 years ago
Does speedtest report megabytes per second or megabits
Lesechka [4]

that could be both *shrugging*

7 0
3 years ago
Other questions:
  • Tony Stark wants to build a 1000 meter high tower as quickly as possible. He has unlimited resources and an unlimited budget and
    8·2 answers
  • Which statement is a famous quote from Canadian Communications theorist Marshall mcluhan​
    9·1 answer
  • Effective character encoding requires:
    8·1 answer
  • Which is a good guideline to follow for adding animation to a presentation?. A. Use a different animation for each slide.. B. Us
    8·2 answers
  • ________ is/are used to temporarily hold small units of program instructions and data immediately before, during, and after exec
    11·1 answer
  • 15. A mechanism by which other modules, such as I/O and memory, may interrupt the normal sequencing of the processor is called (
    13·1 answer
  • Which factor helps drive globalization?
    9·1 answer
  • Write a c++ program that generates three random numbers. The first number should be between 0-30, the second number should be be
    7·1 answer
  • Which computer application is an example of a DBMS?
    8·1 answer
  • Crisp-DM is an open standard process model that contains stages
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!