1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
14

Digital cameras have electronic sensors that record information to create pictures. What acronym refers to the sensitivity

Computers and Technology
1 answer:
stira [4]3 years ago
5 0

Answer:

ISO

Explanation:

You might be interested in
. Why should we favor programming to interfaces over implementations?
xenn [34]

Answer:

Interfaces are way to use full abstraction.That;s why it is preffered over implementations.

Interfaces are just like class.But the methods declared inside an abstract class are by default abstract and the variables are by default static,final.Which is not the case with classes in classes the variables can be static or non- static ,fincal or non-final and methods can be abstract or non-abstract.

Java classes does not support multiple inheritance but interfaces support multiple inheritance.So whenever we want to implement multiple inheritance in Java we use interfaces.

4 0
3 years ago
Which of these is true of blackhat and whitehat hackers?
earnstyle [38]

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

5 0
3 years ago
Read 2 more answers
A security administrator has replaced the firewall and notices a number of dropped connections. After looking at the data the se
Nata [24]

Answer:

The correct answer is Option(A) i.e., An SQL injection attack is being

attempted.

Explanation:

In this given question some information is missing and is not the complete question. The missing is given as :

SELECT * FROM and ‘1’ = ‘1’

Which of the following can the security administrator determine from this?

A. The SQL injection attacked is being attempted.

B. An Legitimated connections is being dropped.

C. The network scan are being done by the system.

D. An attack of XSS is being attempted.

Now, coming to the answer "The security administration sees that an SQL injection is attempted while it notices a lot of connection dropped and has replaced with the firewall and will be the possible issue flagged on it, SQL injection is a type of injection that possibly executes harmful or malicious statements and effects any website or web application".

Hence the correct answer is Option A.

5 0
3 years ago
Write 3 functions in the starter code below such that: add_to_dict(): takes a dictionary, a key, a value and adds the key,value
shepuryov [24]

Answer:

Required code is given below:

Explanation:

def add_to_dict(dictt, key,value):

if key in dictt.keys():

print("Error. Key already exists.")

else:

dictt[key]=value

return dictt

def remove_from_dict(dictt,key):

try:

dictt[key]

dictt.pop(key, None)

return dictt

except KeyError:

print("No such key exists in the dictionary.")

def find_key(dictt,key):

try:

value=dictt[key]

print("Value: ", value)

except KeyError:

print("Key not found.")

4 0
3 years ago
What is the answer of this Q?
Inga [223]

Answer:

Because of refraction.

Explanation:

Light coming from fish passes through two medium, one is water and another is air. As the density of medium is changing from high to low, the light bends away from the normal. So to the human eyes, the fish appears to be above its actual position.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which process refers to starting up a computer?
    15·2 answers
  • How to change your phone number t mobile?
    5·1 answer
  • Which is the main function of the arithmetic and logic unit (ALU)?
    5·2 answers
  • Can some one please help The term career is usually applied to a what PLEASEEEEEEEEEEEE HEEEEELLLLLPPPPP MEEEEEE
    7·1 answer
  • Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then prel
    8·1 answer
  • Question 4 (Worth 5 points)
    14·2 answers
  • Write Python code to convert miles to kilometers. This does not need to be written in a Python function, but it should use the i
    8·2 answers
  • Design a base class, Road, with the following members:
    13·1 answer
  • Tip of advice on brainliest.You can copy and paste the question then search it in the search bar because i can guaranty that som
    14·1 answer
  • T<br> N<br> O<br> ?<br> You can insert only the row<br> only to<br> True or false
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!