1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pentagon [3]
3 years ago
8

The cameras picture review function allows you to look at the _ you've taken

Computers and Technology
1 answer:
xxMikexx [17]3 years ago
6 0

Answer:

Explanation:

Pictures

You might be interested in
Algorithm to print the first 10 odd numbers​
77julia77 [94]

Answer:

I have the code written in c++ but the logic will be the same you just have to change the syntax ( if you're writing different language)

Explanation:

please mark brainliest

4 0
3 years ago
.When might you want to use static IP addressing?
nikitadnepr [17]

Answer:

You might use static ip addressing when your network will be small and you don´t have plans to create a bigger network from this.

Explanation:

When you use static ip addressing you have to configure the routes between hosts manually, is easy to define this rules manually when your network is small because you know all the addresses and the routes to configure. But if your network is bigger and you didn´t know all the host addresses will take a long time to configure this manually.

4 0
3 years ago
In the secure development lifecycle, how must the specific security needs of software being developed be defined?- Coding phase
Karo-lina-s [1.5K]

Answer: Requirements phase

Explanation:Requirement phase in the SDL(secure development life-cycle) is the phase where the security is fused with integrity part for any product. This mechanism is done to know about the requirement of the product in the security field. This is done to achieve the completeness in the product and to recover the mistakes that had happened earlier in the product due to security issues.

Other phase given in the option are for making the code, designing the model of product and testing the products aspects respectively.

4 0
3 years ago
Which wireless technology has a typical transfer rate of 1 Mbps to 3 Mbps at distances up to about 10 meters?
PtichkaEL [24]

Answer:

Bluetooth

Explanation:

Bluetooth is a wireless technology which has a transfer rate of 1 Mbps to 3 Mbps that to up to the distance of 10 meters.

In 2000's Bluetooth was used to exchange data without using wires or cables over short distances.

Nowadays it is not used to exchange data.There are more faster technologies present to do that now.But it is still popular to devices like speakers,headphones etc which can be connected by Bluetooth without using wires.

It uses UHF radio waves.

5 0
4 years ago
A forwarded message ____.
nadya68 [22]

Answer:

C. does include the email addresses of previous recipients and senders

Explanation:

When using email services, you can see functions such as send, forward, reply, reply all. For forwarded messages, when a user tries to forward a message to a recipient, it does not include the email address of previous recipient and senders because the aim of forwarding is to send to new recipients and hence it does not have anything to do with previous senders or recipients.

4 0
3 years ago
Other questions:
  • A customer has contacted you to help him alleviate the large amount of time and effort that goes into adding and removing users
    12·1 answer
  • When you are duplicating an object, what does the Rows field number tell you?
    10·1 answer
  • Can someone explain a cylinder
    7·1 answer
  • Describing Editing Task
    6·1 answer
  • __________ is a protocol used by e-mail clients to download e-mails to your computer.
    14·1 answer
  • Creating a Graphical User Interface in Java
    11·1 answer
  • WILL GIVE BRAINLIEST
    15·1 answer
  • A web designer finds out after the launch that one of the external links did not have "http://' and therefore the link appeared
    6·1 answer
  • 1. Who is known as the father of a computer?​
    12·2 answers
  • at the command prompt, type ls -l myscript and press enter. what permissions does the myscript file have? next, type bash myscri
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!