1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SpyIntel [72]
3 years ago
15

1. What are the advantages and disadvantages of the digital darkroom as compared to a regular darkroom?

Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
5 0

Answer:

2.unsourced material may be challenged and removed. Layers are used in digital image editing to separate different elements of an image.

You might be interested in
97. How many bits is a ki obyte?<br> a. 1000<br> b. 1024<br> c. 8192<br> d. 8124<br> 5
Basile [38]

Answer:

b

1024

is the correct answer

6 0
3 years ago
Read 2 more answers
Driver's ed I need help
UkoKoshka [18]
The second one I believe 
8 0
4 years ago
Read 2 more answers
Convert decimal number into binary numbers (265)10<br>​
Ksenya-84 [330]

Answer:

HELLOOOO

Alr lets start with steps by dividing by 2 again and againn..

265 / 2 = 132 ( rem = 1 )

132 / 2 = 66 ( rem = 0 )

66/2 = 33 ( rem = 0 )

33/2 = 16 ( rem = 1 )

16/2 = 8 ( rem = 0 )

8/2 = 4 ( rem = 0 )

4/2 = 2 ( rem = 0 )

2/2 = 1 ( rem = 0 )

1/2 = 0 ( rem = 1 )

now write all the remainders from bottom to up

100001001

is ur ans :)))

7 0
3 years ago
Jamie Lee is beside herself knowing that the thieves had unauthorized use of her debit/ATM card. What is Jamie's financial respo
Rama09 [41]

Jamie's financial responsibility for the unauthorized use is dependent on how fast she report the theft of her debit/ATM card.

Since Jamie Lee is dealing with an unauthorized use of  her ATM or debit card,  she ought to  act quickly so as  to avoid full liability for unauthorized charges since her card was stolen.

According to Federal laws and bank policies, Under the Federal Electronic Fund Transfer Act, the following  liability applies:

  •  $0 if she  reports the theft of the card immediately before any unauthorized charges are made.
  • She would be charged up  to $50 if she  notifies  the bank within two business days after she  realized the theft.
  • She would be charged up to $500 if she fails to notify the bank within two business days after the theft  but does notify the bank within 60 days after her  bank statement is mailed to her with a list of  the unauthorized withdrawals.
  • She wold be charged unlimited charges if she  fails to notify the bank within 60 days after her bank statement is mailed to her listing the unauthorized withdrawals.

From the polices applicable, It is necessary that Jamie Lees  notifies the bank or card issuer of the theft as soon as possible so as not to incur much financial responsibilites for the unauthorised use.

Read on to learn about  unauthorized use debit/ATM card: brainly.com/question/21485510

8 0
2 years ago
Machine language—0s and 1s—would be very difficult for a programmer to write in; thus a low-level (second-generation) language,
adelina 88 [10]

Answer:

Assembly Language.

Explanation:

Machine Language:- It is the lowest level programming language.It represent that the data in the form of 1's and 0's it is like this because the machines understand only binary or 1's and 0's.

Assembly Language:-It is the second generation of programming language.It can be used by a programmers to write program using abbreviations and basic words instead of binary numbers.

5 0
3 years ago
Other questions:
  • How are information systems used at the industry level to achieve strategic advantage? By enforcing standards that reduce the di
    8·1 answer
  • Which unique address is a 128-bit address written in hexadecimal?
    13·1 answer
  • You are connected to a server on the Internet and you click a link on the server and receive a time-out message. What layer coul
    12·1 answer
  • Why is it so important to have employees who can critically think?
    7·2 answers
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • Where is the start frame delimiter found in the Ethernet frame
    9·1 answer
  • A user creates a GPO. What do you need to do for that user to manage his or her GPO that he or she created?
    12·1 answer
  • What can be used to help diagnose and fix network connection problems?
    8·1 answer
  • Find the error in the following code fragment. int a: System.out.print(a):​
    12·1 answer
  • Please help me!! (two questions)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!