1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marin [14]
3 years ago
12

You are on vacation with your family and have been nominated to be the family photographer. You have a 13.1-megapixel camera. Wh

at image file format should you use to save your photos to maximize image quality and minimize file space?
Computers and Technology
2 answers:
In-s [12.5K]3 years ago
8 0

Answer:

b on edge

Explanation:

Alex3 years ago
7 0

Answer:

Jpeg

Explanation:

You might be interested in
Marissa is designing a web page that features lessons on how to build cabinets. how can she make the page most engaging for the
aleksklad [387]
I am pretty sure it’s B because that’s the only answer that really correlates to teaching people how to build cabinets
3 0
3 years ago
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
Which statement reflect a culture that value collectivism
Morgarella [4.7K]

Answer: To be honest i believe its D. All of the above reflect collectivism

hope this helps :)

8 0
4 years ago
5: what privacy issues have arisen with webcams in mobile devices?
AnnZ [28]

What are the privacy issues that have arisen with webcams and mobile devices? People secretly record and broadcast other people without their permission.

3 0
3 years ago
Determine if the following identifiers are valid. If they are invalid, state the reason. For example, the identifier min value i
Natasha2012 [34]

Answer:

Explanation:

Determine if the following identifiers are valid. If they are invalid, state the reason. For example, the identifier min value is invalid as it uses a whitespace.

road

mid_point

8ball

break

_log_value

EVERY1

[email protected]

_log

NewNumber

$varA

class

4 0
3 years ago
Other questions:
  • Which version represents the video project after the assembly cut has been completed, transitions and special effects have been
    9·1 answer
  • What does TSOn stand for?
    8·2 answers
  • Ergonomia este știința care studiază ....
    6·1 answer
  • Complete the crossword puzzle.
    12·2 answers
  • Generally, the more secure the system, the less usable it becomes. <br> O True O False
    9·2 answers
  • A user brings a technician a mobile device that has no sound. What should a technician check for first?
    5·1 answer
  • How many characters should a strong password have? four six eight ten
    10·2 answers
  • Who wont me???????????????
    6·2 answers
  • Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, the
    9·1 answer
  • Question #2
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!