1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
5

Samantha is looking for a lens that is lightweight and small, making it easy to transport. She doesn’t care about the lens being

interchangeable nor does she need to zoom as she prefers to move physically closer to her subjects. She wants a simple lens that has the ability to produce a natural perspective. What kind of lens is likely best for Samantha?
Select one:
a. micro
b. zoom
c. telephoto
d. prime
Computers and Technology
2 answers:
irina1246 [14]3 years ago
7 0

Answer:

The correct option is;

d. Prime

Explanation:

A prime lens is a unifocal, or fixed-focal-length lens and it is referred to as the opposite of a zoom lens

The maximum aperture of ranges from f2.8 to f1.2, which are fast and have a creamy rendering of light that are out of focus, and also provide crispy image details, by making the most use of the light available and provide distinct combination of foreground and background images in pictures that give a crisp and visually pleasing appearance.

Troyanec [42]3 years ago
5 0

Answer: c

Explanation:

You might be interested in
Explain what might happen if two stations are accidentally assigned the same hardware address?
Firdavs [7]

Answer: If two different station are addressed with the same hardware address then there are chances of occurrence of the failure in the network at irregular intervals.The failure or error will occur because of the both the devices are seen as one by the network due to same address.

An intelligent network system id used ,it can identify the error can help in the prevention of the failure.Other option for configuring the situation is assigning the MAC(media access control)address to devices which are unique in nature thus, no device can have same address.

5 0
3 years ago
This is used in a program to mark the beginning or ending of a statement, or separate items in a list:_____
hammer [34]

Answer:

B) Punctuation

Explanation:

Punctuation are greatly used in different programming languages for different purposes. In the Java, C++ and C# Programming languages for example, two popular punctuation marks are the comma (,) and semi-colon (;). The comma is used for separating elements of a list and arrays, while the semi-colon indicates end of an executable statement or line of code. Other popular punctuation marks used in programming are periods (dot), question marks, parenthesis angle brackets and braces each implementing a specific grammatical syntax in the language.

5 0
2 years ago
Which two keys are commonly used to move or insert data?.
vlabodo [156]

Answer:

control and shift

Explanation:

6 0
2 years ago
A good first step to understanding any kind of text is to :
Vitek1552 [10]

Answer:

find the main idea

Explanation:

6 0
2 years ago
A data analyst creates a data frame with data that has more than 50,000 observations in it. When they print their data frame, it
Alexandra [31]

A list is an R-object that can have a wide range of different items inside of it, including vectors, functions, and even another list.

The head() function lets you display the first observations in a data frame. The method tail() prints the final observations in your data collection in a manner similar to that. Both head() and tail() print a top line called the 'header', which contains the names of the distinct variables in your data collection. The R language's transform() function is used to alter data. The first parameter is transformed into a data frame. A suitable variable name comprises of letters, numbers and the dot or underline characters. The variable name does not begin with a number but rather with a letter or a dot.

Learn more about variable here-

brainly.com/question/13544580

#SPJ4

7 0
11 months ago
Other questions:
  • Can you subnet the 172.16.128.0/17 network address to support this subnet?
    6·1 answer
  • Explain Cascading Style Sheets and what they do. Describe their primary function, two effects that this function has on programm
    11·1 answer
  • Maya enjoys connectedWith her friends and social media apps but one of her friends post a lot of stuff that my thinks it’s annoy
    14·1 answer
  • Bullets in a text box will do which of the following?
    9·2 answers
  • Webster defines risk as "the possibility of loss or injury". Therefore, driving a motor vehicle is a risk.
    12·1 answer
  • Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp
    11·1 answer
  • What is computer code?<br> A. Java Script<br> B. XML<br> C. HTML<br> D. Any programming language
    6·1 answer
  • Write a piece of codes that asks the user to enter a month (an integer), a day (another integer), and a two-digit year. The prog
    8·1 answer
  • Leslie works in an SDLC team. When Leslie edits a file, it gets saved as an altered version. Later all the altered versions are
    9·1 answer
  • 7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!