1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
2 years ago
6

A photographer stores digital photographs on her computer. In this case the photographs are considered the data. Each photograph

also includes multiple pieces of metadata including:
Date: The date the photograph was taken
Time: The time the photograph was taken
Location: The location where the photograph was taken
Device: Which camera the photo was taken with
Which of the following could the photographer NOT do based on this metadata?
Computers and Technology
1 answer:
vichka [17]2 years ago
3 0

Answer:

Filter photos to those taken of buildings

You might be interested in
__________ is a Microsoft software development tool that developers can use to write multimedia applications
ohaa [14]

answer:

DirectX.    

hopefully this is helpful.

6 0
2 years ago
Which method do software testers use to isolate new code from the rest of the network during the test stage of the software deve
disa [49]

Answer:

Sandboxing.

Explanation:

SDLC or software development life cycle is a systematic approach to software development. It marks the birth and death of an application.

The application development starts from the research of the properties of the application to the design and development or implementation of the application.

After the implementation of the software, it is tested, comparing the design and the codes in the development process. The sandboxing testing process helps to isolate and test new lines of code added during the testing phase.

3 0
3 years ago
6
Lisa [10]

Answer C in the paragraph group on the home tab

8 0
2 years ago
One of the biggest risks involved in using e-mail is
Maurinko [17]
The best answer to the question that is being presented above would be letter d. One of the biggest risks involved in using electronic mail or e-mail is the amount of junk mail you get from unsolicited, spamming, and phishing e-mail addresses.
8 0
3 years ago
Read 2 more answers
What single word could be used to describe the importance of software design??
Eddi Din [679]
<span>abstraction possibly </span>
5 0
3 years ago
Other questions:
  • Identify the function for the following computer part: Printer Question 23 options: Input
    6·1 answer
  • A machine is classified as a compound machine if it?
    8·2 answers
  • "As a ____ database management system, Access is particularly powerful because you can enter data once and then retrieve informa
    6·1 answer
  • Write a program in java that reads each line in a file, reverses its characters, and writes the resulting line to another file
    15·1 answer
  • Which image shows organic shapes? <br> A. image 1 <br> B. image 2 <br> C. image 3 <br> D. image 4
    14·2 answers
  • Difference between ancient and modern mode of information <br> transmission
    12·1 answer
  • 14. Which of the following information about the ESRT T-teen rating rating is FALSE?
    15·1 answer
  • Please help I really need it :(
    12·1 answer
  • Rita tried unsuccessfully to open a PDF file attachment in her Inbox by double-clicking the attachment in the Reading Pane. What
    8·1 answer
  • which responses would you use for a computer or electronic medical record outage? (select all that apply)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!