1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maurinko [17]
2 years ago
5

Photographing during the midday can produce which of the following?

Computers and Technology
2 answers:
deff fn [24]2 years ago
5 0
It can produce harsh shadows
Strike441 [17]2 years ago
3 0

Answer:

Harsh Shadows

Explanation:

You might be interested in
To protect a computer, it is a good idea to install and frequently run
Triss [41]

Answer:

anti virus software

Explanation

did the quiz :)

5 0
3 years ago
Read 2 more answers
Jason works for a restaurant that serves only organic, local produce. What
sergeinik [125]

Answer:

green buisness

Explanation:

8 0
3 years ago
Read 2 more answers
The Technology Librarian asks you to find out how many hops it takes to get to the first Wi-Fi kiosk. What Windows command can y
V125BC [204]

Answer:

The number of routers arrived in the path of a packet from sender to receiver are called hops. It is term used usually in computer networking.

<u>Command Used to find Hops</u>

In windows command prompt is used to find the number of hops.

1. In Command Prompt type "<em>tracert</em>" after host name and IP address of destination.

<u>Hardware devices Represented by Hop</u>

The main devices that is counted as hop in networking is <em>Router</em>. Nut Sometimes many devices such as <em>switches, repeaters and access points</em> are also count as hops. It depends on the configuration and role of the devices.

8 0
2 years ago
Which method do software testers use to isolate new code from the rest of the network during the test stage of the software deve
disa [49]

Answer:

Sandboxing.

Explanation:

SDLC or software development life cycle is a systematic approach to software development. It marks the birth and death of an application.

The application development starts from the research of the properties of the application to the design and development or implementation of the application.

After the implementation of the software, it is tested, comparing the design and the codes in the development process. The sandboxing testing process helps to isolate and test new lines of code added during the testing phase.

3 0
3 years ago
Which activity is performed during high-level design in the V-model?
SVETLANKA909090 [29]

Answer:

understanding component interaction

4 0
2 years ago
Other questions:
  • What is the acronym for computerized command provides weather by microphone clicks?
    8·1 answer
  • You may nest while and do-while loops, but you may not nest for loops<br><br><br><br> True False
    10·1 answer
  • Place the steps in order to link and place text into the document outline, effectively creating a master document.
    8·1 answer
  • Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
    10·1 answer
  • A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on use
    11·1 answer
  • Can somebody help me with this please
    6·2 answers
  • Also have a good day people !!
    5·2 answers
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
  • Q3: What do you mean by a pointer to a pointer? Can this be extended?
    10·1 answer
  • For quantitative data (e.g. the number of milligrams of a drug) coding your data involves?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!