1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
14

True or false a mirrorless camera has a pentaprism

Computers and Technology
2 answers:
inessss [21]3 years ago
7 0

Answer:

No the pentaprism or pentamirror are both optical viewfinder viewing systems and are not part of the mirrorless camera. Some thing the pentaprism actually operates better than the electronic viewfinder of mirrorless cameras.

Explanation:

Licemer1 [7]3 years ago
3 0
False, I think it’s false
You might be interested in
Why is cyberbullying so devastating to many people beyond just the victim?
Lynna [10]

Answer: If the situation goes undetected, it can lead to serious situations, self-harm, and damaged relationships. According to Superintendent Alex Geordan, some common long-term effects of cyberbullying include depression, low self-esteem, unhealthy addictions, trust issues, and poor mental health.

6 0
3 years ago
You hear someone make the following comment: "A blueprint is a design for a house. A carpenter can use the blueprint to build th
max2010maxim [7]

Answer:

The answer is "classes are the blueprints"

Explanation:

According to the class definition, it is a collection of data members and member methods, in which all the data members can't return any value, and member methods or functions return a value.

  • In this question, the carpenter uses the blueprint to build the house, if he uses class and object model.
  • This model also known as an entity blueprint, which sets the properties and functions with an object type.
4 0
4 years ago
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
3 years ago
in a typical e-mail address, the "host" is A. an account designated by a user name B. CPU processor 2500 C. the receiver of an e
NISA [10]
The correct answer is A! :)
5 0
3 years ago
Read 2 more answers
Which is a method used to determine database requirement?
Ivahew [28]

Answer:

I think it would be A, good luck!

8 0
3 years ago
Other questions:
  • Write a one-line program to output the following haiku.
    11·2 answers
  • Which type of view is created from the following SQL statement? CREATE VIEW balancedue AS SELECT customer#, order#, SUM(quantity
    15·1 answer
  • A client is asking for a printing solution that will print three sheets of paper with identical information on each page with a
    13·1 answer
  • In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism b
    7·1 answer
  • A printer is displaying no images on its LED panel. What can a technician do to troubleshoot the situation? Choose two answers.
    6·1 answer
  • What wireless networking standard provides the best performance at the farthest edge of its reach
    8·1 answer
  • Draw the resistor’s voltage and current phasors at t=15ms. Draw the vectors with their tails at the origin. The orientation of y
    5·2 answers
  • Which tab should you click if you want to access the Show All Comments option in a worksheet?
    13·2 answers
  • ওয়ার্ড প্রসেসিং এ একটি সাধারন ডকুমেন্ট প্রিন্ট করার পদ্ধতি বর্ননা কর?answered
    8·1 answer
  • Instruction: weird I know (~ ̄³ ̄)~
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!