1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pantera1 [17]
3 years ago
8

Which of the following apertures will give you the shallowest depth of field?

Computers and Technology
1 answer:
Angelina_Jolie [31]3 years ago
5 0

Answer:

a.2.8

The f-stops work as inverse values, such that a small f/number (say f/2.8) corresponds to a larger or wider aperture size, which results in a shallow depth of field; conversely a large f/number (say f/16) results in a smaller or narrower aperture size and therefore a deeper depth of field.

You might be interested in
How can you efficiently restrict the read-only function of a requesting SNMP management station based on the IP address?
mezya [45]

Answer:

Place an ACL on the line when configuring the RO community string.

Explanation:

Controlling Access via SNMP

SNMP is a protocol used by network management systems to monitor and control network-attached devices. Ciscoworks, HP Openview, and other management stations all use SNMP.

SNMP access can be granted on a network device in two ways—read-only and read-write. Read-only access allows the management station to poll the device for statistics and other information, but it does not allow anything to be changed. Read-write access allows the management station to make changes to the configuration of the device.

It's obviously a good idea to make sure you trust the devices allowed to make changes to your configuration, but some versions of SNMP use only a simple shared password to permit access. To make this more secure, an ACL can be applied, which limits the source IP addresses that can use SNMP.

8 0
3 years ago
In the ADT graph the methid addVertex has efficiency
sweet-ann [11.9K]

Answer:

In ADT graph the efficiency of addVertex has efficiency O(logn).

Explanation:

The time complexity of the method addvertex in ADT graph is O(logn). addVertex method has time complexity of O(logn) because it has to divide the list in half and add the vertex according to the place where the needs to be added.

hence we conclude that the answer is O(logn).

6 0
3 years ago
The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interl
Archy [21]
<span>The answer is mpeg-4.  The most commonly used video formats are the mpeg-4 format, the windows media audio/video format, and the audio visual interleave format.</span>
8 0
4 years ago
Algorithm and flowchart to find the perimeter and area of square​
kupik [55]

Answer:

I can give you the perimeter "algorithm" but not the flowchart.

Here you go:

p = w * 4

p = perimiter,

w = width/height

4 = the amount of sides needed.

perimeter = width * 4

to include both width and height, we would instead use:

perimeter = 2(width+height)

This also works with rectangles ^

--------------------------------------------------------------------------

To find an area, it is just width * height. This is also compatible with rectangles.

4 0
3 years ago
Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
lbvjy [14]

Answer:

Algorithm:

1. Declare an integer variable N.

2. Read the value N from user.

3.While(N):

 3.1 find r=N%10;

 3.2 print r in new line.

 3.3 Update N as N=N/10.

4.end program.

Implementation in C++.

// header

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int N;

cout<<"Enter an Integer:";

   cin>>N;

// find the digits of number

   while(N)

   {

       // last digit

       int r=N%10;

       // print last digit

       cout<<r<<endl;

       // update the number

       N=N/10;

}

return 0;

}

Output:

Enter an Integer:329                                        

9                                                          

2                                                          

3

7 0
3 years ago
Other questions:
  • What considerations have to be kept in mind with JPEG
    10·1 answer
  • In which step of web design is storyboarding helpful?
    14·1 answer
  • How is this fictional tex in the people could fly different from the nonfictional text​
    12·2 answers
  • A lookup field allows the user to select from a list of values when updating the contents of a field. true or false.
    11·1 answer
  • 2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
    15·1 answer
  • Information about hardware engineers?
    9·1 answer
  • Which software manages the functioning of the entire computer system<br>​
    7·2 answers
  • Is iphone battery being draned if plugged into car charger when listening to podcasts
    6·1 answer
  • Which of the following is a productivity strategy for collaboration?
    9·1 answer
  • Please answer the following question in Verilog.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!