1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
9

Define Rule Of Thirds

Computers and Technology
1 answer:
Katena32 [7]3 years ago
6 0

Answer:

In photography, the rule of thirds is a type of composition in which an image is divided evenly into thirds, both horizontally and vertically, and the subject of the image is placed at the intersection of those dividing lines, or along one of the lines itself.

You might be interested in
Write the HTML code to make the text "Learn Magic" link to a page called "magic-tricks.html".
Sedaia [141]

Answer:

Explanation:

Distract the audience from the real code by pretending to use silly faces, gestures, or different ways of asking the question as a code. Do the trick two or three times, then stop so the audience doesn't guess your secret. You can also talk to your assistant again and come up with a different code for next time.

4 0
4 years ago
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
nevsk [136]
Here is a Python program:

tmp = input().split(' ')
c = tmp[0]; s = tmp[1]
ans=0
for i in range(len(s)):
if s[i] == c: ans+=1

# the ans variable stores the number of occurrences
print(ans)
5 0
3 years ago
Free wifi is typically offered on _ network
Marina CMI [18]

Free Wi-Fi is typically offered on public network

8 0
3 years ago
Read 2 more answers
Discuss the five challenges that limit the use of computer in remote places in Africa​
Alchen [17]

The first challenge is that there is not electric conection.So the computer won't be able to function.Also there will be noone who will be able to use it due to the lack of education.Plus there will not be internet connection , limitting the abilities of the computer to the very basics.In addition there will not be any tools or spare parts in order to fix a computer.Finally even if thete were spare parts there woul not be someone able to gix the computer.

I hop I was helpful.Let me know if you need anything else.

3 0
3 years ago
What process does a system use to officially permit access to a file or a program CIS 502 ?
ipn [44]

Answer:

Authorization                                

Explanation:

Authorization is a security process to determine access levels related to system resources such as files, services, computer programs, data and application features. This is the method of allowing or denying access to a resource which enables the user to get access to various services and resources depending on the user's identity.

Authorization is the process that checks if a user has the permission to get access to a particular file or perform a particular action, ensuring that user has successfully authenticated himself. It refers to defining access policy.

For example a system administrator determines for the system device, in multi-user computer systems, which users are granted access to system and its resources and privileges are granted.

4 0
3 years ago
Other questions:
  • How do you do this question?
    7·1 answer
  • Write a program that reads in the length and the width of a rectangular yard.
    5·1 answer
  • Please write a Java program.
    8·1 answer
  • Which tool allows multiple users to dynamically update a document at the same time? Question 3 options: Google Docs OneDrive Exc
    14·1 answer
  • Importance of availability of mobile devices content that is of interest for users.
    12·1 answer
  • Write the definition of a function named fscopy. This function can be safely passed two fstream objects, one opened for reading,
    11·1 answer
  • Brody is concerned that he is going to exceed the quota set for his mailbox. Where should he go to access the Mailbe
    10·1 answer
  • Anybody wanna be friends?
    10·2 answers
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
  • What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!