1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
12

What can macro mode on a camera be used for?

Computers and Technology
2 answers:
il63 [147K]3 years ago
7 0

Answer:

The Macro mode is a setting on your camera that you can use to take close-up pictures of small objects such as insects or flowers.

The high pixel density and resolving power of these cameras' sensors enable them to capture very high levels of detail at a lower reproduction ratio than is needed for film or larger DSLR sensors

AleksandrR [38]3 years ago
6 0

Answer:

taking photos of small things or a close up.

Explanation:

great for taking photos of bugs or flowers, it's very helpful

You might be interested in
Determine which system you would recommend each of the customers use based on their provided user and system specs.
Ratling [72]

Answer:

Hope this helps pls mark brainiest

Explanation:

<h2> </h2><h2>So we know Student B is gonna get a computer, but its not stated if its A desktop or laptop. hmm,.. So ima do both for the desktop he would what a computer with "Ethernet Storage Fabrics: 25GbE, 50GbE" because If he going to do videos in todays standers it would be in 4k and 8k. he would also need at least 16 of ram if not 32gb. and since he has no cap budget I would personally go for the i9, but he can go for the i7, not much of a fan of the i5 for video productive, for storage he would need a lot for video editing or other stuff so I would go for the main boot (sys) a  and for the actually storage for the videos I would go for a  with good rpm. For  I would go for something with 8-10 or higher.</h2>

7 0
2 years ago
How to make text icome one word at a timen filmora
bezimeni [28]

You would want to add multiple text slides.

I hope this helps as the wording of the question was unclear.

8 0
2 years ago
Write a recursive method named binarySearch that accepts a sorted array of integers and an integer target value and uses a recur
djyliett [7]

Answer:

10

-1

Process finished with exit code 0

Explanation: see code bellow

public class BinarySearchRecursive {

   public static int binarySearch(int[] a, int key) {

       return binarySearchRecursiveHelper(a, key, 0, a.length - 1);

   }

   public static int binarySearchRecursiveHelper(int[] arr, int target, int start, int end) {

       if (start > end) {

           return -1;

       }

       int mid = (start + end) / 2;

       if (arr[mid] == target) {

           return mid;

       } else if (target < arr[mid]) {

           return binarySearchRecursiveHelper(arr, target, start, mid - 1);

       } else {

           return binarySearchRecursiveHelper(arr, target, mid + 1, end);

       }

   }

   public static void main(String[] args) {

       int[] a = {-4, 2, 7, 10, 15, 20, 22, 25, 30, 36, 42, 50, 56, 68, 85, 92, 103};

       int index = binarySearch(a, 42);   // 10

       System.out.println(index);

       index = binarySearch(a, 66);   // -1

       System.out.println(index);

   }

}

6 0
3 years ago
An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the req
Ronch [10]

Answer:

applications

Explanation:

In an information system, applications or software are indispensable. This is because the entire data/info processing pipeline running on daily basis have been digitized. Users are heavily rely on the applications to gain and store new data, to manage and process the data and to deliver the necessary output. The applications enable the entire data processing work become more efficient, systematic and also more secure.

7 0
3 years ago
In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
NemiM [27]

Answer : The securtiy of the password can be maitained by the shadow files such as:-

  • max is for the days that represent that the same password can be used without the need for changing it  
  • min is for the days that represent waiting days before the changing of password after he/she gets a new password
  • warn are the days that come with Waring sign that the password is going to expire soon.

For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.

4 0
3 years ago
Other questions:
  • Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.
    6·2 answers
  • When an IRET instruction is executed, what actiontakes place?
    5·1 answer
  • If someone receives a shock, or a piece of equipment is throwing sparks or arcing you should try to pull them away from the sour
    7·1 answer
  • What is another name for a central processing unit? Computer Integrated circuit Microprocessor Transistor
    9·2 answers
  • Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an in
    13·2 answers
  • A device receives a Transmission Control Protocol (TCP) packet. The device understands where the actual data payload begins. Whi
    15·1 answer
  • When you write Click a picture in a word processing program which actions can you choose to perform on the image
    6·1 answer
  • 1. Insert a Header that has the following in excel​
    14·1 answer
  • 9.18 LAB: Exact change - methods Write a program with total change amount as an integer input that outputs the change using the
    11·1 answer
  • Have some points part 6<br>anyone know how to change my username?​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!