1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
7

Why are videos blurry when sent from android to iphone?

Computers and Technology
1 answer:
mote1985 [20]3 years ago
8 0
There Android cameras are way different so the picture could be better and the graphics for iPhone ain’t that high but it also could be the other way
You might be interested in
Analyze the following code. Number[] numberArray = new Integer[2]; numberArray[0] = new Double(1.5); Question 9 options: A) Sinc
sleet_krkn [62]

Answer:

B) At runtime, new Integer[2] is assigned to numberArray. This makes each element of numberArray an Integer object. So you cannot assign a Double object to it.

Explanation:

The Number class in Java is the superclass for the numbers. Once it is set to the Integer object, the values in <u>numberArray</u> must be all integers, we know that arrays can hold one type of value in Java. Assigning a double value is not allowed in this situation.

7 0
3 years ago
What is search engine
koban [17]
Search engine is a software to help find you results over the internet.

Examples of search engines are: Google, Safari, Yahoo etc.
4 0
3 years ago
Read 2 more answers
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
Wewaii [24]

Answer:

B. Malware

Explanation:

Malware is general to most harmful programs on a computer, as Adware is a potentially unwanted program that is designed to advertise other programs or services. And ransomware is a program that will encrypt important user files such as; documents, pictures, and videos. Spyware is a program that is designed to spy on users, examples are; using your camera without your consent, key-loggers, and taking screenshots of our desktop. Thus i believe it is malware because the question covers multiple categories.

6 0
4 years ago
SOMEONE PLEASE HELP ME OUT WITH THIS!!!!!!
mario62 [17]

Answer:

C.

Explanation:

8 0
3 years ago
Read 2 more answers
In addition to explaining the paper’s topic, a thesis statement provides instructions on how to read the paper. explains why the
tamaranim1 [39]

Answer: I believe it’s explains why the paper was written!

Explanation:

Took edge 2021

8 0
4 years ago
Read 2 more answers
Other questions:
  • Where can you change your web page SafeSearch settings?
    8·1 answer
  • In mathematics, the factorial of a positive integer n, denoted as n! , is the product of all positive integers less than or equa
    10·2 answers
  • In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In thi
    8·2 answers
  • Assume the following variable definitions int a = 5, b = 12; double x = 3.4, z = 9.1. What are the values of the following expre
    7·1 answer
  • Use the _______ command to combine the selected cells and center them. merge across center across selection merge cells merge an
    7·1 answer
  • What is conference proceeding​
    10·2 answers
  • Write a Java program that prompts the user for an int n. You can assume that 1 ≤ n ≤ 9. Your program should use embedded for loo
    5·1 answer
  • Name two materials that we can burn in order to get energy from biomass
    9·1 answer
  • Can anybody answer this
    11·1 answer
  • The executive ________ is the person ultimately responsible to their company for the project's success.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!