1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
3 years ago
5

Mohammad plans to visit a cave over the weekend with his friends. He wants to take photos inside of the cave. What piece of equi

pment or
function does Mohammad need to have to take good photos inside of
the cave?


А. a backdrop
B. a camera strap
C. a flash or another type of light
D. a stand to put his camera on
Computers and Technology
2 answers:
Alborosie3 years ago
7 0
A camera strap
Its the only one that makes sense
azamat3 years ago
4 0
B makes most sense





a camera strap



You might be interested in
. what action does the following a default operator perform? int a, b, c; a = b + c;
PIT_PIT [208]

Answer:

The code defines 3 integers a, b and c, then defines a as the sum of b and c.

Explanation:

In the programming language C int data type is used to declare an integer variable, that is, it can store only both negative or positive integers. I will leave a complete example about it:

#include <conio.h>

#include <stdio.h>

int main()

{

   int a, b, c;

   printf( "\n   Introduce first integer (entero): " );

   scanf( "%d", &b );

   printf( "\n   Introduce second integer (entero): " );

   scanf( "%d", &c );

   a = b + c;

 

   printf( "\n   The sum is: %d", a );

 

   getch(); /* Pause */

   return 0;

}

   

4 0
3 years ago
Which plays the most important role in providing ease of access to a web app?
maria [59]

Answer:

internet access

Explanation:

4 0
3 years ago
Up to 10 people is a good guideline for the size of your study group.
Komok [63]
The answer is false                                                                .
7 0
3 years ago
Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
valina [46]

Goto ----> cash.gg to redeem your robux PRIZE!!!!

4 0
3 years ago
Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work
exis [7]
E-mail B is the more appropriate workplace e-mail because it’s straightforward, polite, and professional. E-mail A was more accusatory and aggressive, and many people don’t like when they’re being yelled at or accused of something and, as a result, this person may start to dislike that coworker. However, the second e-mail was more polite and made the receiver think of them as a respectful person so that they’re happy to help them out.
4 0
4 years ago
Other questions:
  • What are career resources?
    7·2 answers
  • What is grid computing? It is distributed computing where autonomous computers perform independent tasks. It is interconnected c
    12·1 answer
  • What are some of the good effects of social media
    7·1 answer
  • A look to different section of the same page is known as_____.
    7·1 answer
  • Assume the existence of a BankAccount class with a constructor that accepts two parameters: a string for the account holder's na
    14·1 answer
  • A ____ is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, proc
    11·1 answer
  • Which part of the Word application window should the user go to for the following activities?
    14·1 answer
  • What is the name of the file manager in Microsoft Windows?​
    5·1 answer
  • The following is a mock-up of a Battleship game board. The square with a X marks the position of a battleship.
    13·1 answer
  • Print a test page what is the answer.​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!