1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
3 years ago
6

What are the three parts of a camera

Computers and Technology
1 answer:
son4ous [18]3 years ago
8 0

Answer: Camera lens, Film or sensors, and body.

Explanation: I researched it.

You might be interested in
When a range of ip addresses is set aside for client devices, and one of these ips is issued to these devices when they request
snow_lady [41]

When a range of ip addresses stands set aside for client devices, and one of these ips stands issued to these devices when they request one, this exists known as Dynamic Allocation.

<h3>What is an IP address?</h3>

IP address stands for “Internet Protocol address.” The Internet Protocol exists as a set of rules for communication over the internet, such as sending mail, streaming video, or connecting to a website. An IP address specifies a network or device on the internet.

An IP address stands for a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which exists as the set of rules controlling the format of data sent via the internet or local network.

A 'Client Device' may direct to any computer with access to data from another computer. In this sense, a server may sustain a network composed of numerous client devices in the form of desktop PCs, laptops, smartphones, and tablets.

Hence, When a range of ip addresses stands set aside for client devices, and one of these ips stands issued to these devices when they request one, this exists known as Dynamic Allocation.

To learn more about Dynamic Allocation refers to:

brainly.com/question/24688176

#SPJ4

8 0
2 years ago
How do I fix this stylesheet?
aalyn [17]

Answer:

i dont know

Explanation:

i m really sorry :(

6 0
3 years ago
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
3 years ago
// This pseudocode is intended to display // employee net pay values. All employees have a standard // $45 deduction from their
Vikki [24]

Answer:

C++ code is given below

Explanation:

#include<iostream>

#include <cstring>

using namespace std;

int housekeeping(string EOFNAME);

int mainLoop(string name,string EOFNAME);

int finish();

void main()

{

  string name;

  string EOFNAME = "ZZZZ";

  cout << "enter the name" << endl;

  cin >> name;

  if (name != EOFNAME)

  {

      housekeeping(EOFNAME);

  }

  if (name != EOFNAME)

  {

      mainLoop(name , EOFNAME);

  }

  if (name != EOFNAME)

  {

      finish();

  }

  system("pause");

}

int housekeeping(string EOFNAME)

{  

  cout << "enter first name " << EOFNAME << " to quit " << endl;

  return 0;

}

int mainLoop(string name, string EOFNAME)

{  

  int hours;

  int rate,gross;

  int DEDUCTION = 45;

  int net;

  cout << "enter hours worked for " << name << endl;

  cin >> hours;

  cout << "enter hourly rate for " << name << endl;

  cin >> rate;

  gross = hours*rate;

  net = gross - DEDUCTION;

  if (net > 0)

  {

      cout << "net pay for " << name << " is " << net << endl;

  }

  else

  {

      cout << "dedections not covered.net is 0.";

  }

  cout << "enter next name or " << EOFNAME << " to quit" << endl;

  cin >> name;

  return 0;

}

int finish()

{

  cout << "end of job"<<endl;

  return 0;

}

3 0
4 years ago
What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
Ainat [17]

Answer: Even though the hardware is inexpensive the writing of program is not efficient through this method as proper development of program is necessary for the clear execution due to factors like:-

  • The facility of writing program even the cost of hardware is less but it is not a free facility.
  • It also has a slower processing for the execution of the program
  • The construction of the efficient program is necessary for the compilation and execution of it rather than poorly constructed program is worthless and inefficient in working.

7 0
3 years ago
Other questions:
  • __________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, suc
    5·1 answer
  • Stacey wants to change her document to landscape view instead of portrait. Jesse wants to change the scale of his document. Whic
    11·1 answer
  • Give examples of two IP addresses (that are 100 IP addresses away from each other but the last octet is not greater than .150) t
    15·1 answer
  • Identify three different meanings of the word "interface" in Java Programing language.
    6·1 answer
  • expand and explain HTML and css. mention the role of each one in web pages imagine how a page without css will look like​
    7·1 answer
  • Which of the following is not an example of debugging? looking for errors in programming code. fixing misspelled commands in pro
    13·1 answer
  • Which type of variable has a text value
    6·1 answer
  • What happens when i expose a disk to magnetic fields?​
    5·1 answer
  • Hi, I am from India. Our brainly platform isn't so good, many of 'em keep spamming questions that I ask. US platform seems much
    9·1 answer
  • A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!