1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeu [11.5K]
3 years ago
11

In order to take excellent photographs, you must start by understanding the basic anatomy of your camera. Grab your camera and l

ist the basic features and parts of your specific camera (including lens, battery, flash, shutter, and display)—make sure to also list the brand and model camera that you have. For each feature and anatomical part of your camera that you list, provide a brief explanation of where it is located and what it does.
Computers and Technology
2 answers:
Dovator [93]3 years ago
8 0

Answer:

the middle back part

Explanation:

bagirrra123 [75]3 years ago
3 0

Answer:

its in the back  in the middle helping it make the photo come out clear

Explanation:

You might be interested in
Examples of email use that could be considered unethical include _____.
AfilCa [17]

Answer:

"Denying receiving an e-mail requesting that you work late "

"Sending a quick message to your friend about last weekend "

"Sharing a funny joke with other employees"

Explanation:

Based off of the questions, I assume it means while you are at work. If you're at home or something, all of these are fine.

3 0
3 years ago
Read 2 more answers
Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What pr
goldfiish [28.3K]

Answer:

By keeping track of file links and deleting them along with the files

Explanation:

when different users create different files with the same name, and one tries to open one of the files, the first file that is found on the VTOC of the disk will be opened. These problems can be avoided by  tracking of all links to a file, and whenever there is a need to delete a file,  the link to the file as well should be deleted.

8 0
4 years ago
les agrees to install a new hard drive and software on marilee's computer in exchange for four of her used textbooks. after he i
WARRIOR [948]

Marilee can sue for breach of contract, because Les had a preexisting duty to do all of the work.

What is hard drive ?

The physical device that houses all of your digital stuff is a hard disk. Digital stuff that is kept on a hard drive includes your papers, photos, music, videos, applications, application preferences, and operating system. There are internal and external hard drives.

What is software?

Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context.

What does running program means?

Double-click the executable file or the shortcut icon pointing to the executable file on Windows to start the program. If you find it difficult to double-click an icon, you can highlight it by clicking it once and then using the Enter key on the keyboard.

Learn more about hardware and software click here:

brainly.com/question/24231393

#SPJ4

8 0
1 year ago
An event that can be observed and studied and is difficult to explain or understand is called _____.
Natalka [10]
D) a phenomenon.
It's real, there it is. There is no current explanation for it, but there it is...
3 0
3 years ago
Read 2 more answers
what option can be used to create vpn connections that can be distributed to users' computers so that vpn clients do not have to
IRINA_888 [86]

This option can be used to create virtual private network (VPN) connections that can be distributed to users' computers so that VPN clients do not need to be configured on each client station is a VPN connection profile.

Users can send and receive data over shared or public networks as if their computer equipment were physically connected to a private network using a virtual private network (VPN), which extends the private network over the public network.

Increased functionality, security, and private network administration are all benefits of a VPN. It is often used by remote workers and allows access to resources that are not available on the public network. Although not an essential part of a VPN connection, encryption is often used.

By using dedicated circuits or tunneling protocols over existing networks, a VPN can be created by creating a virtual point-to-point connection.

To know more about VPN click here:

brainly.com/question/28945467

#SPJ4

6 0
1 year ago
Other questions:
  • List the different generation of computers with its main component​
    8·1 answer
  • A ____________ is a set of commands which can be run by calling it by name. (Phyton)
    7·2 answers
  • All of the following are examples of roadblocks to achieving a goal except
    12·2 answers
  • A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an a
    12·1 answer
  • true or false? spreadsheets provide more options for graphical representation of the data than databases​
    6·1 answer
  • Which line of code will only allow a non-decimal point to be stored in a variable? candyCost = float(input("How much is the cand
    10·2 answers
  • Which of these Logic Statement's are correct for the following diagram? *
    5·1 answer
  • Which of the following is the best way to add a lengthy explanation to Excel data without being limited to cell sizes and restri
    5·1 answer
  • When companies charge different prices for the same product, they're using
    12·1 answer
  • Use a slicer to filter the data in this table to show only rows where the Category value is Coffee or Meals
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!