Answer:
D. Wide angle
Explanation:
Wide angle camera is specifcally designed to shrinks the image using the lens with smaller focal length compared to average camera.This type of camera is commonly used to capture wider area of scenery. Or to give an impression that the objects that near the camera seems larger than they actually are.
Answer:
c. Cloud computing
Explanation:
Cloud computing -
It refers to the on - time need of the computer resource , in order to store data , computing power by the user , is referred to as cloud computing.
It refers to the availability of the data centers to the user .
This method enables the sharing of resources .
Hence, from the information of the question,
The correct option is c. Cloud computing .
It effects it until it is refilled to its normal amount
Answer:
a) Yes
b) Yes
c) Yes
d) No
e) Yes
f) No
Explanation:
a) All single-bit errors are caught by Cyclic Redundancy Check (CRC) and it produces 100 % of error detection.
b) All double-bit errors for any reasonably long message are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.
c) 5 isolated bit errors are not caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit since CRC may not be able to catch all even numbers of isolated bit errors so it is not even.
It produces nearly 100 % of error detection.
d) All even numbers of isolated bit errors may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.
e) All burst errors with burst lengths less than or equal to 32 are caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit. It also produces 100 % of error detection.
f) A burst error with burst length greater than 32 may not be caught by Cyclic Redundancy Check (CRC) during the transmission of 1024 bit.
Cyclic Redundancy Check (CRC) does not detect the length of error burst which is greater than or equal to r bits.
Answer:
The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security
Explanation:
The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security.
The reason the answer is B is because if access is provided through a hierarchy, it will give access to all the users at the higher manager role for the records of every executive. Also the options provided do not state clearly if Grant access using hierarchy is also checked so we cant assume that.