Answer:
Snapseed, Lightroom, Adobe Photoshop, Prisma, Bazaart, Photofox, VSCO and PicsArt.
Explanation:
Snapseed, Lightroom, Adobe Photoshop, Prisma, Bazaart, Photofox, VSCO and PicsArt are the best editing apps. Some of the apps are present as free while some of them are not available without paying money for it. These are the top best editing apps so you can use it anyone of it. Snapseed is free on iOS and Android whereas Lightroom needs $5 per month for full access. Adobe Photoshop is also free on iOS and Android.
Answer:
After effects or alight motion on mobile are pretty good
Explanation:
What are water proof cameras?( write in detail)
Answer:
Underwater photography is the process of taking photographs while under water. It is usually done while scuba diving, but can be done while diving on surface supply, snorkeling, swimming, from a submersible or remotely operated underwater vehicle, or from automated cameras lowered from the surface.
Underwater photography can also be categorised as an art form and a method for recording data. Successful underwater imaging is usually done with specialized equipment and techniques. However, it offers exciting and rare photographic opportunities. Animals such as fish and marine mammals are common subjects, but photographers also pursue shipwrecks, submerged cave systems, underwater "landscapes", invertebrates, seaweeds, geological features, and portraits of fellow divers
Some cameras are made for use underwater, including modern waterproof digital cameras. The first amphibious camera was the Calypso, reintroduced as the Nikonos in 1963. The Nikonos range was designed specifically for use underwater. Nikon ended the Nikonos series in 2001[1] and its use has declined, as has that of other 35mm film systems. Sea and Sea USA made the Motor Marine III, an amphibious range-finder camera for 35mm film.[2][3]
Olympus TG-3 camera and its underwater housing front view
A waterproof camera and waterproof light source setup for professional underwater photography
GoPro Hero5 action camera in underwater housing
Seaview SVII Camera using three dome ports for all round view
Cameras made for dry work can also work underwater, protected by add-on housings, which are made for point and shoot cameras, compact cameras with full exposure controls, and single lens reflex cameras (SLRs). Most such housings are specific to the camera. Materials range from relatively inexpensive plastic to high-priced aluminum. Housings allow many options: users can choose housings specific to their everyday "land" cameras and use any lens. Underwater photographers generally use wide-angle lenses or macro lenses, both of which allow close focus and therefore a shorter distance to the subject, which reduces the loss of clarity to scattering. Digital media can hold many more shots than standard film (which rarely has more than 36 frames per roll). This gives digital cameras an advantage, since it is impractical to change film underwater. Other comparisons between digital and film photography also apply, and the use of film under water has declined, as it has on land.
Explanation:
What are the uses of DVD Ram
Answer:
Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.
Software specific to user’s needs is referred to as
Answer:
Application software
Explanation:
Application software may be explained as computer programs which are designed to performs specific functions or task or a certain business, educational or social problem. Application softwares are designed to serve end users according to purpose or need. Hence, they are different from system softwares which are required to aid operation of the computer. Application softwares may include ; spreadsheet programs like Microsoft Excel, Chrome browser, Safari, Slack, Gaming softwares and so on.
For what purpose do the hackers create the zombies army?
A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks
Answer:
A. DDoS Attacks
Explanation:
A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks
E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers
Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks
While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines
A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone
_________________________ are people, places, and materials, either printed or non-printed, that can provide answers to inquiries.
Answer:
Information/knowledge resources
Explanation:
The process of looking for answers to questions that will lead to improved knowledge about a subject is known as an inquiry. The theories of enquiry includes abduction, induction, and deduction
An inquiry can provide the reasoning behind observation by making use of the theories of inquiry and sources that provide answers (information) about the (interrelated) events of the inquiry
Therefore, information and knowledge resources are the people, materials, and places, which can be in the printed, verbal, appearance form that have the capacity to proffer answers to inquiries
A current divider is to be designed using a 2mA DC current source and 1K resistors, the specification that the current is 1.5mA.
Answer:
The solution of the given query is described below throughout the explanation segment.
Explanation:
Given:
DC current,
= 2mA
Resistors,
= 1K
According to the question,
⇒ [tex]i=\frac{(1K+1K+1K)\times 2mA}{1K+1K+1K+1K}[/tex]
⇒ [tex]= \frac{3}{4}\times2mA[/tex]
⇒ [tex]=1.5mA[/tex]
write an algorithm to find perimeter of circle
Answer:
Explanation:
Algorithm:
step 1 : Start
step 2 : Read r
step 3 : POC = 2*22/7 *r POC = perimeter of circle
step 4 : display POC
step 5 : Stop
A customer in a store is purchasing five items. Write a program that asks for the price of each item, and then displays the subtotal of the sale, the amount of sales tax, and the total. Assume the sales tax is 7 percent. Display all results, properly labeled, as numbers with two digits after the decimal point.
Answer:
Program approach:-
Using the header file.Using the standard namespace I/O.Define the main function.Display the enter price of 5 terms.Explanation:
Program:-
//header file
#include<iostream>
#include<iomanip>
//using namespace
using namespace std;
//main function
int main(){
const double SALES_TAX=0.07;
double subTotal=0,total=0,taxAmount = 0,x;
cout<<"Enter price of 5 items"<<endl;
for(int j=0;j<5;j++){
cin>>x;
subTotal += x;
}
taxAmount = subTotal * SALES_TAX;
total = taxAmount + subTotal;
cout<<fixed<<setprecision(2)<<endl;
cout<<"Sub total: "<<subTotal<<endl;
cout<<"Sales Tax: "<<taxAmount<<endl;
cout<<"Total: "<<total<<endl;
}
What is a benefit of using a client/server network?
Cheap to maintain
Easy to install
Has a central, powerful computer
Unable to share files
Answer:
Has a central powerful computer
Explanation:
When operating a client - server network, a certain access mediun is created such that clients can access information, materials and services from a central computer, this poses great advantage in the area of security and control. Clients would be able to gain access from this central computer using either a local or wide area network. The accessibility provided through this powerful, central computer allows the the network to monitor what actions are being performed and make appropriate restrictions on the network, hence, preventing the invasion of malware and viruses. Hence, the central control is a great feature of a client - server network.
benefits of Internet as method of information transmission
Answer:
The Internet enables effective global communication around the world and has changed the way people socialize and consume media via social networks, and has facilitated teleworking, distance learning and e-learning. The Internet has given rise to new e-commerce companies and industries, and knocked out other traditional players, but also contributed to the development of the IT bubble and burst at the turn of the millennium. To counter piracy of music and movies over the internet, new streaming services have been developed since the 00's and cut out distribution lines. Web magazines and social media have competed with many traditional media, especially the local press, and reduced the labor market for journalists. Social media may have been a tool (but not a catalyst) for revolutions such as the Arab Spring and of significance for an explosive increase in the spread of fake news and misinformation since the 2000s. Social media is believed to have had an impact on election results, but it is debatable whether fake news has had it.
what is the basic unit of measuring storage capacity of computer?
Answer:
All data are stored on 1s and 0s computers (bits). We explain how much data we store using conditions such as kilobytes and megabytes.
Explanation:
Storage devicesAll are stored in 1s and 0s on a computer. One of only 1 0 is called 'bit' in a computer. It takes 8 1s and 0s if we save a character in a computer, so we could say it needs 8 bits to store a character.
Computer and memory storage is frequently measured in megabytes and gigabytes (GB). A medium-sized novel includes approximately 1 MB of information. One MB is 1024 kilobytes, not a million bytes, or 1,048,576 bytes (1024x1024).
Similarly 1 GB is 1.024 MB (1024x1024x1024) bytes, or 1.073.741.824 bytes.
The cultivation in mountain areas, with their scattered plots of usable land at various altitudes with different climates, landscapes and little margin for mechanization, are managed by family farms in the most efficient and effective way.
Answer:
Mountain farming
Explanation:
Mountain farming is done in hilly areas of the mountains. It is mainly family farming. The mountain farming is mainly done in the mountains where the paddy fields are scattered and the limited use of the usable lands are available.
It is cultivated in different types of climatic conditions or landscapes with limited use of mechanization or machines. The mountain farming is maintained by the family farms in an effective way.
a diagram of a flow chart to find the average of 10 numbers
Answer:
Kindly check attached picture
Explanation:
Flowchart gives a graphical representation of a steps taken towers the execution of a program.
In the flowchart attached, A variable was initialized and set to 0 ; then a for loop was used to iterate integers 1 up to 10, for each number. It is added to the initialized variable sum until all the 10 integer numbers are added. The the average is obtained by dividing by 10.
who was dobri dobrev?
Answer:
Dobri Dimitrov Dobrev, better known as Grandpa Dobri, Elder Dobri or The Saint of Bailovo, was a Bulgarian ascetic who walked over 20 kilometres each day to sit or stand in front of the Cathedral of Alexander Nevsky in Sofia to collect money for charitable causes.Answer:
He was bulgarian ascetic who walked over 20 kilometres each day to sit or stand in front of the Cathedral of Alexander Nevsky in Sofia to collect money for charitable causes. Elder Dobry has been raising money for decades to restore churches throughout Bulgaria.Dobrev donated all the money he collected to charities, orphanages, churches, and monasteries.
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the driver for the device over the phone, but he is having a hard time understanding your directions and is becoming frustrated.
What should you do?
A. Tell the user to wait until you are scheduled to be in that location.
B. Escalate the call to another technician or your supervisor.
C. Drive to the other location as soon as possible and update the driver.
D. Establish a Remote Desktop connection and update the driver.
Answer:
The answer is "Option D".
Explanation:
It is a desktop platform that helps a "client" computer can join from a remote location to a "host" computer. Clients can then manage and then use apps and files anywhere on network protocols.
This technology enables users to link from the remote location to a specific machine as if they were sitting beside it. Once this connection is established, users can carry out a variety of tasks as if they actually use the computer directly.
QUESTION 10
Twenty first century learning environments promote:
O A. effective learning
B. continuous learning
O c. positive human relationships
OD. all of the above
O E. integration of formal and informal learning
Answer:
D
Experts say 21st century learning must take place in contexts that “promote interaction and a sense of community [that] enable formal and informal learning.”i Thus, this paper will address the relationship of physical spaces and technological systems to learning, but more importantly, it will also consider how those
Explanation:
MARK ME AS BRAINLIEST
FOLLOW ME
CARRY ON LEARNING
100 %SURE
True or False: Microsoft Publisher allows you to click and drag an element anywhere on the page.
Answer:
True
Explanation:
Name the function for output in python.
Answer:
We use the print() function to output data to the standard output device (screen). We can also output data to a file, but this will be discussed later. An example of its use is given below.
Answer:print()
Explanation:As said above. Print is what we use in python (:
State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.
Answer:
Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible they include all information from previous revisions and updates.
Explanation:
Carlos, a network technician, replaces a failed switch with a new switch. Carlos informs the users on the subnet served by the switch that they can reconnect to the network. One user calls to report that she is still unable to access any resources on the network. Carlos checks the indicator light for the switch port to which that user is connected. The LED light is not lit. What action should Carlos take next to resolve this problem
Answer:
Explanation:
If the indicated network switch port has no glowing green LED then that switch port is either off or failing. This can sometimes happen even with newly replaced switches. In this case Carlos should first check to make sure that the switch port is properly installed. If so, then he should switch the port for a new one. If the LED light turns on and is still not green, then it may be an error with a faulty cable, and in this case Carlos should replace the cable with a new one, which should solve the issue.
Selma writes the following four answers in her Computer Science examination.
State which computer terms she is describing.
“It is a signal. When the signal is received it tells the operating system that an event has occurred.”
Selma is describing
Answer:
Interrupts.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
The four (4) input-output (I/O) software layers includes the following;
I. User level software: it provides user programs with a simple user interface to perform input and output functions.
II. Device drivers: it controls the input-output (I/O) devices that are connected to a computer system through a wired or wireless connection.
III. Device-independent OS software: it allows for uniform interfacing and buffering for device drivers.
IV. Interrupt drivers (handlers): it is responsible for handling interruptions that occur while using a software on a computer system.
An interrupt is a signal from a program or device connected to a computer and it's typically designed to instruct the operating system (OS) that an event has occurred and requires an attention such as stopping its current activities or processes.
In conclusion, the computer term that Selma is describing is interrupts.
Answer:
Interrupts
Explanation:
Dr Martin Luther King and his followers go to Selma, Alabama to attempt to achieve, through non-violent protest, equal voting rights and abilities for black people. In 1964, Dr. Martin Luther King Jr. of the Southern Christian Leadership Conference (SCLC) accepts his Nobel Peace Prize.
A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect?
A. MAC filtering
B. 802.1X
C. WPA2
D. EAP-FAST
Answer:
C
Explanation:
WPA2 builds on its predecessor, WPA, and is specifically designed to meet the most demanding enterprise security needs. ... Furthermore, because WPA2 is backwards- compatible with WPA, organizations that have already implemented the WPA standard can migrate to WPA2 at their own pace.
The size (number of bytes) of a structure-type variable can be changed by the following factors. Select all that apply. Group of answer choices changing the orders of the members in the structure. adding a member into the structure. changing an int-type variable to a pointer-type variable. changing the computer from a 32-bit to a 64-bit processor.
Answer:
A, B, and D
Explanation:
Considering the available options, the size (number of bytes) of a structure-type variable can be changed by the following factors:
A. changing the orders of the members in the structure.
B. adding a member into the structure.
D. changing the computer from a 32-bit to a 64-bit processor.
explain why the computer is powerful working tool???
Answer:
here ya go
Explanation:
A computer is a powerful tool because it is able to perform the information processing cycle operations (input, process, output, and storage) with amazing speed, reliability, and accuracy; store huge amounts of data and information; and communicate with other computers.
write a program to enter RADIUS of a CIRCLE and PRINT AREA of TRIANGLE using Q Basic. (class 8)
Answer:
The program is as follows:
10 INPUT RADIUS, BASE, HEIGHT
20 CIRCLE = 3.142* RADIUS * RADIUS
30 TRIANGLE = 0.5* BASE * HEIGHT
40 PRINT CIRCLE
50 PRINT TRIANGLE
60 STOP
Explanation:
The program description doesn't tally;
In other words, it is impossible to calculate the area of a triangle using the radius of a circle.
So, I designed the program to get input for radius, base and height.
Get input for radius, base and height
10 INPUT RADIUS, BASE, HEIGHT
Calculate area of circle
20 CIRCLE = 3.142* RADIUS * RADIUS
Calculate area of triangle
30 TRIANGLE = 0.5* BASE * HEIGHT
Print area of circle
40 PRINT CIRCLE
Print area of triangle
50 PRINT TRIANGLE
End of program
60 STOP
A Python keyword ______________.
can be user defined
cannot be used outside of its intended purpose
can only be used in the comments section
can be used anywhere in a Python program
Answer:
cannot be used outside of its intended purpose.
Explanation:
In many programming languages, keywords are special and reserved words that are used for specific and specified purposes. They have special meanings and cannot be used outside their intended purposes.
Keywords cannot be used as variable names, identifiers or functions.
In Python, some of such keywords include;
i. True
ii. False
iii. for
iv. while
v. break
vi. continue
vii. if
viii. else
ix. def
x. pass
To prevent certain columns from being displayed when printing a worksheet, _______ the columns.
erase
hide
highlight
remove
help me pls i beg whoever types first ill mark them brainliest
Answer:
The answer is "Line 1,4,and 9".
Explanation:
Following are the complete code to the given question:
print ("What is your favourite football team? ")#print message
team = input()#define variable that use input method to input value
#this is the IF statement, If they enter Manchester City
if team == "Manchester City":#use if to check string value
#respond like this
print ("Manchester City is a great team! ")#print message
#alternatively, respond like this
else: #defining else block
print("I don't mind "+ team +", but Manchester City is better !")#print message
#don't forget concatenation!
output:
Please find the code with the output in the attached file.
Please find attached file that will explains errors.
help,any question answer
Answer:
true
false
true
true
Explanation:
I took the paper
how is a trade off best described ?
dilema
compromise
demand
complication