What type of camera is a cell phone camera? A.) DSLR B.) manual C.) compact D.) zoom

Answers

Answer 1

Answer:

The correct option is;

D.) Zoom

Explanation:

The six types of camera found on smart phones includes the monochrome, macro camera, ultra-wide camera, periscope zoom camera, the main phone camera, and the depth sensor camera

The zoom cameras on smart phones can be found mainly in the top range models of smart phones due to the costs of the camera components including the sensor.

Smart phones also have digital zooming that make use of the high mega pixels that come with the phone.


Related Questions

Which of the following BEST describes Information Technology (IT)?
IT refers to everything that involves computers.
IT deals with how to turn information into meaningful decisions.
IT has to do with collecting and utilizing data.
IT refers to designing, creating, and improving software.

Answers

Answer:

The correct option is;

IT refers to everything that involves computers

Explanation:

Information technology (IT) are technology related to computing or computing systems

Information technology (IT) is the creation, processing, securing, exchanging, and storing of electronic data through the use of network, storage, computing, and other physical devices. Information technology refers to operations performed within enterprises and business organizations and includes telephone and computer technologies (all of which involves computing) as opposed to entertainment or personal usage of the technology.

In python,_______ are used to define the conditions necessary for a while loop to run.

Answers

Answer:

Relational Operators

Explanation:

We can make a while loop run only when some variable or whatever is relative to something else.

The valid operators are:

<, >, =, <=, >=, and =!

Hope this helped!

Answer:

sorry not sure

Explanation:

write any four characteristics of desktop computer​

Answers

The characteristics of computers that have made them so powerful and universally useful are speed, accuracy, diligence, versatility and storage capacity. Let us discuss them briefly. Computers work at an incredible speed. A powerful computer is capable of performing about 3-4 million simple instructions per second

main components of Adobe photoshop are. ...............
a) title bar
b) tool bar
c) menu bar
d) all of this ​

Answers

Answer:

The correct option is;

d) All of this

Explanation:

The main components of Adobe Photoshop are;

1) Title bar displays the name of the application, as well as the name of the current document and it is located at the top of the document window

2) Tool bar is the component of the interface design in which on-screen buttons, menus, icons, and other features for input and output are placed

The tools palette is the toolbar in Adobe Photoshop

3) Menu bar consists access to the basic components such as file, edit, image, layer, used to create new jobs, compose, and edit images.

Answer:

It is all of this.

Explanation:

Here it is

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

can anyone please help me with this

Answers

Answer:

This should do it. I assume the alignment of the numbers is not important?

<!DOCTYPE html>

<html>

<head>

<style>

table {

 border-collapse: collapse;

 font: 15px Verdana;

 font-weight: bold;

}

table, td {

 border: 1px solid black;

}

td {

 width: 80px;

 height: 80px;

 text-align: center;

}

</style>

</head>

<body>

<table>

 <tr>

   <td>1</td>

   <td>2</td>

   <td>3</td>

   <td>4</td>

 </tr>

 <tr>

   <td colspan="2">5</td>

   <td>6</td>

   <td rowspan="2">7</td>

 </tr>

 <tr>

   <td>8</td>

   <td>9</td>

   <td>10</td>

 </tr>

</table>

</body>

</html>

Ron is an electrician. He loves to work with wires and switches. What type of input does Ron carry when called for fixing an electric problem?
(Correct answer only)

A. tools
B. information
C. capital
D. people
E. power

Answers

I think the answer would be tools cause that what Ron would use. The answer is tools

What is ADO.net????????​

Answers

Answer:

ADO.NET stands for ActiveX Data Object is a database access technology created by Microsoft as part of its .NET framework that can access any ...

Developer: Microsoft Corporation

Declare an array of int values westboundHollandTunnelTraffic that can store the number of vehicles going westbound through the Holland Tunnel - on a particular hour (numbered 0 through 23) - on a particular day (numbered 0 through 6) - on a particular week (numbered 0 through 51) - over the last ten years (numbered 0 through 9). The innermost dimension should be years, with the next being weeks, and so on.

Answers

Answer:

Following are the declaration of the array:

int westboundHollandTunnelTraffic [10] [52] [7] [24];  //defining an integer array  that holds days, week, hour, and year value

Explanation:

In the above-given code, an array that's name is " westboundHollandTunnelTraffic " is declared and the type of the storing elements in the array is an integer.

In this array, it first stores the year's value, and in second, it stores week values, in third, it stores day value, and the last it stores hours value.    

How would you define a cloud today?
as a non-factor
networking
server
any remote virtualized computing infrastructure

Answers

Answer:

The answer is "any remote virtualized computing infrastructure".

Explanation:

The term cloud is used as the symbol of the internet because cloud computing is some kind of internet computing, that offers various services for computers and phones in organizations via the internet.  

The virtual network allows users to share numerous system resources throughout the network system.It allows you to access the optimal productivity by sharing the resources of a single physical computer on many virtual servers.

of the following occupations, which is predicted to have the greatest job growth?

Answers

Answer:

"Web designer" is the appropriate answer.

Explanation:

If we follow the market pattern, the number of purchases made by online shopping will continue to rise from 2002 to 2018 as well as the times to obtain no indication of slowing or stopping. Because of the same, web designers are expected to have the greatest increase in jobs, as it is very important to customize the website so that online customers can appear more interactive.

So that the above is the correct answer.

¿Cuál es la ventaja principal de una tabla dinámica?

Answers

Explanation:

Ventajas de las tablas dinámicas de Excel:

Hacen que los informes sean flexibles y se adaptan a tus necesidades. Son una forma interactiva de resumir rápidamente grandes volúmenes de datos, haciendo mucho más fácil el proceso de análisis y permitiendo encontrar patrones o tendencias.

what are the features of dot net ???​

Answers

Answer:

1) interperability

2) portability

3) security

4) simplified deployment

5) base class library

6) language indepence

If you do not clean your hardware on a regular basis, which of these is most likely to be a problem?
O water
O silicon
O dust
O energy

Answers

Answer:

Dust!

Explanation:

its the one that makes the most sense to me :)

The game begins with the player having 20 POINTS

The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.

If the POINT is a 7 or 11, the player wins his POINT

If the POINT is a 2, 3, or 12, the player loses his POINT

If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until

The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT

The player rolls a 7 and then he loses his POINT.

The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS

After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work

Answers

Answer:

Following are the code to this question:

import random#import package for using random method  

def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable

   dice1 = random.randint(1,6)

   dice2 = random.randint(1,6)

   return dice1 + dice2

def rolling(): # defining method rolling

   n_roll = 0  # defining num variable that initial value that is 0.

   p = 20 # defining variable p for looping, that points in between 1 and 59

   while p > 0 and p < 60: # defining loop that counts value dice value two times  

       d = rolling_dice()#defining d variable that hold method value

       n_roll+= 1 #defining n_roll that increment n_roll value by 1

       if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable

           p+= d   # use p variable that adds d variable

       elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator  

           p-= d#defining d variable that decreases d variable variable

       else: # defining else block

           p1 = d # using p1 variable that store d value  

           while True:# defining loop that calculates values

               d = rolling_dice()#defining d variable that holds method values

               n_roll += 1 #increment the n_roll value by 1

               if d == 7:#defining if block that checks d value equal to 7

                   p -= p1#subtract the value of p1 in p variable  

                   break # exit loop

               elif d == p:#defining elif block to check d value is equal to p

                   p += p1#adds the value of p1 in p variable  

                   break#using break keyword

   if p<= 0:#defining if block that checks p-value is less then equal to 0  

       print('Player lost')#using print method

   elif p>= 60:#defining else block that checks p-value is greater than equal to 60

       print('Player won')#using print method to print the value

   print('number of dice rolls:', n_roll)#use print method to print n_rolls value

rolling()

Output:

Player lost

number of dice rolls: 38

Explanation:

In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.

In the next step, another method the "rolling"  is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.  

Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque

Answers

Answer:

c.) stack

Explanation:

Answer:

the answer is c stack not only dose stack make the most since but i also got it right on edge 2020

Explanation:

how to delete audio from powerpoint​

Answers

Answer:

To delete an audio clip, select the audio icon on the slide and press Delete.

Hope it helps!!!!

Write a python program to calculate the sum of numbers from 1 to 20 which is divisible by 3.

Answers

Answer:

Input : N = 5

Output : 7

sum = 3 + 4

Input : N = 12

Output : 42

sum = 3 + 4 + 6 + 8 + 9 + 12

Answer:Input : n = 2, number = 7

Output : 728

There are nine n digit numbers that

are divisible by 7. Numbers are 14+  

21 + 28 + 35 + 42 + 49 + .... + 97.

Input : n = 3, number = 7

Output : 70336

Input : n = 3, number = 4

Output : 124200

Explanation:

Question 55 :You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission?

Answers

Answer:

The protocol will drop the packets

The application will automatically re-transmit the packets

Explanation:

Based on design, the routers will drop the packets as allowed by the Internet Protocol, due to the collision that resulted from the router being busy and the network is congested or that the packet is corrupt as indicated by the check sequence of the Ethernet frame or the IPv4 header checksum

Given that the application uses User Datagram Protocol (UDP) which does not allow recovery of lost packets, but have their defined methods of overseeing lost packets, as such the application will re-transmit the packet.

The Blue Screen of death is not an common error, and it is highly likely that you have encountered and fixed several already. Discuss errors you have come across, and the troubleshooting steps that you took to resolve the problem.

Answers

Answer:

your anwser is B

Explanation:

define data and user with example​

Answers

Answer:

Any data the user creates or owns. The term user data may be used to emphasize that the data were created and owned by the user. For example, when deleting an application, an uninstall program may ask if user data is also to be deleted.

Explanation:

Hope this helps you. Have a nice day^_^

Binary 10110 into oct & hex Binary 10001 into oct & hex with full process​

Answers

Answer:

yes binary 10001into oct hex with full process.

Businesses today suceed or fail based on their ability to

Answers

Answer:

their ability to Innovate with technology to meet their customers needs

Explanation:

&. Give three differences between a
web browser
and web page​

Answers

Answer:

The three differences between the Web page and Web browser are given below.

Explanation:

A web browser seems to be a search application that enables internet connectivity. A web-page seems to be a single document containing Website content.A web browser, including Google Chrome as well as Firefox, has become a program on oneself machine. A web page, like Google or Twitter, is what you will need the application to accessWeb browsers can view the contents of the site via the application. Webpage should be any web page and sometimes web destination. If something is opened on the internet, it's a website.

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.

Answers

Answer:

A. Document findings, actions, and outcomes.

F. Run a virus scan.

Explanation:

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?

Answers

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

This attack is aimed to avoid legal customers of one's website from accessing it.  In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  One other way to successfully attack is to send fake requests from the attacker.

100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from a server. From your computer, you can contact all servers and workstations on your own network segment, but you are unable to gain access to network resources on other segments. Which factors should you investigate

Answers

Answer:

The two factors are:

The default gateway The routers

Explanation:

Default gateway:

The default gateway transmits individual information back and forth between the network. This is most consumers and commercial workplaces seem to be a router whereby channels communication from either the local area network to something like the cables or Cellular networks that transfer that one to the broadband service.

The routers:

A router would be the first safety boundary from even being intruded into a channel. Order to enable the highest possible level of device public safety eventually turns such as the proxy server into something.

Fault tolerance refers to

how a network fails.

how well a network recovers after a failure.

mirror operations.

servers.

Answers

Answer:

servers

Explanation:

because it good for servers

Answer: How well a network recovers after a failure.

Explanation:

Select the correct answer for each question.
Which of the following ports offers a fast
connection that could be used to download and
watch your favorite TV shows?
O Etherne
O modem
O FireWire
O USB
DONE

Answers

Answer:

USB

Explanation:

it is a standard cable connection for consumers electronics devices.

Other Questions
If sino= 1/2, and 0and the larger value of O is __. A chef mix his salt and pepper. If he put 2/3 cup of salt and 1/2 cup of pepper in his shaker, what is the ratio of salt to pepper ? Solve the equation. 0.15 = y-0.45 Angles One angle is 4 more than three times another. Findthe measure of each angle ifa. they are complements of each other.b. they are supplements of each other. What is archaeology and why is our understanding of the earliest cultures based on it? A professor copies one article from a periodical for distribution to theclass. Is that Fair Use? *Yes or No? Using only four 4's and any operational sign find the value of 8 Can abnormality exist outside of a cultural context King Company issued bonds with a face amount of $1,600,000 in 2015. As of January 1, 2020, the balance in Discount on Bonds Payable is $4,800. At that time, King redeemed the bonds at 102.Required:Assuming that no interest is payable, make the entry to record the redemption. The Changs received a delivery of fuel oil totaling 35.00 gallons. The oil cost $3.05 per gallon. What did the Changs pay for the delivery Can you help me please. Before an algebraic fraction is selected as a final answer what should you always check?That the power of the numerator is greater than the denominator.That the coefficients of the denominator are greater than those in the numerator.That the variables are all written in alphabetical order.That the fractions are reduced with all common factors canceled. Describe a current situation in America that shares some similarities with the treatment of Japanese Americans during World War II. According to Dodge's information-processing theory of social problem solving, aggressive children's primary problem is that they: Group of answer choices have a poor capacity to generate strategies to achieve their goals. have a bias in their interpretations of others' behaviors. expect aggressive behavior to be useful in getting along with others. do not possess the ability to formulate socially acceptable goals. Write the correctly pt 2 Your science project look all right to me If that aint the proper first aid for heat exhaustion what is it?We looked everywhere for ur red sweat shirtThe athletes were already hot by the time that the track meet began They soon feel all right after we laid them out of the heat and shake their vital signsBtw thx for the help last time Experiment:Part I: Voltaic CellAssume that you are provided with the following materials:Strips of metallic zinc, metallic copper, metallic iron1M aqueous solutions of ZnSO4, CuSO4, FeSO4, and aqueous iodine (I2)Other required materials to create Voltaic cells such as beakers, porous containers, graphite rods, a voltmeter, and a few wires with alligator clips.In this modified version of the lab, after thoroughly studying the lab hand out and watching the videos, identify 4 different combinations of Voltaic cells that are possible to be created with the above materials.For each cell created, include the following details.Which electrode was the anode and which was the Cathode?The anode and cathode half reactions.Balanced equation for each cell you propose to construct.Calculated EocellShort hand notation (line notation) for each cell (be sure to include the inactive electrode if needed) A deli sandwich shop is offering either a ham or turkey sandwich, either tomato or vegetable soup, and either coffee or milk for their lunch special. What is the probability that a customer will choose vegetable soup as part of the chosen combination? If you vertically compress the linear perent function, F(x) = x, by multiplying by 1\2what is the equation of the new function? Why is it important to have a taxonomy or classification of types of collection and how does that help us understand the development of collection strategies, technologies, collection planning, and methods of collection What electrical appliances do people in your country have at home?