Answer:
a.
Explanation:
you can size and position a shape but not an icon
I'm trying to figure out how to put this together can anyone help me solve this?
The if-else statement to describe an integer is given below.
How to illustrate the informationThe if-else statement to describe an integer will be:
#include <stdio.h>
#include <stdbool.h>
int main(void) {
int userNum;
bool isPositive;
bool isEven;
scanf("%d", &userNum);
isPositive = (userNum > 0);
isEven = ((userNum % 2) == 0);
if(isPositive && isEven){
printf("Positive even number");
}
else if(isPositive && !isEven){
printf("Positive number");
}
else{
printf("Not a positive number");
}
printf("\n");
return 0;
}
Learn more about integers on:
https://brainly.com/question/17695139
#SPJ1
Which of the following is NOT a category on a shot list
Answer:
What’s the following I will edit this and answer it if I can know
Explanation:
if a software is more than the capacity of RAMand they cannot be loaded into the RAM completely,in such case a solution might b e excute such software directly from the secondary storage instead of laoding it into the RAM for execution.
do you recommend such a large software can be executed directly from the secondary storage especially if e use relative fast SSD storage?
justify your answer with reason in either support or against
No, I do not recommend such a large software can be executed directly from the secondary storage especially if e use relative fast SSD storage.
Why the response above?It is generally not recommended to execute a large software directly from the secondary storage, especially if the storage is a hard disk drive (HDD). This is because the access speed of an HDD is much slower than the access speed of RAM.
When a software is executed from the secondary storage, the system must first load the necessary data and instructions from the storage into the RAM before it can begin executing them.
In all, it is better to have sufficient RAM to fully load and execute large software programs, as this will provide the best performance.
Learn more about RAM from
https://brainly.com/question/13196228
#SPJ1
Explain why there are more general-purpose registers than special purpose registers.
Answer:
Explanation:
General purpose registers are used by programmer to store data whereas the special purpose registers are used by CPU for temporary storage of the data for calculations and other purposes.
Consider the following declaration:
String s = "cat";
Which of the following statements assigns the number of characters in s to k?
A. int k = s.length;
B. int k = s.length();
C. int k = s.size;
D. int k = s.size();
Consider the following declarations:
String s1 = "apple";
String s2 = "apple";
What is the result of s1.compareTo(s2)?
A. true
B. false
C. 0
D. 1
Consider the following declarations:
String s1 = "apple";
String s2 = "APPLE";
Which of the following expressions is true?
A. s1.equals(s2) && s1.equalsIgnoreCase(s2)
B. !s1.equals(s2) && s1.equalsIgnoreCase(s2)
C. s1.equals(s2) && !s1.equalsIgnoreCase(s2)
D. !s1.equals(s2) && !s1.equalsIgnoreCase(s2)
Answer:
B, C, B
Explanation:
According to my understanding of these questions, these are in Java.
For the first one, there is a built in function called .length() for a string, so it's answer B.
For the second one, this should come out as C, 0 since compareTo compares the ascii values of the characters.
The third one's answer should be B. s1.equals(s2) for characters that are caps and not caps comes out with false, so ! would negate it. s1.equalsIgnoreCase(s2) would come out as true, ignoring the cases of APPLE.
Write and test a program that computes the area of a circle. This program should request a number representing a radius as input from the user. It should use the formula 3.14 * radius ** 2 to compute the area, and output this result suitably labeled.
Answer:
radius = float(input('Radius: '))
area = 3.14 * (radius ** 2)
print(f'Area of the circle is: {area}')
for 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts.
For 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts: True.
What is 802.11ac?In Computer networking, 802.11ac is one of the wireless network standards which was developed by the Institute of Electrical and Electronics Engineers (IEEE) to operate on a 5 GHz microwave bandwidth (frequency) and as a result, it is faster and can transmit over a long distance.
As a general rule and generally speaking, a wireless security toolkit for 802.11 wireless networks should include all of the following features;
An ability to sniff wireless trafficAn ability to scan wireless hostsAn ability to assess the level of privacy afforded on its network.An ability to assess confidentiality afforded on its network.Read more on wireless network here: brainly.com/question/18370953
#SPJ1
Complete Question:
For 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts. True or False
Dan has installed antivirus software on his system. What is true about antivirus software?
The most accurate statement about antivirus software is that Antivirus software helps in detecting and mitigating various types of malicious software. So, the correct choice is option D.
Antivirus software plays a crucial role in identifying and removing known malware, including viruses, worms, Trojans, and other malicious programs, from a computer system. It does this by scanning files, programs, and system memory for patterns and signatures associated with malware. While antivirus software is an essential security tool, it is important to note that it does not provide complete protection against all types of cyber threats.
The threat landscape is constantly evolving, with new and emerging malware variants being developed by cyber criminals. Antivirus software relies on regular updates to its virus definitions database to stay effective against the latest threats. However, there can be a time lag between the emergence of a new threat and the availability of updates, during which the system may remain vulnerable.
To enhance security, it is recommended to combine antivirus software with other cybersecurity measures, such as regular system updates, strong passwords, safe browsing habits, and exercising caution when downloading files or clicking on suspicious links. This multi-layered approach provides a more comprehensive defense against cyber-attacks and helps ensure the security of the system and its data.
For more questions on Antivirus software
https://brainly.com/question/29944811
#SPJ8
Complete question:
Dan has installed antivirus software on his system. What is true about antivirus software? Select the most accurate statement from the following options:
A. Antivirus software provides complete protection against all types of cyber threats.B. Antivirus software can detect and remove all existing and emerging malware.C. Antivirus software guarantees 100% security and prevents all cyber attacks.D. Antivirus software helps in detecting and mitigating various types of malicious software.what is the name of the program or service that lets you view e -mail messeges?
The program or service that allows you to view email messages is called an email client.
What is the name of the program?An email client is a software program or service that enables users to access, manage and view their email messages. It provides user-friendly interface for reading, composing and organizing emails.
Popular examples of email clients include Micro/soft Outlook, Gm/ail, Mo/zilla Thunderbird and Ap/ple Mail. These clients allow users to connect to their email accounts, retrieve messages from email servers and display them in an organized manner for easy viewing and interaction.
Read more about email client
brainly.com/question/24688558
#SPJ1
Select which is true for for loop
Answer:
i dont understand what you mean and what you are asking in the qestion
Explanation:
In this lab, you use what you have learned about parallel arrays to complete a partially completed C++ program. The program should:
Either print the name and price for a coffee add-in from the Jumpin’ Jive Coffee Shop
Or it should print the message Sorry, we do not carry that.
Read the problem description carefully before you begin. The file provided for this lab includes the necessary variable declarations and input statements. You need to write the part of the program that searches for the name of the coffee add-in(s) and either prints the name and price of the add-in or prints the error message if the add-in is not found. Comments in the code tell you where to write your statements.
Instructions
Study the prewritten code to make sure you understand it.
Write the code that searches the array for the name of the add-in ordered by the customer.
Write the code that prints the name and price of the add-in or the error message, and then write the code that prints the cost of the total order.
Execute the program by clicking the Run button at the bottom of the screen. Use the following data:
Cream
Caramel
Whiskey
chocolate
Chocolate
Cinnamon
Vanilla
A general outline of how you can approach solving this problem in C++.
Define an array of coffee add-ins with their corresponding prices. For example:
c++
const int NUM_ADD_INS = 7; // number of coffee add-ins
string addIns[NUM_ADD_INS] = {"Cream", "Caramel", "Whiskey", "chocolate", "Chocolate", "Cinnamon", "Vanilla"};
double prices[NUM_ADD_INS] = {1.50, 2.00, 2.50, 1.00, 1.00, 1.25, 1.00}
What is the program about?Read input from the user for the name of the coffee add-in ordered by the customer.
c++
string customerAddIn;
cout << "Enter the name of the coffee add-in: ";
cin >> customerAddIn;
Search for the customerAddIn in the addIns array using a loop. If found, print the name and price of the add-in. If not found, print the error message.
c++
bool found = false;
for (int i = 0; i < NUM_ADD_INS; i++) {
if (customerAddIn == addIns[i]) {
cout << "Name: " << addIns[i] << endl;
cout << "Price: $" << prices[i] << endl;
found = true;
break;
}
}
if (!found) {
cout << "Sorry, we do not carry that." << endl;
}
Calculate and print the total cost of the order by summing up the prices of all the add-ins ordered by the customer.
c++
double totalCost = 0.0;
for (int i = 0; i < NUM_ADD_INS; i++) {
if (customerAddIn == addIns[i]) {
totalCost += prices[i];
}
}
cout << "Total cost: $" << totalCost << endl;
Read more about program here:
https://brainly.com/question/26134656
#SPJ1
In this c++ assignment, add an undo feature to a list of strings.
Here's a working class called Stringlist that implements a simple string list as a dynamic array. Stringlist_test.cpp has tests for all the methods in Stringlist.
Stringlist has one unimplemented method:
// Undoes the last operation that modified the list. Returns true if a
// change was undone, false otherwise.
//
bool undo()
{
cout << "Stringlist::undo: not yet implemented\n";
return false;
}
Your job is to implement undo, thus making Stringlist an undoable list.
Your implementation must follow these rules:
Do not delete any methods, or change the signatures of any methods, in Stringlist. You can change the implementation of existing methods if necessary. But they should still work the same way: your finished version of Stringlist with undo implement must still pass all the tests in Stringlist_test.cpp.
You can add other helper methods (public or private), functions, and classes/structs to Stringlist.h if you need them.
You must implement undo() using a private stack that is accessible only inside the Stringlist class. Implement the stack yourself as a linked list. Do not use arrays, vectors, or any other data structure for your stack.
Do not use any other #includes or #pragmas in Stringlist.h other than the ones already there.
When it's done, you'll be able to write code like this:
#include "Stringlist.h"
#include
using namespace std;
int main() {
Stringlist lst;
cout << lst << endl; // {}
lst.insert_back("one");
lst.insert_back("two");
lst.insert_back("three");
cout << lst << endl; // {"one", "two", "three"}
lst.undo();
cout << lst << endl; // {"one", "two"}
lst.undo();
cout << lst << endl; // {"one"}
lst.undo();
cout << lst << endl; // {}
}
Designing the Undo Stack
As mentioned above, you must implement undo() using at least one private stack implemented as a linked list inside the Stringlist class. You can modify Stringlist only as described at the start of this assignment.
examples of how specific methods should work.
Undoing insert_before
In code:
// lst == {"dog", "cat", "tree"}
lst.insert_before(3, "hat");
// lst == {"dog", "cat", "tree", "hat"}
lst.undo();
// lst == {"dog", "cat", "tree"}
lst.insert_before(1, "shoe");
// lst == {"dog", "shoe", "cat", "tree"}
lst.undo();
// lst == {"dog", "cat", "tree"}
Undoing set
For set, suppose that lst is {"yellow", "green", "red", "orange"}, and so lst.get(2) returns "red". If you call lst.set(2, "cow"), then you should push the operation set location 2 to "red" onto the undo stack, and then over-write location 2 with "cow".
In code:
// lst == {"yellow", "green", "red", "orange"}
lst.set(2, "cow");
// lst == {"yellow", "green", "cow", "orange"}
lst.undo();
// lst == {"yellow", "green", "red", "orange"}
Undoing remove_at
For remove_at
In code:
// lst == {"dog", "cat", "tree"}
lst.remove_at(1);
// lst == {"dog", "tree"}
lst.undo();
// lst == {"dog", "cat", "tree"}
Undoing operator=
For operator=,
In code:
// lst1 == {"dog", "cat", "tree"}
// lst2 == {"yellow", "green", "red", "orange"}
lst1 = lst2;
// lst1 == {"yellow", "green", "red", "orange"}
// lst2 == {"yellow", "green", "red", "orange"}
lst1.undo();
// lst1 == {"dog", "cat", "tree"}
// lst2 == {"yellow", "green", "red", "orange"}
As this shows, when you undo operator=, the entire list of strings is restored in one call to undo().
Important notes:
If lst1 and lst2 are different objects, then when lst2 is assigned to lst1 just the underlying string array of lst2 is copied to lst1. The lst1 undo stack is updated so that it can undo the assignment. The undo stack of lst2 is not copied, and lst2 is not modified in any away.
Self-assignment is when you assign a list to itself, e.g. lst1 = lst1;. In this case, nothing happens to lst1. Both its string data and undo stack are left as-is.
Undoing remove_all
For remove_all,
In code:
// lst == {"dog", "cat", "tree"}
lst.remove_all();
// lst == {}
lst.undo();
// lst == {"dog", "cat", "tree"}
Note that it should work the same way when lst is empty:
// lst == {}
lst.remove_all();
// lst == {}
lst.undo();
// lst == {}
Undoing Other Methods
undo() should undoall the other methods in Stringlist that are marked as "undoable" in the source code comments.
As mentioned above, undo() is not undoable. There is no "re-do" feature in this assignment.
Each method in Stringlist.h marked "undoable" should work correctly with undo(). This also includes the correct behaviour for the Stringlist copy constructor (which should not copy the undo stack).
The markers tests should run correctly, including with no memory leaks according to valgrind.
To implement the undo feature in the Stringlist class, you will need to modify the existing class and add a private stack implemented as a linked list. Here are the steps to follow:
How to write the program code1. In the Stringlist class in Stringlist.h, add a private struct called `UndoNode` to represent each node in the undo stack. Each node should store the necessary information to undo an operation (e.g., the method name, the arguments, and any other relevant data).
```cpp
private:
struct UndoNode {
std::string method; // The method name
// Add other necessary data for the specific method being undone
// ...
UndoNode* next; // Pointer to the next node in the stack
UndoNode(const std::string& m) : method(m), next(nullptr) {}
};
```
2. Add a private member variable `undoStack` of type `UndoNode*` to the Stringlist class to keep track of the undo stack.
```cpp
private:
// Other private member variables
UndoNode* undoStack;
```
3. Modify the undoable methods in the Stringlist class to push the necessary information onto the undo stack before performing the operation. For example, in the `insert_before` method:
```cpp
void insert_before(size_t index, const std::string& str) {
// Push the operation onto the undo stack
UndoNode* undoNode = new UndoNode("insert_before");
// Add necessary data to the undoNode (e.g., index and str)
// ...
// Perform the actual operation
// ...
// Add the undoNode to the top of the stack
undoNode->next = undoStack;
undoStack = undoNode;
}
```
4. Implement the `undo` method to pop the top node from the undo stack and perform the undo operation based on the stored information. You will need to handle each operation individually in the `undo` method.
```cpp
bool undo() {
if (undoStack == nullptr) {
std::cout << "Undo stack is empty." << std::endl;
return false;
}
UndoNode* undoNode = undoStack;
undoStack = undoStack->next;
// Perform the undo operation based on the stored information in undoNode
if (undoNode->method == "insert_before") {
// Undo the insert_before operation
// ...
} else if (undoNode->method == "set") {
// Undo the set operation
// ...
}
// Handle other operations...
delete undoNode;
return true;
}
```
Remember to handle memory deallocation appropriately and update other methods marked as "undoable" accordingly.
Read more on Java codes here https://brainly.com/question/25458754
#SPJ1
A company can either invest in employee training seminars or update its computer network. Since updating the computer network would result in more measurable benefits, the company would be best off updating its computer network. The argument above assumes that: Group of answer choices
Answer:
The more measurable a benefit, the greater value that benefit has to a company
Explanation:
Here, there are two choices ; organizing employee training seminars and computer network update. With an update in the company's computer network, accompanying benefits include ; Improved network performance, Extended feature accessibility, Enhanced firewall and security features, Enhanced efficiency leading to increased overall output. Employee training and seminar also comes with its own benefit which include enhanced employee knowledge. However , the measurable benefits of updating a computer network seems more numerous than employee training which could be a reason why the company chose to invest in its computer network as they feel that investments with more measurable benefits will impact more on the company.
2.11 (Separating the Digits in an Integer) Write a script that inputs a five-digit integer from the user. Separate the number into its individual digits. Print them separated by three spaces each. python
Answer:
The program in Python is as follows:
number = int(input())
myList = [int(num) for num in str(number)]
for i in myList:
print(i,end=" ")
Explanation:
This gets input from the user
number = int(input())
This converts the number to a list (each digit of the number becomes the elements of the list)
myList = [int(num) for num in str(number)]
This iterates through the list
for i in myList:
This prints the list element followed by 3 blank spaces
print(i,end=" ")
Name six different administrative controls used to secure personnel
The six different administrative controls used to secure personnel are: Preventative, detective, corrective, deterrent, recovery, directive, and compensation.
What controls have the additional name "administrative controls"?To lessen or restrict exposure to a particular hazard at work, administrative controls, also known as work practice controls, are used. When substitution, omission, or the use of engineering controls are not practical, this type of hazard control alters the way work is done.
Therefore, Policies, processes, or guidelines that outline employee or company practices in keeping with the organization's security objectives are referred to as administrative security controls.
Learn more about administrative controls from
https://brainly.com/question/15134135
#SPJ1
g 4-6 you've been given the network 200.5.0.0 /24 and need to subnet it using vlsm as follows: bldg 1 30 hosts bldg 2 10 hosts bldg 3 10 hosts bldg 4 4 hosts what will be the network address for bldg 3
Answer:
The answer is "200.5.0.0 32/28".
Explanation:
The requirement of the Bldg is =30.
The number of the host bits which is needed = 5
Therefore the subnet mask will be =/27
for bldg 3 netmask could be= /28
and when the /28 after that the last octet will be= 00100000.
00100000 converting value into a decimal value that is = 32.
therefore the correct value is 200.5.0.32 /28.
QUESTION NO-1: The Highest quality printer is dot-matrix True False Prev
It is false that the Highest quality printer is basically dot-matrix.
What is dot-matrix?A dot matrix is a patterned 2-dimensional array used to represent characters, symbols, and images.
Dot matrices are used to display information in most types of modern technology, including mobile phones, televisions, and printers. The system is also used in the textile industry for sewing, knitting, and weaving.
Dot-matrix printers are an older technology that uses pins to strike an ink ribbon in order to print characters and images on paper.
While dot-matrix printers are capable of producing multi-part forms and have low operating costs, they are generally regarded as having lower print quality when compared to more modern printer technologies.
Thus, the given statement is false.
For more details regarding dot-matrix, visit:
https://brainly.com/question/4953466
#SPJ9
Question 18 of 20:
Select the best answer for the question.
18. Illegally downloading media such as music or movies is called
O A. plagiarism.
OB. harassment.
OC. bullying.
D. piracy.
Answer:
A is the answer
Explanation:
we don't have to bully some one if they are not nice or their skin colour
A LAN Uses category 6 cabling. An issue with the connection results in network link to get degeneration and Only one device can communicate at a time. What is the connection operating at?
Half duplex
Simplex
Partial
Full Duplex
Answer:
partial
Explanation:
PLEASE HELP
When purchasing software or downloading music and games online, how can you make legal choices? Use details to support your answer
Answer:
When purchasing software or downloading music and games online, the ways that you make legal choices are to make sure that depending on the place you're downloading the music from. Make sure that the service has obtained permission to be distribution of the music and as such it's legal. Otherwise, it is said to be illegal.
Explanation:
Computer viruses and coding books
You are about to deploy a new server that will contain sensitive data about your clients. You want to test the server to look for problems that might allow an attacker to gain unauthorized access to the server. This testing should not attempt to exploit weaknesses, only report them. What type of test should you perform?
Answer:
Vulnerability Scan
Explanation:
What characteristics are common among operating systems
The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.
Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.
1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).
2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.
3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.
4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.
5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.
6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.
This includes user authentication, access control mechanisms, and encryption.
7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.
These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.
For more such questions characteristics,click on
https://brainly.com/question/30995425
#SPJ8
State
any three (3) reasons why users attach speakers to their computer?
Answer:
To complete the computer setup, to hear audio, to share audio.
Explanation:
A computer is not really complete without speakers.
So that you can actually hear the computer's audio.
So that you can have multiple people hear the same audio. (Headphones do not do this)
is it necessary to keep a record of software activation codes because your computer remembers these codes forever
It is important to keep a record of software activation codes, even if your computer remembers them, for a few reasons:
1- Moving to a new computer: If you get a new computer or reinstall the software on your current computer, you will need to enter the activation code again. If you don't have a record of the code, you may not be able to use the software.
2- Security: If someone gains access to your computer, they may be able to access your activation codes. If you keep a record of the codes in a secure place (such as a password-protected file), you can prevent unauthorized access.
3- License agreements: Some software licenses require you to keep a record of the activation code as proof of ownership. If you need to reinstall the software or transfer the license to a different computer, you may be required to provide the activation code.
Overall, it is a good practice to keep a record of software activation codes, even if your computer remembers them. This can help ensure that you can continue to use the software in the future and protect your ownership rights.
C++ program
Sort only the even elements of an array of integers in ascending order.
Answer: Here is one way you could write a C++ program to sort only the even elements of an array of integers in ascending order:
Explanation: Copy this Code
#include <iostream>
#include <algorithm>
using namespace std;
// Function to sort only the even elements of an array in ascending order
void sortEvenElements(int arr[], int n)
{
// create an auxiliary array to store only the even elements
int aux[n];
int j = 0;
// copy only the even elements from the original array to the auxiliary array
for (int i = 0; i < n; i++)
if (arr[i] % 2 == 0)
aux[j++] = arr[i];
// sort the auxiliary array using the STL sort function
sort(aux, aux + j);
// copy the sorted even elements back to the original array
j = 0;
for (int i = 0; i < n; i++)
if (arr[i] % 2 == 0)
arr[i] = aux[j++];
}
int main()
{
// test the sortEvenElements function
int arr[] = {5, 3, 2, 8, 1, 4};
int n = sizeof(arr) / sizeof(arr[0]);
sortEvenElements(arr, n);
// print the sorted array
for (int i = 0; i < n; i++)
cout << arr[i] << " ";
return 0;
}
Write a program that uses input to prompt a user for their name and then welcomes them. Note that input will pop up a dialog box. Enter Sarah in the pop-up box when you are prompted so your output will match the desired output.
user_name = str (input = ("Please enter your name: "))
def greet (user_name):
print ("Welcome to your ghetto, {0}!".format(user_name) )
What will be the different if the syringes and tube are filled with air instead of water?Explain your answer
Answer:
If the syringes and tubes are filled with air instead of water, the difference would be mainly due to the difference in the properties of air and water. Air is a compressible gas, while water is an incompressible liquid. This would result in a different behavior of the fluid when being pushed through the system.
When the syringe plunger is pushed to force air through the tube, the air molecules will begin to compress, decreasing the distance between them. This will cause an increase in pressure within the tube that can be measured using the pressure gauge. However, this pressure will not remain constant as the air continues to compress, making the measured pressure unreliable.
On the other hand, when the syringe plunger is pushed to force water through the tube, the water molecules will not compress. Therefore, the increase in pressure within the tube will be directly proportional to the force applied to the syringe plunger, resulting in an accurate measurement of pressure.
In summary, if the syringes and tube are filled with air instead of water, the difference would be that the measured pressure would not be reliable due to the compressibility of air.
Select the correct answer from each drop-down menu.
Complete the sentence listing the basic parts of a computer.
All computers have these four basic parts: an input device, a
Answer:
all computers have an input device, storage, proccesing,and output
hope it helped
Explanation:
Joseline is trying out a new piece of photography equipment that she recently purchased that helps to steady a camera with one single leg instead of three. What type of equipment is Joseline trying out?
A. multi-pod
B. tripod
C. semi-pod
D. monopod
Joseline trying out tripod .A camera-supporting three-legged stand is known as a tripod. For stability, cameras are fixed on tripods, sometimes known as "sticks." In tripods, the fluid head is used. The camera may now tilt up and down in addition to pan left and right.
What tools are employed in photography?You will need a camera with manual settings and the ability to change lenses, a tripod, a camera case, and a good SD card if you're a newbie photographer who wants to control the visual impacts of photography. The affordable photography gear listed below will help you get started in 2021.A monopod, which is a one-legged camera support system for precise and stable shooting, is also known as a unipod.A camera-supporting three-legged stand is known as a tripod. For stability, cameras are fixed on tripods, sometimes known as "sticks." In tripods, the fluid head is used. The camera may now tilt up and down in addition to pan left and right.To learn more about tripod refer to:
https://brainly.com/question/27526669
#SPJ1
Answer:
monopod
Explanation: