The total zoom available on a camera is determined by digital zoom ________ optical zoom

A) divided by
B) multiplied by
C) added to
D) subtracted from

B

Computer Science & Information Technology

You might also like to view...

John, an employee of an organization, always connects to the corporate network using his own mobile device. Which of the following best practices prevents BYOD risk when John connects to the corporate network?

A. Improperly disposing of a device B. Not reporting a lost or stolen device C. Providing support for many different devices D. Separating personal and private data

Computer Science & Information Technology

Information security work involves a very wide range of ____.

A. required activities B. required competencies C. potential activities D. potential competencies

Computer Science & Information Technology