1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
4 years ago
10

If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?

Computers and Technology
2 answers:
e-lub [12.9K]4 years ago
8 0
I would like to photograph a rose, because I have always been interested to know more about some flowers and what’s in the inside of them. Even though roses look pretty “simple” but beautiful in <span>the outside, I suspect that there are a thousand of different things inside of it.</span><span />
Licemer1 [7]4 years ago
8 0

Answer and explanation:

Mainly, 3D microscopes are used in scientific research to observe the biologic composition of cells and microorganisms. If given the chance to use it to take some photographs, one good option could be to observe the cells of a zebrafish. <em>Zebrafish </em>have more than ten thousand (10,000) of cells that have the look of the <em>sun's prominences</em>. Comparing both of them could amaze us overall because of the difference in real sizes between but the similarity in shape.

You might be interested in
.A card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected
mylen [45]

Answer: Network interface controller

Explanation:

A network interface controller is also referred to as the network adapter or LAN adapter. It is simply a component of the computer hardware that is used to connects a computer system to a particular network.

It is a card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected to a network via cables.

6 0
3 years ago
Data erasure software uses standards that are called.
Leviafan [203]

Data erasure software uses standards that are called Typically, a software program device is used for information erasure like BitRaser, which implements the overwriting sample primarily based totally on the usual used, together with US DoD 5220.22, NIST 800-88.

<h3>What is statistics erasure?</h3>

For virtual garage devices, erasing names after its developer, the Gutmann set of rules is a way of disk wiping that overwrites statistics the usage of a complete of 35 passes. This makes it one of the maximum steady statistics erasure methods, however additionally the maximum time-consuming.

The statistics manner that zeros and ones are verifiably overwritten onto all sectors of the device. This renders all statistics completely unrecoverable at the same time as retaining the capability of the device the beyond few years, NIST Special Publication 800-88 has end up the go-to statistics erasure preferred withinside the United States.

Read more about the software :

brainly.com/question/1538272

#SPJ1

8 0
2 years ago
Match the example with the type of collection.
labwork [276]

Answer:

1.c

2.list

3.tuple

Explanation:

5 0
3 years ago
Differentiate between symmetric and asymmetric encryption
Shalnov [3]

Answer:

While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys

8 0
2 years ago
Read 2 more answers
Given that add, a function that expects two integer parameters and returns their sum, and given that two variables, euro_sales a
Evgesh-ka [11]

Answer:

int eurasia_sales = add(euro_sales,asia_sales);

Explanation:

Kindly find the explanation attached

Download txt
7 0
4 years ago
Other questions:
  • Number of byte required to store illumination
    13·1 answer
  • Write a function name isPrime, which takes an integer as an argument and returns true if the argument is a prime number, or fals
    14·1 answer
  • All of the following are good reasons to attend a cummunity college except
    10·2 answers
  • Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
    15·1 answer
  • A software programâs _________ indicates what can legally be done with that program.]
    5·1 answer
  • Which of the following resulted in a rightward shift in supply?
    5·1 answer
  • Which layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive t
    8·1 answer
  • Everytime my daughter tries to ask for an app, or a money thing inside an app.. The request won't go through. Anybody know how t
    12·1 answer
  • Why is it important to prevent financial loss
    7·1 answer
  • Which communication technology often takes the place of printed interoffice communication?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!