1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
10

If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?

Computers and Technology
2 answers:
e-lub [12.9K]3 years ago
8 0
I would like to photograph a rose, because I have always been interested to know more about some flowers and what’s in the inside of them. Even though roses look pretty “simple” but beautiful in <span>the outside, I suspect that there are a thousand of different things inside of it.</span><span />
Licemer1 [7]3 years ago
8 0

Answer and explanation:

Mainly, 3D microscopes are used in scientific research to observe the biologic composition of cells and microorganisms. If given the chance to use it to take some photographs, one good option could be to observe the cells of a zebrafish. <em>Zebrafish </em>have more than ten thousand (10,000) of cells that have the look of the <em>sun's prominences</em>. Comparing both of them could amaze us overall because of the difference in real sizes between but the similarity in shape.

You might be interested in
How can cars get faster
Varvara68 [4.7K]
Tape a spoiler to the trunk.
5 0
2 years ago
A problem associated with old drivers is:
alexdok [17]
Vision problems, also generally slowed movements/reaction time
7 0
3 years ago
Why do we need to update database regularly
sergiy2304 [10]
To protect from attackers gaining access by sitting on a certain configuration too long. 
7 0
2 years ago
In order to protect your computer from the newest virus, which of the following should you do after you've installed a virscan s
NNADVOKAT [17]
After installing your anti-virus, you must do the following to make sure that your computer will be virus free moving forward:

1. Scan every drive of your computer.
2. Scan every program, photo, video, etc before opening those.
3. Avoid visiting restricted sites.
4. Update your antivirus application. This way, the application gets new virus database.
5. Schedule antivirus scanning.
6. If your antivirus application do not have scheduled scanning, plan it.
7. Install antivirus widgets or extension in your web browser.
8. For maximum protection, you can install another antivirus application.
9. Uninstall risky applications.
10. Scan flashdrives before opening or exploing those. Avoid borrowing flashdrives.
11. Avoid inserting your flashdrives to other devices.
12. Defrag your system. Some virus can't be detected because your system's drive may be badly fragmented.

3 0
3 years ago
Please answer<br><br>NO LINKS​
Alex_Xolod [135]

Answer:

Please find the attached file for the complete solution:

Explanation:

6 0
2 years ago
Other questions:
  • What was the first carbonated drink to be introduced in the US?
    6·1 answer
  • Which of the following is not true about designing classes? In order for class information to be printed instead of a memory add
    12·1 answer
  • To support continuous improvement efforts in the workplace, you increase the number of tasks that an employee performs and have
    7·1 answer
  • What error occurs when you perform an illegal math operation such as divide by zero
    13·1 answer
  • According to the video, what qualities do Human Services workers need? Check all that apply.
    11·2 answers
  • What happens when a filter is applied to a database
    15·1 answer
  • Software is nothing but a piece of code or set of instructions written in a chip to run a hardware device on the Computer. O Tru
    14·1 answer
  • Kevin manages the security for his company and is working to implement a kernel integrity subsystem for key servers. Of the foll
    9·1 answer
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    6·2 answers
  • Select the four tactics that cyber criminals use for stealing information from the list below.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!