1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
14

1841 William Henry ____________ patents the Calotype process, exposing wet (instead of dry) paper for a much shorter amount of t

ime with a sharper image. This is the first negative-positive process making possible the first multiple copies.
Computers and Technology
1 answer:
Feliz [49]3 years ago
5 0
I'm confuzzled, what is your question? His name?
You might be interested in
Which of the following is not an example malicious code<br> A.Trojan horse B.worm C.virus D.spygear
umka21 [38]
B would be the correct answer

7 0
3 years ago
Read 2 more answers
A _____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.
PIT_PIT [208]
The answer to this question is the term Data Dictionary. A Data Dictionary or also known as metadata repository is a set of information that is stored which contains data, meanings, and values. The data dictionary can be used as a tool for communication between the stakeholders.
5 0
3 years ago
How to use github to creat a blog?Thank you
stepan [7]
You can use GitHub Pages! They have tutorials on their site to help you set up using that (too much for this format!). You can use it to make your own personal site, as well as host any existing site you may have.
5 0
4 years ago
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
lara [203]

Answer:

Worm malware

Explanation:

The worm operates destructively as it replicates itself and keeps spreading within a computer or network. It takes advantage of software and security vulnerabilities.

Once a computer or network is infected, worms replicate themselves, therefore using up the computer and network resources. Among others, one of the major missions of worms is to create a backdoor into a network, to be able to enable the attacker to carry out a more devastating attack.

Since worms take advantage of weak security in the Operating system, it is very important to constantly update the security features of the Operating system. Users must be careful of the emails they open and attachments they download.

6 0
3 years ago
Which best describes the benefits of renting a home?
WARRIOR [948]
The benefits are that you don't have to worry if something breaks from like a water leake or a storm and get destroyed the home owners have to pay
7 0
4 years ago
Read 2 more answers
Other questions:
  • Which setting indents all but the first line of a paragraph by the selected length?
    6·1 answer
  • ___ are controls through which a user can enter input data in a gui application. answer
    10·1 answer
  • Can you structure this code in if-statements?
    15·1 answer
  • This is a python program.
    6·1 answer
  • (9.10 Code Practice: Question 1)
    12·1 answer
  • When writing research questions, use action words, such as
    6·2 answers
  • The amount of data that can be stored on a disk depends in part on_____.
    13·1 answer
  • Does anyone know what episode Hinata threatens useless sakura?
    9·1 answer
  • How many 3 byte sequences contain at least five consecutive 0-bits
    7·1 answer
  • What are the three algorithm constructs?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!