1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
3 years ago
8

Why did artists use pinhole cameras during the renaissance?

Computers and Technology
1 answer:
murzikaleks [220]3 years ago
3 0
<span>Pinhole cameras were one of the most sophisticated devices of the period, it made tasks much easier it basically worked exactly like the human eye and is something just like tracing.

Hope it helps! :)</span>
You might be interested in
You can increase your efficiency by using your e-mail program's spell checker because it eliminates the need for you to proofrea
galina1969 [7]
The answer is True bc it saves you time and is efficient
6 0
3 years ago
How Charles Babbage Concept of<br>Computer has help the modern<br>Computer​
OLga [1]

English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine. Although it was never completed, the Analytical Engine would have had most of the basic elements of the present-day computer.

6 0
3 years ago
Explain agile testing ​
melomori [17]

Answer:

Explanation:

Agile testing is software testing that follows the best practices of Agile development. For example, Agile development takes an incremental approach to design. Similarly, Agile testing includes an incremental approach to testing. In this type of software testing, features are tested as they are developed.

5 0
3 years ago
What are some examples of trademarks?!! Some one please help! Have a great day btw! help me pleaseee
Alchen [17]
A trademark can be anything! it could be be a hair tie, a flag and even a bag.
7 0
3 years ago
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
3 years ago
Other questions:
  • What sugar is used in a DNA molecule​
    7·2 answers
  • If the list above is named list1 and is implemented as a list, whatstatement would you use to find the number ofelements?list1.s
    9·1 answer
  • Which of the following conditions will maximize the amount of interest you earn
    5·1 answer
  • What does the action tool allow you to do in Microsoft power point?
    9·1 answer
  • Who is the father of computer​
    12·2 answers
  • What is the keyboard shortcut for opening the edit hyperlink dialog box
    14·1 answer
  • Drag the correct type of update to its definition.
    14·1 answer
  • "What is the capital of Belarus?" is an example of what type of search query
    10·2 answers
  • How is a UDP socket fully identified? What about a TCP socket? What is the difference between the full identification of both so
    9·1 answer
  • If you have different movie or audio file types saved to your computer and your computer can only play the OGG format instead of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!