1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
3 years ago
6

Who invented the collodian process

Computers and Technology
2 answers:
pentagon [3]3 years ago
5 0
Frederick Scott Archer
ddd [48]3 years ago
5 0

Frederick Scott Archer

You might be interested in
Does the cloud solution offer equal or greater data security capabilities than those pro-vided by your organization’s data cente
likoan [24]

Answer:I think greater. Answer my question that I posted plz

Explanation:

6 0
4 years ago
Libreoffice is an example of which type of software?.
max2010maxim [7]

LibreOffice is an Open Source Software.

<h3>Open Source Software (OSS)</h3>

A software is classified as <u>Open Source</u> when your code can be use, modified and distribute with its original rights.

<h3>LibreOffice</h3>

For answering this question, you should know a software LibreOffice.

LibreOffice is a software that allows to create: sheets, documents, drawing, charting, database, presentations, etc. It's free and an open source software - main advantages when compared to other software available.

In the other words, LibreOffice is free because the user does not need to pay any license. Also, it is an open source software because your code can manipulate for any developer.

Read more about Open Source Software here:

brainly.com/question/4593389

3 0
3 years ago
What is the difference between requirements and controls in the security process? Give examples of each.
konstantin123 [22]

Answer:

Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.

Explanation:

Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.

Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.

4 0
3 years ago
Write the definition of a function named max that receives an int parameter and returns the largest value that it has been calle
kkurt [141]

Answer:

Following are the code in the C language .

int max(int x) // function definition

{

static int largest=0; // variable declaration

if (x>largest) // checking the condition

largest=x; // assign the value of input in the largest variable

return largest; // return the largest number

}

Explanation:

Following are the description of code .

  • Decalred a function max of int type which hold a parameter x of int datatype.
  • In this function compared the number x with the largest .If this condition is true then largest number hold the value of x variable
  • Finally return the largest number .
8 0
3 years ago
Which type of input devices used in big hero 6 movie
Maslowich

The  Input Devices Used in Movie Big Hero are:

  • A joystick
  • medical robot
  • Armored exoskeleton
  • Jet-boots.

<h3>What are input device?</h3>

This is known to be a is a piece of instrument that helps gives or provide data to any information processing system.

Note that the Input Devices Used in Movie Big Hero “6”  are  a medical robot made by by Tadashi Hamada., Armored exoskeleton and others.

Learn more about input device from

brainly.com/question/24455519

#SPJ1

7 0
2 years ago
Other questions:
  • A process-based DO/S must synchronize actions across the network. When a process reaches a point at which it needs service from
    6·1 answer
  • Write a recursive function, replace, that accepts a parameter containing a string value and returns another string value, the sa
    5·1 answer
  • What is the process called if you are erasing data on your hard drive from a MAC
    12·1 answer
  • Monica is teaching herself to paint. What web resource would be the most helpful
    14·1 answer
  • Question 12 :A user complains that his computer is taking a long time to boot. During the boot process, you observe that the har
    7·1 answer
  • What is technology??
    12·1 answer
  • For (int j- 4; j &gt; 0; j--)
    9·1 answer
  • How do hand tools,Farm implements and farm equipment differ from one another
    6·1 answer
  • A photographer stores digital photographs on her computer. In this case the photographs are considered the data. Each photograph
    6·1 answer
  • Which of the four factors of production are hit the hardest when high unemployment occurs ?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!