1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreev551 [17]
3 years ago
15

What's another word for contact print?

Computers and Technology
2 answers:
Naily [24]3 years ago
8 0
Contact sheet. Anything else?
Feliz [49]3 years ago
4 0
A print made by exposing a photosensitive surface to direct contact with a photographic negative.
You might be interested in
If nobody buys a ticket to a movie, do they still show it?
Serga [27]

It would depend on the movie and the theater policy.....

Hope this helps have a good day

3 0
3 years ago
Which of the following websites is least biased
labwork [276]
I think it's D because it's made out of facts. The other ones are more likely to include bias.
8 0
3 years ago
You are designing a VPC for a small application. It will operate in a private subnet and needs internet access to software updat
lilavasa [31]

Answer:

Refer below.

Explanation:

VPC, Subnets, Route Table(s), Nat Gateway, and Internet Gateway. These are the least required services to provide internet access to a private EC2 instance. NAT gateway requires an internet gateway.

3 0
3 years ago
Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
Nesterboy [21]

Answer:

c. both the user and the provider of encrypted data.

Explanation:

In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.

5 0
2 years ago
Type you all suck if you want to be my freind
Nina [5.8K]

Answer:

you all suck

Explanation:

;)

4 0
3 years ago
Read 2 more answers
Other questions:
  • Pointsyour company environment includes windows server versions 2003, 2008, and 2012. desktops range from windows xp and vista.
    13·1 answer
  • Define the acronym WAECUP and its components
    15·1 answer
  • A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
    11·1 answer
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • For the questions below, consider a class called ChessPiece. This class has two instance data, String type and int player. The v
    13·1 answer
  • What is it called when two different files generate the same hashing result?
    15·1 answer
  • Write a program that reads students’ names followed by their test scores. The program should output each student’s name followed
    13·1 answer
  • Select three advantages of cloud computing.
    12·1 answer
  • what impact of information communication technology have on the environment about electronic waste, use of electricity?​
    9·1 answer
  • When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!