1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sever21 [200]
2 years ago
12

In the 1880’s advancements in technology and processes made photography available to the general public. Who is considered the m

ost influential person to bring about this capability through the commercial production of cameras pre-loaded with film?
Computers and Technology
1 answer:
Bogdan [553]2 years ago
4 0

Answer:

George Eastman (1854–1932)

Explanation:

He was a Bank Clerk at Rochester, New York. He came up with the simple box camera (The Kodak), with 100 exposure rolls of films in 1888. A box Camera is the simplest form of Camera. And since then a lot of work has been done, and now we are up with DSLR. Thanks to George Eastman.

You might be interested in
Which is the first calculating device invented?​
denis-greek [22]

Answer:the abacus

Explanation:

3 0
2 years ago
Read 2 more answers
One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
Makovka662 [10]

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs.

<h3>What is malware?</h3>

Malware is any programme that is purposely designed to disrupt a computer, server, client, or computer network, leak private information, obtain unauthorised access to information or systems, deny users access to information, or otherwise interfere with the user's computer security and privacy.

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs. The reason for this is that such links may contain malware or spyware.

Learn more about Malware:

brainly.com/question/14276107

#SPJ1

7 0
2 years ago
A good website design combines which of the following elements? (select all that apply) powerful web server hardware components
Anarel [89]

Sounds like it'd be all of the above.


7 0
2 years ago
Read 2 more answers
What does an SQL injection do
Afina-wow [57]

Answer:

SQL injection is a form of hacking that uses user input fields.

Explanation:

SQL injection is when a piece of code or entire algorithm is input where a program prompts for user input. They can be used to change or access data. To prevent this, a programmer should scrub inputs. Scrubbing data removes slashes and arrows, which or commonly used in code.

3 0
2 years ago
Read 2 more answers
Anyone wanna hop on 1v1.lol<br> party code : usfhb6
hjlf

Answer:

thx for the points

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • What color model should Joe use if he will be using an offset printing press?
    7·1 answer
  • If you are working on a document and want to have Word automatically save the document every minute, what steps should you use t
    13·1 answer
  • Which software can managers use to discuss financial performance with the help of slides and charts?
    7·2 answers
  • When a user inserts a PivotTable, where will it be inserted?
    15·1 answer
  • Which of the following is NOT contained on the Slide Show toolbar?
    11·2 answers
  • To determine the average of a range of numbers, click the ____ in the formula bar, then click average.
    13·1 answer
  • Simplify the expresion<br>12. 12g + 9g​
    13·1 answer
  • Explain the emerging trends in microcomputer technology in relation to size​
    11·1 answer
  • In a three-tier architecture, the component that runs the program code and enforces the business processes is the:_______.
    11·1 answer
  • Who is the best Attack on Titan Character?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!