1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sever21 [200]
3 years ago
12

In the 1880’s advancements in technology and processes made photography available to the general public. Who is considered the m

ost influential person to bring about this capability through the commercial production of cameras pre-loaded with film?
Computers and Technology
1 answer:
Bogdan [553]3 years ago
4 0

Answer:

George Eastman (1854–1932)

Explanation:

He was a Bank Clerk at Rochester, New York. He came up with the simple box camera (The Kodak), with 100 exposure rolls of films in 1888. A box Camera is the simplest form of Camera. And since then a lot of work has been done, and now we are up with DSLR. Thanks to George Eastman.

You might be interested in
A technician wants to create a new partition on a new additional hard drive. what tool should be used?
Vitek1552 [10]
A Disk Defragmenter should be used
7 0
3 years ago
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
What is sampling?
Mama L [17]
The answer is either B) or D) because I remember learning this and the keyword I remember is analogue

Hope this helps —- XoXo
3 0
3 years ago
If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then:
IgorLugansk [536]

Answer:

specific areas of access should be determined and they should be as restrictive as possible.

Explanation:

According to my research on security features of networks , I can say that based on the information provided within the question then specific areas of access should be determined and they should be as restrictive as possible. This would provide the highest level of security while still allowing production to be smooth.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
1. Ce este o baza de date? (1p)
lesya [120]

Answer:

would you mind telling me what this says im still learning my spanish

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which disk drive type contains a magnetic HDD with onboard flash memory serving as a non-volatile cache?
    6·1 answer
  • What is the order in which windows systems receiving and process multiple gpos?
    7·1 answer
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • You have added a table to your web page consisting of two columns and five rows, including the header row. in the first header c
    13·1 answer
  • Given a matrix input_matrix, return a Numpy array that consists of every entry of A that has: an even row index in the range [0,
    9·1 answer
  • What is boolean rules​
    12·1 answer
  • For each obstacle, select the best solution. failing to find other members for a club: failing a class: failing to get the credi
    9·2 answers
  • Derek has to create a technical design of a complex floor plan using CAD. What will be most helpful for Derek to use to create t
    8·1 answer
  • What is python, the coding language
    6·2 answers
  • Write an expression in Boolean algebra that evaluates to 1 when an odd number of bits of the number is 1 and 0 otherwise
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!