1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aivan3 [116]
3 years ago
9

In the early days of photography, cameras were limited to professional photographers because of the knowledge needed to work the

cameras and develop the images with various chemicals.
True
False
Computers and Technology
2 answers:
ki77a [65]3 years ago
8 0
True  ------------------------------------------
Doss [256]3 years ago
3 0
True! In the early days of photography, many chemicals were used to develop images. This method of photography involved a 'dark room' and this process is still in use today.
You might be interested in
Help fast fast anyone
kkurt [141]

Answer:

True

Explanation:

:)

5 0
3 years ago
central, secure database in which Windows stores hardware and software configuration information and system security policies is
Ilya [14]

Answer:

The Registry

Explanation:

The registry is a centralized and secure database whereby Windows stores the overall configuration information of the hardware including the configuration information of the software as well as the system security policies. The Components that make use of the registry include the device drivers, Windows kernel, hardware profiles, setup programs, and user profiles.

8 0
3 years ago
To use an imported image, simply drag it from the desktop onto the stage. true or false
allsm [11]

Answer:

The answer is True

7 0
3 years ago
Read 2 more answers
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
4 years ago
What is the name of tool in number 9 picture? CAPITAL LETTER ONLY
Mariana [72]

Answer:

WHERE IS THE PICTURE??????????

3 0
3 years ago
Other questions:
  • You create hidden form fields with the ____ element.
    9·1 answer
  • Suppose a worker needs to process 100 items. the time to process each item is exponentially distributed with a mean of 2 minutes
    5·1 answer
  • The person who Oversee the direct work of employees and is responsible for the day-to-day tasks the employees complete is likely
    7·2 answers
  • _____________ helps to control and limit the number of consecutive request failures that cross a threshold. Review breaker Micro
    7·1 answer
  • A human interest story is an example of hard news.<br> O True<br> O False HEL
    15·1 answer
  • You are going to visit a national park, and have never been there before. You are using a map to try and make the distance trave
    11·1 answer
  • Consider Emily's balance statement:
    6·1 answer
  • Suppose you decide to use the number of times you see any of the area codes of the places Yanay has been to in 50 spam calls as
    9·1 answer
  • Team members can collaborate on ideas using telepresence. <br> true or false?
    10·1 answer
  • Carmen has met new people online that she enjoys talking to. One of these people has asked her to meet at the park in person and
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!