1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masteriza [31]
3 years ago
15

PLEASEEEEEE HELP, ILL DO ANYTHING JUST ANSWER THESE CORRECTLY!!!!!TYSM!!!

Computers and Technology
2 answers:
lions [1.4K]3 years ago
4 0

Answer:

the person above me deserves brainlyest

Explanation:

REY [17]3 years ago
3 0

10 minutes

Daguerreotype

Connect the cable between them

Shutters

A digital camera

Chemicals

Joseph Niepce

White

Copper

Camera Lenses

False

True

True

True

False

Thank you for taking photography class, I am doing the same class (FLVS SQUAD!!)

You might be interested in
Which two components help input data in a computer and select options from the screen, respectively?
Natali [406]

Answer:

Mouse and Keyboard are the devices which can be used to give input to the computer.

Explanation:

Mouse and Keyboard both are connected with the CPU via USB cable. Mouse consists of 3 major buttons, left button(for click to get the task to be done), right button (to get options) and wheel (to scroll up and down the page on screen). Keyboard is use to type text and letters as per need.

3 0
3 years ago
When enabling IPsec mobile client support, you made some selections in the Xauth section of the interface. What does Xauth stand
konstantin123 [22]

Answer:

Extended authentication

Explanation:

Xauth = Extended authentication

An extended authentication can cause security to be increased because it requires the user to enter a username and password. These details would then be authenticated at the internal database of the controller. This extension is an ipsec extension which would enable VPN users to enter a username and password. These details would be required of the user while trying to connect and they would be checked against the login details registered by such a user.

4 0
4 years ago
4.5 code practice edhesive
Bezzdna [24]

Answer:

n= input("Please enter the next word: ")

x=1

while(n != "STOP"):

 print("#" + str(x) + ": You entered " + n)

  x=x+1

  n= input("Please enter the next word: ")

print("All done. " + str(x-1) + " words entered.")

Explanation:

8 0
3 years ago
Which access control type would you use to grant permissions based on the sensitivity of the information contained in the object
hram777 [196]

Answer:

Mandatory Access Control (MAC) is a means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity.

5 0
3 years ago
What programming language is used for Arduinos?
Helen [10]

For Arduinos, C++ wrappers around C are used. The goal is to hide the details with setting up and using the AVR, therefore, it's a pretty simple program.

Answer: C++

(P.S. copy and paste your question into google or safari and click on the link to reddit because there's a lot of good info about this there)

+ = <3

4 0
3 years ago
Read 2 more answers
Other questions:
  • Alice is working on a web page to attract the maximum number of people to join her cause. She wants to inform people about the b
    10·2 answers
  • 1.2 Discuss each of the following terms: (a) data (b) database (c) database management system (d) database application program (
    12·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • What specific tool allows you to create GPOs, view a GPO's settings, link and unlink GPOs with containers, and manage the inheri
    10·1 answer
  • A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested
    11·1 answer
  • // This program assigns values to two variables // and performs mathematical operations with them public class DebugFour1 { publ
    7·1 answer
  • Please dont delete. my teacher said to see how many people I could meet on here. THIS IS A BIG PART OF MY GRADE!! DO NOT REPORT!
    13·2 answers
  • Hattie uses the line of code num == 7 to assign the number 7 to the variable named num. What correction should be made?
    7·1 answer
  • Can you please help me?
    6·1 answer
  • When a value of one data type is automatically changed to another data type, a(n) ____________________ type coercion is said to
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!