1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Charra [1.4K]
3 years ago
15

In what decade was photography invented? the 1800s the 1820s the 1840s the 1860s

Computers and Technology
1 answer:
frutty [35]3 years ago
4 0

Answer:

In the year 1820's

It is B

You might be interested in
Anyone know this awnser computer science
jolli1 [7]

Answer:

Smartphones, Satellite internet providers, smart speakers, and bluetooth headphones

Explanation:

6 0
3 years ago
Read 2 more answers
Explain the role of computers in accounting
Inessa05 [86]

Answer:

A computer helps accountants store and access financial records, make changes and alleviate the need to keep paper files. If paper work is needed, computer files can easily be accessed and printed along with any changes the accountant makes at any given time.

8 0
2 years ago
What is the basic purpose of Google calendar?
goldenfox [79]
The basic purpose of a google calendar is basically the same as a regular calendar. it is used to keep track life's important events all in one place.    
7 0
3 years ago
Read 2 more answers
Write a program named Deviations.java that creates an array with the deviations from average of another array. The main() method
Westkost [7]

Answer:

hello your question is incomplete attached is the complete question and solution

answer : The solution is attached below

Explanation:

Below is a program named Derivations.java that creates an array with the deviations from average of another array.

3 0
3 years ago
Examine the following output:
zepelin [54]

Answer:

a. tracert

Explanation:

Tracert is a computer network diagnostic demand which displays possible routes for internet protocol network. It also measures transit delays of packets across network. The given output is produced by a tracert command.

8 0
3 years ago
Other questions:
  • Which of the following is not a typical step in the ethical hacking process? A. Planning B. Discovery C. Attack D. Recovery
    5·1 answer
  • A security administrator is required to submit a new csr to a ca. what is the first step?
    11·1 answer
  • Which type of chemical bonds are formed by sharing electrons?
    11·1 answer
  • convert the following c code to mips. assume the address of base array is associated with $s0, n is associated with $s1, positio
    14·1 answer
  • The second row of letters on the keyboard is called the______ row
    14·2 answers
  • Why is charles babbage known as father of computer?​
    10·1 answer
  • How fast is a backwards long jump in Super Mario 64?
    7·1 answer
  • A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
    10·1 answer
  • Match the hardware device with the "category" into which it falls. Remember to choose
    8·1 answer
  • ASAP BRAINLIEST!!!!!!
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!