1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Burka [1]
3 years ago
10

13) When developing film, how do you dispose of fixer as opposed to developer?

Computers and Technology
1 answer:
MAVERICK [17]3 years ago
6 0

Answer:

B) Developer is poured down the drain while fixer can be reduced

Explanation:

The effluents produced during photographic processing includes, wash water, bleach, fixer, and developer

The developer is an alkaline solution, with a pH of approximately 10.0, while the pH of the fixer is about 4.3, it is therefore, acidic

The rate of discharge of the developer to the fixer is 2 to 1, and the exhausted developer, fixer and process effluents combined are neutral and can be handle by the the treatment works and the drain pipes

Fixer which remain clear can be reused for more than a day, while the spent basic Developer and the acidic Spent Stop Bath can be combined to form a neutral solution, having a pH of approximately 7, which make them less hazardous to be disposed off down the sink into the drain

Therefore, <em>developer is poured down the drain while fixer can be reused</em>

You might be interested in
It is not free to manage the settings of your wiki (true or false)​
jek_recluse [69]

Answer:

shuush

Explanation:

u r a shmaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaak

5 0
3 years ago
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
ap csp The local, remote, and upstream _______ can each have multiple ___ _____. When a participant in a collaborative group on
ratelena [41]

Answer:

The Local, Remote and Upstream repository can each have multiple push /pull requests. When  a Participant in a collaborative group on Github is ready to have their work used by the group,  the participants makes a pull request.

Explanation:

These are simple blanks which are answer here

The Local, Remote and Upstream <u>repository</u> can each have multiple <u>push /pull</u> requests. When  a Participant in a collaborative group on Github is ready to have their work used by the group,  the participants makes a <u>pull request</u>.

8 0
3 years ago
Recovery point objectives of a recovery plan specify ________.
Ksenya-84 [330]

Answer:

The correct option to the following question is an option (D).

Explanation:

Because RPO(Recovery point objective) is the objective in which we getting the greatest level of the privacy. confidence and the important thing is security for our resources.

The best thing is that the center of activity of the RPO in on the data and the overall elasticity of the loss of your company.

5 0
3 years ago
In codd's model of a relational database, data is stored in a(n) _____, which maintains information about a(
Dmitry [639]
<span>Which is not a component of a database that describes how data is stored?</span>
5 0
4 years ago
Other questions:
  • ________ is the application of statistical techniques to find patterns and relationships among data for classification and predi
    14·1 answer
  • Consider the following declaration.int[] beta = new int[3];int j;Which of the following input statements correctly input values
    11·1 answer
  • Contrast the performance of the three techniques for allocating disk blocks (contiguous, linked, and indexed) for both sequentia
    13·1 answer
  • What scientific principle would a plumber need to know when designing and installing plumbing a new construction
    13·1 answer
  • which of these variable declarations will the variable remain uninitialized unless it is explicitly initialized?1)Declaration of
    5·1 answer
  • James would like to send a document he has saved on the hard drive to coworkers in Ireland, Brazil, and India. These coworkers h
    6·2 answers
  • What is another name for repetition in programming?
    11·1 answer
  • Question 13(Multiple Choice Worth 5 points)
    6·1 answer
  • Select the correct answer from each drop-down menu. The following diagram shows four resistors. What is the effective resistance
    9·1 answer
  • When an item in a menu is black, it means that _____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!