1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
2 years ago
8

Back in the mid-1800s, who was one of the first artists to retouch negatives to reduce or eliminate any imperfections in the sho

t?
Group of answer choices

André-Adolphe-Eugène Disdéri

Russian Count Sergei Lvovich Levitsky

Robert Cornelius

William Henry Fox TalbotBack in the mid-1800s, who was one of the first artists to retouch negatives to reduce or eliminate any imperfections in the shot?
Group of answer choices

André-Adolphe-Eugène Disdéri

Russian Count Sergei Lvovich Levitsky

Robert Cornelius

William Henry Fox Talbot
Computers and Technology
2 answers:
algol132 years ago
7 0

Answer:

that guy shosocueiedixcud ducejduducu

tia_tia [17]2 years ago
6 0

Answer:

Calvert Richard Jones

Explanation:

Just five years later, in 1846, the first known act of photographic retouching was performed by a Welsh colleague of Talbot's named Calvert Richard Jones, or perhaps by one of Jones's associates

You might be interested in
Which securities protect data through processes, procedures,decisions,and user pernissions. Determines where and how data can be
vovangra [49]

Answer:

Data can be stored on storage devices.

Explanation:

Network security, Application security and information security are the securities that protect data. Data can be stored on storage devices such as hard disk drives, solid state drives, external hard drives, USB flash drives and SD cards etc. Hard disk drives, floppy disks and tapes store data magnetically. The data can be stored with a device that spins the disk with magnetic coatings and heads has the ability to read and write information in the form of magnetic patterns.

5 0
3 years ago
Is the ipv6 address 2001:1d5::30a::1 a valid address? why or why not?
defon
<span>Not a valid IPv6 address A valid IPv6 address consist of 8 groups of 4 hexadecimal numbers separated by colons ":". But that can make for a rather long address of 39 characters. So you're allowed to abbreviate an IPv6 address by getting rid of superfluous zeros. The superfluous zeros are leading zeros in each group of 4 digits, but you have to leave at least one digit in each group. The final elimination of 1 or more groups of all zeros is to use a double colon "::" to replace one or more groups of all zeros. But you can only do that once. Otherwise, it results in an ambiguous IP address. For the example of 2001:1d5::30a::1, there are two such omissions, meaning that the address can be any of 2001:1d5:0:30a:0:0:0:1 2001:1d5:0:0:30a:0:0:1 2001:1d5:0:0:0:30a:0:1 And since you can't determine which it is, it's not a valid IP address.</span>
6 0
3 years ago
Which programming language uses objects? C++ ALGOL Pascal BASIC
svetlana [45]

Answer:

C++

Explanation:

I am a c++ dev

7 0
3 years ago
Read 2 more answers
A web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardwa
andrezito [222]

Answer:

False

Explanation:

A web-based application encounters connectivity and compatibility relate to data server. It does not belong to any hardware environments.

A web based application is accessed over network.They run inside a web browser. Small of program is download to user's desktop, but this processing is done over internet.

6 0
3 years ago
Can someone tell me what all of these are?
Allisa [31]

Answer:

parts of a camera

Explanation:

5 0
3 years ago
Other questions:
  • Question: A famous Disney Movie partially takes place in this city.
    15·2 answers
  • A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2,048 sectors and there are 131,072 (217)
    11·1 answer
  • (1) Prompt the user to enter a string of their choosing. Output the string.
    11·1 answer
  • Few companies today could realize their full-potential business value without updated ________. Select one: a. IT investments ma
    10·1 answer
  • Kathy created a video presentation of her company, which will be shown on a television show as an advertisement. Her company wan
    11·1 answer
  • Which of the following statements is true of computer networks?
    6·1 answer
  • Plain text and ASCII text are the same thing. true or false
    12·1 answer
  • Pls help will mark brainliest as soon as u awnser
    15·1 answer
  • The system where the unit of measurement is centimeter
    15·1 answer
  • Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!