1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
3 years ago
12

How were images captured before the invention of the camera?

Computers and Technology
1 answer:
xeze [42]3 years ago
5 0

Answer:

The British inventor Fox Talbot produced his first successful photographic images in 1834, without a camera, by placing objects onto paper brushed with light-sensitive silver chloride, which he then exposed to sunlight.

Explanation:

You might be interested in
How do the interests of carriers differ from the interests of websites? What are the implications for websites from a value chai
Keith_Richards [23]

Answer:

Explained below.

Explanation:

- The interest of the carriers has it's major focus on the process of getting funds from both individual customers and corporate entities that run the websites. However, the interest of websites’ has it's major focus on the process of generating funds in form of subscriptions or funds gotten from paid adverts from both individual customers and corporate entities.

- In terms of value chain perspectives; the websites experience far more pressure to keep fresh and exciting features and services on their platform while carriers don't experience that but only experience having to compete with innovations being done by their existing competitors to remain leaders in the field.

7 0
3 years ago
Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by au
AnnyKZ [126]

Answer:

Option B (Deployment of write once read many (WORM) drives) is the appropriate one.

Explanation:

  • SIEM application goods/services consolidate safety information management (SIM) with security event management (SEM) throughout the area of device protection. We include an overview including its known vulnerabilities created by users and network equipment in actual environments.
  • No quantity of administrative intervention will alter the substance on something like a WORM disc, even by physical disc disruption or failure. That would be the better-suggested choice.
7 0
4 years ago
Fifty part-time students were asked how many courses they were taking this term. The (incomplete) results are shown below. Need
Ne4ueva [31]

Answer:

The answer for B is 10% and for C is 40%.

Explanation:

To get the percentage for B you take the the frequecy of students taking 2 courses (5) and multiply it by 100 then you divide it by whole number of students.

For C you do the after adding the number of students taking 1 or 2 courses (20).

5 0
3 years ago
Which of these devices is usually the default gateway for most home networks?
IrinaVladis [17]

What are the choices?

6 0
4 years ago
Finish the sentence. If the IP address and MAC address are parameters of layer 3 and layer 2, respectively, a port number is a p
stepan [7]

Answer:

Layer 4

Explanation:

MAC address works at the data link layer (layer 2) of the OSI model. Mac address allows computers to uniquely identify themselves in the network

IP Address is a logical address that works at the network layer of OSI model (layer 3) (actually the IP layer of TCP/IP model).

The port number works at the transport layer of the OSI model (layer 4).The port number uses sequence number to send segments to the correct application thereby ensuring they arrive in the correct order.

7 0
3 years ago
Other questions:
  • Microsoft windows is the least used operating system true or false?
    15·2 answers
  • Explain free space allocation?
    9·1 answer
  • What tool do you use to secure remote access by users who utilize the internet??
    7·1 answer
  • What would you use to exit from a for each activity and continue the execution of the workflow?
    13·1 answer
  • if image size and resolution are the same, which file format, .jpg, .gif, .or .tiff, will give you the smallest file size?
    8·2 answers
  • Many contemporary languages allow two kinds of comments: one in which delimiters are used on both ends (multiple-line comments),
    7·1 answer
  • The paint 3D program is used for drawing picture true or false​
    10·2 answers
  • Who knows my sister better?
    15·2 answers
  • What is the output of this program? age=4 if age >5: print (“more”) else: print (“less”)
    7·1 answer
  • susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct state
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!