1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
2 years ago
7

What types of things were often NOT captured in early photographs?

Computers and Technology
1 answer:
I am Lyosha [343]2 years ago
4 0

Answer: Here's the answer: How to Identify 5 Types of Old Photographs 1 Daguerreotype (1840’s – early 1860) 2 Ambrotypes (1855-1865) 3 Tintypes (1856-1890’s) 4 Cartes des Visites (Introduced in 1859) 5 Cabinet Cards (1860-Early 1900’s)

Explanation: Pls mark me the brainiest and yw

You might be interested in
Distinguish between engineering and architecture​
Liula [17]

difference between engineering and architecture are.

A engineer is a person whose job involves designing and building engines, machines, roads, bridges ,etc .

While architect design buildings only.

3 0
3 years ago
To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security
marta [7]

the answer is True

there has to be a balance between security and the user experience

7 0
3 years ago
Identify the following verb by number and person by checking on the appropriate boxes.
Makovka662 [10]
Second person ig Imao yeah
3 0
2 years ago
Read 2 more answers
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
3 years ago
A firm has a huge amount of individual customer data saved in different databases. Which of the following can be used to integra
Rama09 [41]

Answer:

C. CMR systems

Explanation:

CMR or customer relationship management is a strategy that uses data analysis of customers to manage the interaction between a company and current and potential customers.

It analyses the data of client from different channels like wesites, email, social media,telephone log etc, describing and predicting potential decisions to be made to enhance customer service and acquisition.

6 0
3 years ago
Other questions:
  • What are some useful properties of current electricity
    13·2 answers
  • Your boss asks you to work through the weekend to install new software on the applications server that serves up applications to
    15·2 answers
  • Each object that is created from a class is called a(n) ____________ of the class.
    5·2 answers
  • The three tasks within data harmonization, namely: data consolidation, data cleansing, and data formatting use techniques called
    8·1 answer
  • Provide examples of the cost of quality based on your own experiences
    14·1 answer
  • Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to be availabl
    5·2 answers
  • RAM memory is intended?
    8·1 answer
  • Explain the following buttons as used in emails:compose,inbox and Draft.<br>​
    10·1 answer
  • Design a circuit that will tell whether a given month has 30 days in it.
    8·1 answer
  • After a group sets a project schedule, members should be prepared to
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!