1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
4 years ago
6

Which result would support the particle theory of light?

Computers and Technology
2 answers:
andriy [413]4 years ago
8 0

This question is related to the emission of electrons when light shines on an metal. (Photoelectric effect)

With the classical theory, it was thought that increasing or decreasing the intensity of light would increase or decrease the kinetic energy of the electron.,

Another expected result was that time gap between when light strikes the metal and when electrons are ejected, would depend on the intensity of such light.

However, the experimental results were not consistent with the particle theory of light. So your answer is A. 

Later on this effect was correctly explained by Einstein based on Planck's findings.


Elden [556K]4 years ago
4 0

the answer id definently b

You might be interested in
Trent is a skilled sketch artist who wants to create images for his online portfolio. He is even
Sidana [21]

Answer: A digital tablet

Explanation: a scanner wouldnt show how to draw, a stock image would just show an image, phtot editing is to edit a picture took like to change the light. The answer is Digital tablet because you can draw on it while recording.

8 0
3 years ago
Write a short note on pen drive​
lbvjy [14]

Answer:

They are called "flash drive" because they use flash memory to store files. Other common names for a flash drive include pendrive, thumbdrive or simply USB. USB flash drives have some advantages over other portable storage devices.A pen drive is a portable Universal Serial Bus (USB) flash memory device for storing and transferring audio, video, and data files from a computer. A pen drive usually has a large storage capacity and provides quick data transfers.

8 0
3 years ago
After several incidents in __________ the company’s computer systems were not ready to support new products, the CEO established
frutty [35]

Answer:

Cross-functional team

Explanation:

The CEO would establish a CROSS-FUNCTIONAL TEAM wWichita would consist of employees from different departments, who would work together on future product rollouts.

Cheers

4 0
4 years ago
You are the owner of a small business. In the last year, you have started to hire employees and you now have 5 employees. Each h
salantis [7]

Answer:

a. The user access agreement

Explanation:

The first document that should be created would be the user access agreement. This is a document that holds all of the policies and guidelines that the employees of a company need to follow when using the companies equipment, software, or network. This includes behavior on the internet such as browsing specific sites, illegal activity, or personal hobbies during work hours, as well as offline such as using company hardware for personal gain. This is a document that is absolutely required for every company in order to protect the company from the consequences of certain employee activity.

6 0
3 years ago
Interpret the Department of Homeland Security’s mission, operations and responsibilities.
Shalnov [3]

Answer:

 The department of homeland security mission is to provide the efficient and good security system to the nation in all the aspects against the terrorism.

The main aim of the department of homeland security mission is to anticipate fear based oppressor assaults inside the United States, decrease the weakness of the United States to psychological oppression, and limit the harm, and aid the recuperation from psychological oppressor assaults that do happen in the United States.

The main responsibility of this department is that:

  • Providing the security against the threats of terrorism attacks
  • Providing the effective and quick recovery from the disaster
  • Also, give the secured cyber space to the homeland.
7 0
3 years ago
Other questions:
  • Technician A says copper has a low resistance. Technician B says the length of wire doesn't affect resistance. Who is correct?
    11·1 answer
  • What is entered into a cell that is typically numeric and can be used for calculations?
    9·2 answers
  • What is jcl language on the mainframe?
    10·1 answer
  • Which of the following items is an example of software? A. WORD PROCESSING PROGRAM B. KEYBOARD C. PRINTER D. MOUSE
    7·1 answer
  • After Brooke has helped Simon to resolve his original problem, Simon asks her about another linked workbook he has received. The
    7·1 answer
  • What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
    14·1 answer
  • a pair of shoes is on sale for 15% off with this discount customers will pay $9 if they buy the shoes ​
    14·1 answer
  • What is an example of value created through the use of Deep Learning?​
    12·2 answers
  • In order to preview an attachment in an e-mail, click the attachment in the ______
    8·1 answer
  • What are different ways that celebrities try to connect with fans using the Internet and social media?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!