1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
6

Which result would support the particle theory of light?

Computers and Technology
2 answers:
andriy [413]3 years ago
8 0

This question is related to the emission of electrons when light shines on an metal. (Photoelectric effect)

With the classical theory, it was thought that increasing or decreasing the intensity of light would increase or decrease the kinetic energy of the electron.,

Another expected result was that time gap between when light strikes the metal and when electrons are ejected, would depend on the intensity of such light.

However, the experimental results were not consistent with the particle theory of light. So your answer is A. 

Later on this effect was correctly explained by Einstein based on Planck's findings.


Elden [556K]3 years ago
4 0

the answer id definently b

You might be interested in
PLS HURRY!!<br> Look at the image below
Crank

The output will be 10.

The while loop runs until numb is equal to or less than 13.

25 - 5 = 20

20 - 5 = 15

15 - 5 = 10, which is less than 13 so the loop stops and 10 is printed to the screen.  

4 0
3 years ago
Define a method named swapValues that takes an array of four integers as a parameter, swaps array elements at indices 0 and 1, a
Luba_88 [7]

The program is an illustration of arrays.

Arrays are used to hold multiple values.

The program in java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main{

   //This defines the method

public static int[] swapValues(int[] arr) {

   //This swaps the first and second array elements

       int temp = arr[0];

       arr[0] = arr[1];   arr[1] = temp;

   //This swaps the third and fourth array elements

       temp = arr[2];

       arr[2] = arr[3];   arr[3] = temp;

   //This returns the swapped array to main

       return arr;

}

//The main method begins here

   public static void main(String[] args) {

       //This creates a Scanner object

       Scanner input = new Scanner(System.in);

 //This declares an array of 4 elements

 int[] intArray = new int[4];

 //This gets input for the array

 for(int i = 0; i<4;i++){

     intArray[i] = input.nextInt();

 }

 //This calls the swapValues method

 intArray=swapValues(intArray);

 //This prints the swapped array

 for (int i = 0; i < 4; i++){

 System.out.print( intArray[i]+ " ");     }

}  

}

At the end of the program, the elements are swapped and printed.

Read more about similar programs at:

brainly.com/question/14017034

6 0
3 years ago
What are the contents of memory locations 200, 201, 202, and 203 if the word 1234 is stored at offset 200 and the word 5678 is s
Igoryamba

Answer:

Data at the following addresses will be as following:-

200 :- 34

201 :- 12

202 :- 78

203 :- 56

Explanation:

If there is 1 byte storage.

if the data is of 4 digits.Then we have to store it in 2 memory locations.

The first two digits will be stored at the higher byte address that is 201 and the last two digits will be stored at then lower byte address that is 200.

The case is same with the next data 5678.

At address 202 :- 78 will be stored and at address 203 :- 56 will be stored.

3 0
3 years ago
Eva is the network architect for her company's large cloud deployment; she has interconnected her private cloud to a community c
ivann1987 [24]

Answer:

The appropriate response is "Cloud bursting".

Explanation:

  • A strategy for the implementation of a program in a proprietary cloud or network infrastructure that explodes onto a public cloud if availability or production for computational power increases, could be considered Cloud bursting.
  • It enables extra cloud capabilities throughout cases where additional facilities have been required.
6 0
3 years ago
Browsers often store the cookies in individual files, each named for the server that owns the cookie. Whenever the browser visit
Anna11 [10]

Answer:

The answer is TRUE.

Explanation:

Cookies in browsers are like identification criteria. It contains unique data to a specific user. The use of this is to ensure that servers or websites that you have visited previously will recognize you as the same user who has been there before. This will cause the data and website information to load faster that before.  

Think of it as your school's gate. The security guard is the browser. He will let you inside the campus without question since he has seen your school ID or has recognize you as a student of the school.  

Cookies come in various types such as:

  • Authentication cookies - most common type of cookies that websites used to recognize you as the user who has been there or logged in before.
  • Persistent cookies - cookies that can be used for long term. Sometimes, you will encounter websites that allows the user to remember his log in credentials, this is the type of cookies that these websites used. Often, these cookies are willingly enabled by users.
  • Session cookies - cookies with expiration or being stored temporarily. These cookies will be terminated once the browser is closed.
  • Third-party cookies - These are additional cookies being added by the website you are using. But these cookies are not owned by the website itself, but is being used by other websites to track down your activities to make you see and experience advertisements that are catered to you. These are mostly exposing threats.
8 0
3 years ago
Read 2 more answers
Other questions:
  • What does xhtml stand for?
    5·2 answers
  • Computer-generated color images of the brain that provide information about brain activity and glucose metabolism are produced b
    8·1 answer
  • Explain how to implement two stacks in one array A[1..n] in such a way that neither stack overflows unless the total number elem
    7·1 answer
  • You are a network technician for a small corporate network. It's been decided that the office needs a wireless network for emplo
    6·1 answer
  • If you want a user to actively participate in an online activity, create a web ______________.
    12·2 answers
  • The Daily Trumpet newspaper accepts classified advertisements in 15 categories such as Apartments for Rent and Pets for Sale. De
    9·1 answer
  • Why do many experts recommand longer time horizonal if you are doing high risk investment
    7·1 answer
  • Examine about the Internal &amp; External Fragmentation methods give an example for each. essay​
    15·1 answer
  • Computer that process digital as well as analogue signals​
    11·1 answer
  • Which layer of the OSI model provides a user interface in the form of an entry point for programs to access the network infrastr
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!