1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
3 years ago
14

What natural resources fueled industrialization in the united states?

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
5 0

Natural Resources that fueled American Industrialization

 

<span>1. Iron ore: Used to create steel and pig iron.  Used for railroad ties, bridges, buildings.</span>

 

2. Coal: with the invention of the steam engine, coal replaced wood in fueling the steam engine and machinery used in various industries such as the steel industry.

 

<span>3. Oil: The ability to use a steam engine for oil drilling started an oil boom in the United States.  It helped with the creation of a Petroleum-refining industry.  Transformed oil into Kerosene and later gasoline for the automobile</span>

 

Lumber: Used to fuel the steam engines that were used on trains, steamboats, and in industry for the new machines being invented that ran on steam.

<span> </span>

You might be interested in
Which CIDR network has the smallest possible number of hosts? a. 123.0.0.0/8 b. 123.45.0.0/16 c. 123.45.67.0/24 d. All have the
Lina20 [59]

Answer:

CIDR is based on a variable-length subnet masking technique, which allows a new method of representation for IP addresses. Routing prefix is written with a suffix number of bits of the name, such as 123.0.0.0/8, as the CIDR network has the smallest possible amount of hosts.

Explanation:

CIDR ( Class Inter-Domain Routing ) It is a method that is allocating IP addresses and routing the IP. CIDR is introduced in 1933 and replace the architecture of network design on the internet. CIDR slows down the growth of the routing across the web and helps to slow the IP addresses such as IPv4 addresses.

CIDR consists of two groups of bits in the address. In the new age, the network prefix identifies the whole network. This is used as the basis of routing between IP networks and allocation policies.

IPv4 in-network prefix is 8-bit groups.

A typical IPv4 address is 192.168.0.5 the lowest value is 0, and the highest value is 255

In the given choices, 123.0.0.0 / 8 of the possible smallest number of hosts.

8 0
3 years ago
If you want to track users and sessions across multiple domains, what must you set up?
OlgaM077 [116]
The correct answer is:
Cross-domain tracking

Explanation and more info in http://www.certificationanswers.com/en/if-you-want-to-track-users-and-sessions-across-multiple-domai....
6 0
3 years ago
Do you think Apple will eventually meet their goal of becoming a replacement for a physical wallet
Dmitry_Shevchenko [17]
Yes they are the leading tech innovators of the 21st century and have already made massive strides in this direction
8 0
3 years ago
Which of the following is true about operating system.
zalisa [80]

Answer:

google kis kam ka hai us se puch lo

7 0
3 years ago
you have been tasked with configuring a digital information station in the office's lobby. guests will be able to use the statio
REY [17]

The most important security consideration for the station is code signing. With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer.

With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer or mobile device with malware. Code signing has grown in importance for software developers and distributors as more software may be downloaded from the Internet.

Malware can be easily installed on a victim's computer by an attacker who poses as a trustworthy source. As long as users only download software that is regarded as safe by their operating system, code signing ensures that these types of assaults cannot happen.

Nowadays, the Operating System looks for the digital certificate produced through code signing when software is downloaded onto a computer to ensure the security of the software being installed. The user is informed and given the option to stop or continue the installation if no digital certificate is detected.

To know more about code signing click here:

brainly.com/question/28860592

#SPJ4

3 0
1 year ago
Other questions:
  • Launched in 1995, ________ has become the most popular web browser.
    6·1 answer
  • Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. Th
    15·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    6·1 answer
  • Controlled intersections use some form of which of the following:
    7·1 answer
  • What is the post condition of an expression or variable
    11·1 answer
  • How to determine if the function f(x) = x^2 + 3 from real numbers to real numbers is Injective, surjective, or bijective
    13·1 answer
  • 50 points!!!!!
    9·2 answers
  • All nuclear energy results in the rapid release of energy, such as in atomic bombs. true or false
    8·1 answer
  • The scheme function (mult2-diff Ist) should take one argument, a list of numbers, and results in multiplying each number in the
    11·1 answer
  • Question 1 of 10
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!