1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
3 years ago
7

Of the two triggers on a nail gun, which one is this most dangerous to use?

Computers and Technology
2 answers:
AlladinOne [14]3 years ago
7 0

the answer for this question is Sequential trigger hope i helped

Pepsi [2]3 years ago
4 0
Thank you for posting your question here at brainly. Below are the choices that can be found elsewhere. 
<span>A.Contact trip trigger
B. Sequential trigger

The answer is Sequential trigger. T</span><span>he sequential trigger is more dangerous because it doesn't require contact at the tip of the gun to fire.</span>
You might be interested in
When using a search engine, what is the name of a word or phrase somebody types to find something online?
KIM [24]

Answer:

Option C:  Search query

Explanation:

A search query is the text input given by the user when finding something online. The text input can be a word or phrase.

For example, a simple word search query can be Biology.

A more complicated search query can consist of phrases like Who is the highest Paid NBA Player

The search engine will return the corresponding web pages where the relevant answers or information can be found.

8 0
3 years ago
Read 2 more answers
1. Describe a linear search (explain how it works).
timurjin [86]
1. A linear search searches on a straight path, hence the term “linear”. So a linear search would search from a one index to another in a straight path. For example, a linear search of an array, if given given the first and last index of the array, would search it one index after the other. First it would check index 0, then index 1, then index 2, and so forth.

2. A linear search can be useful if you are trying to find more than one instance of an value in a data structure. Since you want to search the whole array for each instance of the object or value.

3. A binary search only works with sorted data structures. It takes a data structure, finds its mid point, and checks I see if the value it is looking for is greater, less than, or equal to the midpoint value. If it is equal to the midpoint value, it’s finished and the search function is over.
If it’s greater than the midpoint, it disregards the lower half of the data structure and focuses on the upper half. If it’s less than the mid point then it disregards the upper half and focuses on the lower half.
It then repeats what it did at the beginning of the search function to again narrow down the amount of searching that needs to be done. In other words, if it disregarded the lower half of the data structure in the first part of the search, it finds the midpoint of the upper half of the data structure, checks to see if the value it’s looking for is greater than, less than, or equal to the midpoint. If it’s equal to it the searching is done, if it’s greater it disregards the lower half of the upper data structure, and repeats the process.
It will continue to do this until either the value is found or the value is not found.

4. You would use binary search if you are searching for one specific value in a sorted data structure.

5. A binary search must have a sorted data structure for it work.

6. Binary search is more efficient because the cost to run a binary search is substantially less than running a linear search.







7 0
3 years ago
Explain the third <br> generation
meriva
Computers were computers that emerged due to the development of the integrated circuit.
8 0
3 years ago
What services are used to help speed the development and deployment of internal custom applications?
PtichkaEL [24]

A, Protocol

because An application service provider (ASP) is a business providing computer-based services to customers over a network; such as access to a particular software application (such as customer relationship management) using a standard protocol (such as HTTP).

7 0
3 years ago
Read 2 more answers
. Identify an emerging crime issue in your community using data available from sources such as local newspapers, online police r
Minchanka [31]

A crime problem in my community is related to cell phone theft. According to the local newspaper, it is estimated that in my city about 10 cell phones are stolen per week. Still according to the local newspaper, most of these robberies occur in the city center and in the periphery, with women being the biggest victims.

Although the police have shown themselves to be a restraining force on this type of crime, few arrests have been made successfully, mainly for the negligence of the victims in providing a complaints.

The main driving force behind this crime is drug trafficking. Most burglars steal cell phones to sell them and have money to buy drugs. This is totally related to the government's neglect to promote quality education in the city, allowing several children and young people to stay on the street and run the risk of becoming involved in the traffic.

A cause and effect diagram for this situation is:

Irresponsible government ---> poor quality education ---> children and adolescents on the streets ---> involvement in drug trafficking ---> theft of cell phones ----> frightened population --->  lack of complaints ----> criminals on the street.

3 0
3 years ago
Other questions:
  • Someone help me I don’t know what to do /COMPUTER SCIENCE
    5·1 answer
  • Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
    5·1 answer
  • How do you measure objects and re-size them in tinkercad? I need it in steps.
    7·1 answer
  • A USB device used to transfer photos from the memory card to a hard drive is called a _____.
    5·2 answers
  • Which of the following Web sites would be MOST credible?
    6·1 answer
  • How can you rotate and resize your drawing?​
    9·2 answers
  • Examples of application software​
    7·2 answers
  • What is functionality criteria or alternative word
    8·1 answer
  • What is problem scoping
    14·1 answer
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!