1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alisiya [41]
3 years ago
6

Which black inventor patented fifty different devices, most of them dealing with the lubrication of machines, and successfully c

ontested claims against the genuineness of his designs?
Computers and Technology
1 answer:
balandron [24]3 years ago
4 0

Answer:

American engineer Elijah McCoy was born in Canada but became US citizen very young, and and made vital contributions in the United States after the Civil War such as in the progress of locomotives design and railroads in America, the automatic lubrication systems for steem engines and many other inventions among his 57 U.S. patents that made train travel more efficient.

Explanation:

You might be interested in
Ok.,so i have a sopitify account and by accident i pressed the downlaod on button and it says start you free trial i pressed tha
Rudiy27
Just cancel the trial.
6 0
3 years ago
Read 2 more answers
The most effective technique of malware propagation among the following list
iVinArrow [24]

Question Completion with Options:

A. Embedding & packing malcode in application programs

B. Replacing the Import-Address-Table (IAT)

C. Appending & prepending malcode into application programs

D. Embedding malcode in documents, such as MS O Office & PDF

Ε. Replicating malcode's source code

Answer:

The most effective technique of malware propagation among the following list is:

A. Embedding & packing malcode in application program

Explanation:

Malware propagation becomes effective and replicates effortlessly when malicious codes (otherwise called malcodes, which are self-replicating malicious programs) are embedded and packed in application programs.  These usually take many years before they start to manifest, making them very difficult to detect.  They are often triggered by some set events.  Given the nature of malcodes and the culprits behind them, they are very dangerous to applications and pose substantial business risks.

6 0
3 years ago
Impanation stage contain ​
Katen [24]
I would need more to answer your question
7 0
3 years ago
A user states that when they power on their computer, they receive a "Non-bootable drive" error. The user works with external st
laila [671]

Answer:

B. Device boot order

Explanation:

The Device boot order makes a list of all the possible devices a system should check to in the operating system's boot files, as well as the proper sequence they should be in. Removable devices, hard drives, and flash drives are some devices that can be listed in the device boot order.

For the user whose computer displays a 'non-bootable drive' error, the device boot order would check all the devices listed to attempt booting from any of them. These devices might be in the order of removable discs, CD-ROM, hard drive. If all the options do not work, the computer would then do a Network boot. The order in which the devices are listed can be altered by the user.

8 0
3 years ago
What is the number reason for conflict on a team?
Viefleur [7K]

Answer:

jvphcrx8cctiit9t9t9t

5 0
3 years ago
Other questions:
  • Which is the correct process for adding page numbers to a spreadsheet you will print? A. Click Page Break Preview. Type the page
    7·1 answer
  • How do you convert a decimal to binary?
    9·2 answers
  • Can someone please help??
    12·1 answer
  • _____ is a program that allows a person using one computer to access files and run programs on a second computer that is connect
    11·1 answer
  • Paul is playing a game when his computer shuts down unexpectedly. Paul has noticed recently that his fans are running very loud.
    13·1 answer
  • What computer is designed to meet the computing needs of several people simultaneously in a small to medium-size business enviro
    5·1 answer
  • Splunk knows where to break the event, where the time stamp is located and how to automatically create field value pairs using t
    7·1 answer
  • Describe the different
    12·1 answer
  • Paul wants to store addresses and phone numbers for clients. Paul wants to use this information to send form letters. Paul shoul
    5·1 answer
  • Explain why agile methods may not work well in organizations that have teams with a wide range of skills and abilities and well-
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!