1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
4 years ago
5

What occurs in a steam engine?

Computers and Technology
2 answers:
rusak2 [61]4 years ago
8 0

Answer:

Fuel is burned outside the engine

Explanation:

A steam engine is a heat engine that uses steam  as a working fluid, the steam engine performs due to the pressure produced  by the steam. the fuel which is the steam is been applied/burned outside the engine but it is  the pressure of the steam(fuel) that drives the steam engine into action.

All heat is used up for work some heat generated is lost to the surroundings it is only in ideal situation that all heat produced is used up for work. the type of engine that has its fuel burnt inside is a combustible engine as seen in modern day car Engine.

example of a steam Engine is A boiler full of water

VARVARA [1.3K]4 years ago
7 0
Fist one correct.
second wrong because not all heat is used for work, some of it lost to other.
third wrong because fuel burn inside is called combustion engine
 <span />
You might be interested in
Ana is a music lover. She loves to download songs and videos on her computer every time she hears a new song. One day, her compu
o-na [289]

Answer:

Storage outage

As many new songs are released to the Internet every day, Anna might have download thousands of them, which made her computer ran out of storage and RAM(random access memory )

5 0
3 years ago
A data analyst is working with a
ELEN [110]

The code chunk that is going to let this data scientists to do this is

  • unite(retail, “price”, price_dollars, price_cents, sep=”.”)
  • Option C

<h3>What is a code chunk in R</h3>

These are the means that are helpful for rendering the outputs that are in the R programming language to documents.

The chunk can help to show the written code for the sake of illustration.

<h3>Complete question</h3>

Please Choose The Correct Option ✔

A

unite(retail, price_dollars, price_cents, sep=”.”)

B

unite(retail, “price”, price_dollars, price_cents)

C

unite(retail, “price”, price_dollars, price_cents, sep=”.”)

Correct Answer

D

unite(retail, “price”, price_cents, sep=”.”)

Read more on R codes here:

brainly.com/question/26253705

7 0
2 years ago
Scatterplots are useful when applied behavior analysts are interested in finding out the ________ distribution of the target beh
DENIUS [597]

Answer:

The answer is "Option A".

Explanation:

Scatterplots are kinds of graphs or mathematical plots, that display variables using Algebraic, coordinates for usually dual variables for a set of data. It is an application, that targets an activity, a diffusion graph shows the event, which is normally linked to specific periods, and wrong choices can be described as follows:

  • In option B, It is incorrect because it is used in shareholders.
  • In option D, It is used in a normal random variable, that's why it is incorrect.
  • In option C, It is incorrect because it is used in the frequency distribution.

7 0
3 years ago
If you have an array of 100 sorted elements, and you search for a value that does not exist in the array using a binary search,
Juli2301 [7.4K]

Answer:

50

Explanation:

as binary search will search the array by dividing it into two halves till it find the value.

7 0
3 years ago
1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
VMariaS [17]

Answer:

Explanation:

1.  D Malware causes harm, the other answers seem irrevelant.

2.  B Because they all can cause harm to a server, device or network. (trojan for device, worm for device and bots for networks)

3.  B I haven't heard of viruses deleting hard drives, but lots of viruses do slow

down your computer.

4. D Phishing is a way to obtain data so yes.

5. ? This one is wierd... We can rule out D because that's not always true but you have to decide this on your own.

6. Obviously C? Using old versions can make your computer more

susceptible to malware.

7. D Because all of those can be uses.

8. D Malicous software

9. This is a hard one... Not D, Most likely not B and C is probably more

common.

10.  D It's MOBILE malware

6 0
3 years ago
Other questions:
  • List three reasons you might use hwinfo when troubleshooting and upgrading a computer
    10·1 answer
  • Neighbor discovery performs many of the functions that icmp router discovery and icmp ____ handled in ipv4.
    13·1 answer
  • How much does a Canon PowerShot G7X cost in America?
    14·1 answer
  • Assume that a file containing a series of integers is named numbers.dat and exists on the computer's disk. design a programt hat
    15·2 answers
  • A computer is displaying a pop-up message demanding payment or the hard drive will be encrypted. Which of the following BEST des
    8·2 answers
  • _____is the way a society lives.
    7·1 answer
  • To insert a footnote in a document, a user would navigate to the _____ tab.
    5·2 answers
  • Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access.
    5·1 answer
  • Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
    15·1 answer
  • Which device is used to direct the flow of data on a computer network?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!