1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
4 years ago
15

Question 3 Which industrial revolution can the invention of the flashlight be associated with?

Computers and Technology
1 answer:
Ket [755]4 years ago
7 0

Answer:

The invention of flashlight is associated in the late period of industrial revolution.

Explanation:

  • During the industrial revolution, Europe and United States flipped the use or technology in the manufacturing processes of industries.
  • At the time of industrial revolution many chief inventions like, steam engine, dynamites etc. were made that the traditional history and reformed the technology.
  • Thomas Edison in 1879, invented the battery and flashlight at the late period of industrial revolution which was also a major invention
You might be interested in
​Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and
SCORPION-xisa [38]

Answer:

The correct answer for the following question will be A. Cipher code.

Explanation:

Cipher code:

Ciphers are potentially the cryptographic central pillar. A cipher is usually an algorithm to perform both encryption and decryption.

Secret key encryption relies on the use of symmetric ciphers. Whether the goal is to convert plaintext to ciphertext and vice-versa. The secret key is shared on both ends, and the person having the secret key can only encrypt and decrypt the data.

So, option A is a suitable answer.

3 0
3 years ago
Which of the following is not an advantage of a flowchart?
ad-work [718]

Answer:

d) Improper documentation

Explanation:

A flowchart is a type of diagram in which it presents the flow of the work or how the process is to be followed. It is a diagram that represents an algorithm that defines step by step approach to solving the task. In this, there are various boxes that are linked with the arrows

There are various advantages like in this, there is a better communication, coding is to be done in an efficient way, system could be tested also there is a proper documentation

hence, the correct option is d

4 0
3 years ago
How are a members details be checked and verified when they return to log back in to the website ?
aksik [14]

Answer:

When you sign into a website, you have to enter a password and username most of the time, which will allow the website to know that you have checked in and it is you, who is using your account.

6 0
3 years ago
Compute the approximate acceleration of gravity for an object above the earth's surface, assigning accel_gravity with the result
Zepler [3.9K]

Answer:

The summary of the given query would be summarized throughout the below segment. The output of the question is attached below.

Explanation:

Given values are:

  • G = 6.673e-11
  • M = 5.98e24
  • accel \ gravity = 0
  • dist\ center=float(inp())

here,

inp = input

By utilizing the below formula, we get

⇒ \frac{GM}{d^2}

Now,

⇒ accel \ gravity=\frac{G\times M}{dist \ center**2}

⇒ print("Acceleration of gravity: {:.2f}".format(accel_gravity))

6 0
3 years ago
Law Enforcement Online (LEO) is a secure intranet system created and maintained as a tool for communicating, obtaining mission-c
zalisa [80]

Answer:

Federal Bureau of Investigation

Explanation:

LEO seems to be a protected intranet network developed as well as operated as a resource for networking, accessing task-critical information, delivering or engaging through online training services, as well as engaging in technical or contextual conversations for concern. The Federal Bureau of Investigation seems to be accountable for managing LEO.

  • Option A is not correct according to the statement because It is primarily responsible for organizing as well as conducting US narcotics operations including domestically as well as internationally.
  • Option C is not correct according to the statement because it is responsible for terrorist attacks and other disasters.
3 0
3 years ago
Other questions:
  • 3.34 LAB: Mad Lib - loops in C++
    14·1 answer
  • What are the role, responsibilities, and required background of the production designer of a film?
    6·1 answer
  • Your browsing the Internet and realize your browser is not responding which of the following will allow you to immediately exit
    14·2 answers
  • Carbon monoxide poisoning can result from breathing
    15·1 answer
  • Moving read emails to a folder is a great way to stay organized. <br> A) True <br> B) False
    7·2 answers
  • Write a function that parses a binary number into a hex number. The function header is:def binaryToHex(binaryValue)Write a test
    11·1 answer
  • The __________ on a mouse is used to select or place the cursor where you want on the page
    13·1 answer
  • Find the quotient. 2.5 ÷ 5
    8·2 answers
  • What is the minimum number of different résumé formats that an individual should have prepared?
    10·1 answer
  • You're asked to recommend potential data structures to use as the backing for implementing Kruskal's algorithm. Which of the fol
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!