1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pshichka [43]
4 years ago
10

The apparent magnitude of a star is the brightness of a star

Computers and Technology
2 answers:
mihalych1998 [28]4 years ago
8 0

Answer:

c. as seen from the Earth without the effect of the atmosphere

Explanation:

The stars and objects in the sky emit light that, regardless of the distance they are, reaches us with greater or less intensity, being brighter the closer, larger, and / or higher temperature they have, and vice versa. This luminosity is called magnitude, and it is known that since ancient civilizations it was classified by the intensity of its brightness.

The apparent magnitude is the luminosity that the object shows us as it is seen in the sky, regardless of the temperature, the size or the distance at which it is located, and it is expressed with a number that can result, depending on the brightness , positive or negative, being brighter the smaller that number is (an object with a negative magnitude will always be brighter than one with a positive magnitude).

We can verify that, as we said at the beginning of the entry, today we observe magnitudes that are far from the first to the sixth used by Hipparchus for its catalog. Later we will see what is being talked about here with some examples, although the fact that there are magnitudes with a negative value should already give you a clue as to what you will see.

Lana71 [14]4 years ago
6 0
<span>c. as seen from the Earth without the effect of the atmosphere</span>
You might be interested in
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
CPT, which is used to code procedures in an office, is an example of a/an
ExtremeBDS [4]
 <span>Current Procedural Terminology

is used for general check up

</span>
3 0
3 years ago
VW discovered that its engineers had developed a software program that allowed some of its car models to run without emissions c
den301095 [7]

Answer:

d. ​Blanchard/Peale model

Explanation:

In order to conduct proper emission test, it is essential to follow the three steps proposed by Blanchard and Peale. Their proposition can be used to answer the necessary ethical questions and proffer solutions. Therefore, the company should have conducted an ethical check to resolve the ethical issue. The correct answer is option d.

4 0
3 years ago
Read 2 more answers
Have you ever used a device that relies solely on the cloud?
Morgarella [4.7K]
Yeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeesss i have
8 0
3 years ago
A(n) ____ address is an assigned series of numbers, separated by periods, that designate an address on the Internet.
schepotkina [342]

Answer: An <em>IP</em> address is commonly referred to as an accredited series of numbers, disjointed by periods, this eventually provides an address on web. In laymen terms, an IP address is commonly known as a numerical label accredited to a device that is connected to a network which uses the IP for communication.

6 0
3 years ago
Other questions:
  • What is an optical storage device?
    7·2 answers
  • Describe a way in which a badly-designed or badly-constructed STRUCTURAL subsystem might impact the PROPULSION subsystem.
    5·1 answer
  • Suppose a program takes 1000 machine instructions to run from start to end, and can do that in 10 microseconds when no page faul
    9·1 answer
  • How to study program ?
    11·1 answer
  • Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
    6·1 answer
  • How many bits must be “flipped” (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase ‘a’ that’s represe
    7·1 answer
  • A bagel shop has two locations, one campus location and one downtown location. A random sample of 40 customers at the campus loc
    13·1 answer
  • Write a function solution that, given an integer N, returns the maximum possible
    8·1 answer
  • What is the best free website to learn phyton programming
    5·1 answer
  • What are the three benefits of incremental development, compared to the waterfall<br> model?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!