1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nostrana [21]
4 years ago
6

Why we can not see objects around us in the dark​

Computers and Technology
1 answer:
malfutka [58]4 years ago
4 0

Answer:

We see an object when light falls on it and gets reflected from its surface and enters our eyes. In a dark room, there is no source of light. no light falls on the surface of objects and we do not see them. This is why we cannot see the objects in a dark room.

You might be interested in
Which statement about UML class diagrams is true?
uysha [10]

Answer:answer is b

Explanation:

6 0
3 years ago
How to transfer music from computer to iphone?
vladimir1956 [14]
Depends on how you wanna do it, through iTunes or whatever other you are syncing from
8 0
3 years ago
Two electronics students are discussing static electricity and electric current. Student A says that a basic property of static
Svet_ta [14]
The answer is D. Only student B is correct. Student A is incorrect because static electricity can be detected through the principle of electrostatic induction, which will indicate if there are static electricity on the surface of an object. A device which can detect static electricity is an electroscope. Moreover, for student B, it is correct that the cause for electric current to flow is the uniform flow of free electrons.
3 0
3 years ago
________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
pantera1 [17]

Answer:

The correct answer to the following question will be Option B (VPN concentrator).

Explanation:

  • Virtual Private Network (VPN) is a virtual, limited-use network generated using protocol encryption and tunneling over physical, public network connections.
  • A dedicated tool for managing VPN connections built over an untrusted network, such as the Internet, is called a VPN concentrator.
  • It's a type of networking system that ensures secure VPN connections are established and messages are transmitted between VPN nodes.

Therefore, Option B is the right answer.

7 0
3 years ago
What special responsibilities do computer professionals have with respect to understanding and protecting the privacy rights of
Lerok [7]

Explanation:

There are ethical responsibilities that must be linked to the use of technological systems by computer professionals in relation to the protection of the privacy rights of their fellow citizens.

Exercising ethical behavior is essential for computing to be used for its central benefits, which is to make life and tasks simpler and more dynamic, and not for technical knowledge about computer science to be used for personal or other benefits. , therefore, it is ideal that there is ethical responsibility for computer professionals so that ethical decisions are taken so that knowledge is used for the benefit of society and not to commit illegal acts.

7 0
3 years ago
Other questions:
  • Can I change my brainly username?
    9·2 answers
  • Based on your learning this week, consider rules, policies, and procedures. Technicians are often eager to just get started on a
    10·1 answer
  • I have to write a program with a function that finds the biggest out of 3 numbers, but the problem is i have to use a reference
    6·1 answer
  • Write a program that displays the values in the list numbers in ascendingorder sorted by the sum of their digits.
    8·1 answer
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    13·2 answers
  • Write a program that creates a two-dimensional array named height and stores the following data:
    15·2 answers
  • Suppose you decide to use the number of times you see any of the area codes of the places Yanay has been to in 50 spam calls as
    9·1 answer
  • Why would you choose a mobile device over a laptop? 1-2 sentences.
    11·1 answer
  • Ethan is a project manager who is responsible for overseeing overall budget and schedule. Which tool is he is MOST likely to use
    7·1 answer
  • In the Burp Suite Program that ships with Kali Linux, what mode would you use to manually send a request (often repeating a capt
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!