1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
3 years ago
15

What effects will the different types of lighting produce on mountains?

Computers and Technology
1 answer:
bonufazy [111]3 years ago
3 0
Once enough charge has been separated in a growing storm, a lightning flash can occur. These normally travel within or between clouds (abbreviated CC) or from cloud to ground (CG). Most storms produce more CC than CG flashes--about six times as many in tropical storms and two times as many in midlatitudes. Sometimes a flash will travel from cloud to air or simply occur within "clear" air.

Exactly what triggers flashes is still uncertain and an area of continued research. It seems that very concentrated electric fields (perhaps at the ends of pointed surfaces or single particles) are needed to accelerate charged particles, or ions. Once moving with sufficient energy, the ions appear to blaze a path toward opposite charge in cascading fashion.

You might be interested in
Which keyword should return web pages about guitars and about guitarists?
Lera25 [3.4K]
I think it is B because the + sign is saying that there is more than just guitars
Hope this is helpful :D
7 0
3 years ago
Describe the steps involved in data mining or data analytics when viewed as a process of knowledge discovery.
Aleksandr [31]

Answer:

1. Data Cleaning

2. Data Integration

3. Data Selection

4. Data transformation

5. Data Mining

6. Pattern Evaluation

7. Knowledge presentation

Explanation:

The steps involved in data mining or data analytics when viewed as a process of knowledge discovery includes the following:

Step 1. Data cleaning: this involves the elimination of inconsistent data.

Step 2. Data integration: this involves the combination of data from multiple sources.

Step 3. Data selection: this is the step where significant data for task examination are gathered from the database.

Step 4. Data transformation: this the step in which the data are modified for mining by conducting the aggregate operation.

Step 5. Data mining: this step involves the extraction of data patterns through specific techniques.

Step 6. Pattern evaluation: this step involves the identification of patterns that depict knowledge based on measures.

Step 7. Knowledge presentation: this is the step in which visualization and knowledge representation methods are utilized to illustrate mined knowledge to users.

6 0
3 years ago
Social engineering attacks can be carried out:______.
Alik [6]
The answer most likely B NOT SURE )
3 0
3 years ago
Why is Net WPM a better formula than Gross WPM to calculate typing speed?
sergeinik [125]
<span>Net speed can be calculated by deducting errors in gross wpm which is more accurate </span>
7 0
3 years ago
Read 2 more answers
Explain why a special strategy, such as SQRW or KWL, should be used to take notes from a text.
Morgarella [4.7K]

You have an upcoming exam and you are confident that you have read all your books and believe you know your stuff down cold. Somehow, after sitting for your exam, you fail. To avoid this from happening again, you can use methods like SQRW or KWL to make sure that you get a better grade. Each of these techniques are initials that stand for “Survey”, “Question”, “Read”, and “Write” (SQRW) and “Know,” “Want to Know,” and “Learned” (KWL) respectively. People who make the most out of these two strategies will understand what they read and prepare notes of what they learned. These notes will come in handy when sitting for an exam. KWL, specifically, help student become better versions of themselves and improve in reading expository text.

4 0
3 years ago
Other questions:
  • Personal Web Page Generator Write a program that asks the user for his or her name, then asks the user to enter a sentence that
    11·1 answer
  • Many malware attacks are ____ attacks, which involve more than one type of malware and/or more than one type of transmission met
    6·1 answer
  • Describe one activity that belongs to the organizing phase software engineering.
    8·2 answers
  • Your health insurance company gives you a discount if you wear a fitness-tracking bracelet. After wearing it for a few months, y
    5·1 answer
  • Write an HTML document which contains two text fields, a button, and a div. The first text field should be labeled “Temperature”
    10·1 answer
  • ______________ is a raw fact about a person or an object
    6·1 answer
  • What kind of block do you need to check whether a sprite is touching another sprite?
    10·1 answer
  • Explain why a holiday on a cruise liner will be an ideal holiday​
    12·1 answer
  • What mathematical equation was created by a founder of intel?.
    11·1 answer
  • Review 03 diagnostic and troubleshooting skills including data gathering methods and techniques.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!