1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grigory [225]
3 years ago
6

What were the technological innovations that allowed for the rapid expansion of the railroads?

Computers and Technology
1 answer:
liraira [26]3 years ago
5 0

Answer:

There are different phases of railroad expansion with the innovations in technology.

Explanation:

Few of the technological innovations are described below that leads in railroad expansion more rapid.

1. Centralized Traffic control (CTC) is introduced in 1960's that is used to control the traffic on railroads using different signal control.

2. In 1990's after computer technology involvement, railway ticket and reservation system is automate and being centralized. That makes the railroad expansion improve.

3. Bullet train technology has been introduced, that makes the railway trains more faster.

4. Electric trains has been introduced to use green energy and reduce the dependency on the fuel to make environment clean and green.

You might be interested in
How do I connect my CSS file and HTML page together? it's just not wanting to work for me. I have 3 other HTML pages that have t
kotegsom [21]
Hey I wasn't able to replicate your css loading issue using most of the code you provided

In general you have the *.htm files/pages with <html> and <body> tags like you have and the link which references the same file (so just copy that part and it should work for all files)

There are possibly 4 issues which might still exist:
1) the css&htm files are not in the same folder, so the file isn't found
2) the browser cached an old version off the css file which was empty -> try cleaning the browser cache
3) you have many errors in your html which might confuse/break the browser
3.1) you have multiple html and body tags in one file, keep it to only <html><head/><body><stuff></body></html> per file
3.2) your list of many links has links inside of links
3.3) your links in the list of many links has a style tag as the href for the inner link, use class="menulinks" instead and then style it in the css with .menulinks{...}
3.4) the open tag of the inner links is not closed before the text content starts (<em>|FAQ</em> and so on )
3.5) in theory the order of the closing of tags is wrong for the inner links (but fixed if you remove the previously mentioned wrong style tag)
you open a->a->style->em and close em->a->a->style so style should be before the 2 closing </a> tags
3.6) in general you should indent everything, makes everything much clearer, also windows notepad isn't really the best in supporting you to write stuff like that
you might want to consider other editors like notepad++ which are free to download and highlght the syntax for you, have autocomplete and help with the indention and closing tags
4) make sure you have saved the changes and that they aren't there yet (try flashy colors like red or something else obvious)

Also it is easier to help when one has access to the code and doesn't have to retype important parts, copy&pasting it into the question would help, but brainly doesn't really support code so it's not nice and brainly might even reformat it a bit
websites like pastebin or for webdevelopment jsfiddle are useful, but really anything would help even if not intended for that purpose, like a viewable google doc link

I suggest you try fixing the issues from above and if it still doesn't work share the code in some (hopefully better) way
4 0
3 years ago
Please answer immediately!!!
diamong [38]

Answer:

Please check the attachment.

Remember:

All N1, N2, N3N, N4, N5, N6, N7 and each of them are certainly like the server. Also note that Router, repeaters, switch and transmitter are not mentioned in the above diagram. Please assume it in between each location.

Explanation:

Please check the attachment. Also, Remember that Server is at the head office, and rest 7 are the 7 branches. The VOIP, video surveillance, Door security system and the computer networks are being shown in the diagram. And each location has a network of computers joined through VLAN, and each of them are given the IP addresses of Class A, Class B and class C of the iPV4(or IPV6), which can be found by the future network administer, operators through the IP address, that is assigned.  

4 0
3 years ago
If you have cable internet service, what protocol is used between the head end connection and the cable company's network
julsineya [31]
The answer would be (DOCSIS). :)

Have a blessed day and hope this helps!
7 0
3 years ago
The ACME Online Store offers different preferred customer discounts for customers who are "None", "Bronze", "Silver" and "Gold".
Nookie1986 [14]

Yes, the written program has the correct logic to assign the correct discount for each of the 4 valid values of customer_category

<h3>What is a Program?</h3>

This refers to the sequence of instructions that are keyed into a computer to execute user-specific commands.

Hence, we can see that based on the variable customer_category that has a string that is one of these 4 values:

0 for "None"

5 for "Bronze"

10 for "Silver"

20 for "Gold"

The program uses the correct syntax as it gives the correct discount based on the assigned values of the variable customer_category as executed with the syntax above.

Read more about programs here:

brainly.com/question/1538272

#SPJ1

8 0
2 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • Modern database tools support ________________, which entails separating data from the programs that manipulate data.
    14·1 answer
  • A key physical design element is the ____, which describes how users interact with a computer system
    11·1 answer
  • 1.How does inertia affect a person who is not wearing a seatbelt during a collision?
    10·1 answer
  • Retrieve the names of employees who work on exactly one project that is controlled by their department. (It does not matter how
    7·1 answer
  • 16 to 19 year old drivers are how many more times likely to crash? 1.7,2.7,0.7 ,3.7
    12·2 answers
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • Cómo fue posible que los alemanes exterminando seres humanos​
    11·1 answer
  • Fill in the word to complete the sentence.
    10·1 answer
  • What are the disadvantages of vector images when compared to bitmap images?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!