1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jarptica [38.1K]
3 years ago
12

John is a mechanical engineer. His first task at his job is to build any microphone of his choice. He chooses to build a dynamic

microphone. What
is the major advantage offered by a dynamic microphone?
simple to construct and easy to repair
A.
B.
captures subtle nuances in a sound
OC. can pick up sounds from both sides of the microphone
OD. offers warmth to the recording sound
E. captures sounds most accurately
Computers and Technology
1 answer:
Jobisdone [24]3 years ago
7 0

Answer:

A. simple to construct and easy to repair

Explanation:

A dynamic microphone works on the principle of electromagnetic principle. A diaphragm is attached to a coil of wire which helps in producing sound. Responding to the sound waves, the coil of the wire is vibrated by the diaphragm.  A magnetic field is created by the magnet which is present inside the coil of wire. The electrical signal is generated in response to the motion of the coil. The speed of the motion produces the amount of the current.

Since the construction of a dynamic microphone is easier as compared to any other microphone, John is likely to opt to build one.

You might be interested in
What does "CPU" stand for?
sergiy2304 [10]
Central Processing Unit
8 0
3 years ago
Read 2 more answers
What is the name for the type of flash memory that is used by mobile devices to store their apps and data?
tankabanditka [31]
D. Solid state is correct
5 0
3 years ago
Describe how to find out a file type by using your Computer.
user100 [1]

First you go to the 3 dots neer the x you pres it thin you go to downloads and it shod be ther i hop i help if so make me the branliy

8 0
3 years ago
Read 2 more answers
The program that solves problem 2 (a) on p.275 should be named as proj4_a.c. It must include and implement the following functio
avanturin [10]

Answer:

#include <iostream>

#include <cstring>

using namespace std;

bool isAPalindrome(char* palindrome);

int main()

{

   char palindrome[30];

   bool palindrome_check;

   cout << "Please enter an word or phrase.\n";

   cin.getline(palindrome, 30);

   palindrome_check = isAPalindrome(palindrome);

   if (palindrome_check = true)

   {

       cout << "Input is a palindrome\n";

   }

   else

   {

       cout << "Inputis not a palindrome\n;";

   }

system("pause");

return 0;

}

bool isAPalindrome(char* palindrome)

{

   char* front;  

   char* rear;  

front = palindrome;// starts at the left side of the c string

rear = (palindrome + strlen(palindrome)) - 1;//starts at the right side of the c-string. adds the c string plus the incriment value of s

while (front <= rear)

{

 if (front = rear)

 {

  front++;

  rear--;

 }

 else

 {

  return false;

 }

}

   return true;

}

7 0
3 years ago
Que es taylorismo plis
valina [46]

It is a method of work organization that seeks to increase productivity through the maximum division of functions, the specialization of work and the strict control of the time needed for each task.

7 0
3 years ago
Other questions:
  • What does iSCSI stand for?
    5·2 answers
  • Which of the following is NOT an example of a font style?
    13·1 answer
  • By Definition, a Small Business?
    9·1 answer
  • Digital dashboards provide the decision makers with a quick overview of key performance indicators and other key operational sta
    13·1 answer
  • Given a integer, convert to String, using String Builder class. No error checking needed on input integer, However do read in th
    11·1 answer
  • "The _____ of the Open Systems Interconnection (OSI) model generates the receiver’s address and ensures the integrity of message
    6·2 answers
  • (fill in the blank) <br><br> ____ is when data is formatted, transmitted and received in a network.
    13·1 answer
  • 1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
    10·1 answer
  • Identify a characteristic that is a disadvantage of cloud-based hosting.
    11·1 answer
  • Using the functions from problems 1 and 2, write a MATLAB script to compare the laminar results from to the turbulent results. C
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!