1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
3 years ago
15

How do new sources of power assist in the development of inventions?

Computers and Technology
1 answer:
pentagon [3]3 years ago
3 0
<span>New sources of power assist in the development of inventions since t</span>he new inventions would have been worthless without a reliable source of power energy.
You might be interested in
14. Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each loc
damaskus [11]

Answer:

Explanation:

Known Variables A = max Daily Rentals

X = Damaged helmets %

lets find the formula to calculate Helmets per location :taking 1st row as an example.

412 = B - (B*13/100)

412 = (100B-13B)/100

412*100 = 87B

B= 412*100/87

Hence, the generic formula becomes : B= A*100/(100-X)

Applying the same formula for each row and then using ROUND function of excel to round off the digits

=ROUND(number,digits) where number is the number you would like to round off and the digits is the number of decimal digits for it to round off. Since we want natural numbers in our example, we will be using digits as 0.

Explanation:

See attached pictures also.

5 0
3 years ago
Read 2 more answers
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
2 years ago
Which of these words does not describe factual data
kipiarov [429]
The correct answer is "opinion".

<span>Opinions are almost never factual which is why they are opinions. </span>
5 0
3 years ago
Read 2 more answers
PLEASE-I'M STUCK!!!!!!!!!!!!!!!!!!!!!!
Blababa [14]

Answer: Input is the answer.

8 0
2 years ago
Write a program that computes the area and perimeter of a rectangle given its radius
mezya [45]
D sag gg FYI hbd su such ja dash us di ggs xx NJ
7 0
3 years ago
Other questions:
  • A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated
    13·1 answer
  • What are voter purges
    11·1 answer
  • The Universal Containers research lab is publishing its latest research into knowledge articles assigned to the data category "C
    15·1 answer
  • For an alternative to the String class, and so that you can change a String's contents, you can use_________ .
    12·1 answer
  • What formatting has been applied to this title?
    8·1 answer
  • Answer the queston...........​
    7·2 answers
  • What are the first letters of each of the 3 main colors in javaScript? (seperate with commas)
    9·1 answer
  • 8.11 LAB: Filter and sort a list
    8·1 answer
  • Determine whether the compound condition is True or False.
    14·1 answer
  • imagine that you are explaining the art of visual comparison to a group of photography students. You are mentoring. What do you
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!