1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
2 years ago
10

Which type of microscope can only be used to view non-living specimens?

Computers and Technology
2 answers:
Fynjy0 [20]2 years ago
5 0

Answer is D: Electronic microscope

An electronic microscope has greater resolving power and much higher magnifications. Most high-resolution electron microscope cannot be used to image living cells because the particle beam of powerful electrons used to illuminate a specimen also destroys the samples. Engineers, however, are coming up with ways to overcome this critical limitation by using quantum mechanical measurement. Quantum mechanical measurement will help avoid damage to the specimen by sensing objects remotely without ever hitting the imaged object.

anzhelika [568]2 years ago
3 0
The correct answer is D
You might be interested in
The specific term for expediting the delivery of software by breaking a task into smaller increments is called
Ksivusya [100]
Rapid Application Development is the specific term
8 0
3 years ago
What are the best 3 xbox 360 games ?​
Andru [333]
Halo
GTA
Call of duty
5 0
3 years ago
Read 2 more answers
What's a big question or problem in the tech field you'd like to solve and why?
aleksandrvk [35]

A big question or problem in the tech field that i would like to solve is Data security.

<h3>What is Data security ?</h3>

Data security  can be regarded as process of protecting data from unauthorized user as well as protection from  data corruption .

I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.

Data security are;

  • data encryption
  • hashing
  • tokenization

Learn more about Data security at;

brainly.com/question/17493537

5 0
2 years ago
These things are commonly found on the front of desktop computer cases:
jok3333 [9.3K]

USB ports, headphone jack/microphone port, and of course, a power button.

3 0
3 years ago
All of the following are benefits of automation except
Tasya [4]

Question 1:

4. it increases the number of employees

Question 2:

2. false

Question 3:

2. it causes great damage to the ozone layer

Question 4:

1. true



6 0
3 years ago
Other questions:
  • ________ are used to translate each source code instruction into the appropriate machine language instruction.
    11·1 answer
  • Ricardo twists his ankle at work but does not immediately realize that he is injured because his ankle is not sore or swollen, a
    5·1 answer
  • When replacing a system board in a laptop, which feature is a must?
    10·1 answer
  • Many mobile devices can perform Internet searches and other tasks via
    8·1 answer
  • DJ Davon is making a playlist for an internet radio show; he is trying to decide what 1212 songs to play and in what order they
    12·1 answer
  • Coordinate with
    12·1 answer
  • How are web design &amp; web development different from each other?
    9·1 answer
  • Which of the following are valid variable names? Select 2 options.
    14·1 answer
  • Which of these is not an example of a transition
    6·1 answer
  • How is a WAN different from a LAN?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!