1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
3 years ago
10

What is the device that uses sprockets along a film's perforated edges to run 50 feet of film in thirty seconds? A. cinematograp

he B. kaleidoscope C. kinetoscope D. vitaphone
Computers and Technology
1 answer:
katovenus [111]3 years ago
5 0
The answer is C. <span><span>Kinetoscope
</span>
</span>A Kinetoscope was a film viewing device in which the film was watched through a peephole. Early versions required you to spin it. One of the features was that it ran 50 feet of film in 30 seconds, So this is the correct answer to your question. :)<span>

I hope this helped. Have a great day!</span>
You might be interested in
Why is it best to run av scans when the computer isn���t being utilized?
Rasek [7]
A and B I'd say :)
Scan slows the computer while you are using it.
A few process are also unscannable whrn you use it (I may be wrong on this)
8 0
3 years ago
Read 2 more answers
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
What is the major problem with using pneumatics for robots, and how do we correct it?
Pepsi [2]
Well m<span>ost pneumatic system issues are caused by attempts to make a cylinder and related compressed air system components do something outside of the hardware’s design parameters. In order to fix this, use a filter regulator, do not oversize the cylinder, also ensure proper plant supply pressure, make sure you are using a manual, lockable air dump valve as well.
Hope this helps!</span>
4 0
3 years ago
Your laptop LCD panel is blank when you boot up. You can hear the laptop turn on, and the keyboard backlight is on. You have che
kati45 [8]

Answer:

Plug the laptop to a desktop monitor.

Explanation:

Assuming that the damaged component its the LCD screen and nothing else, the laptop would still be able to work correctly when connected to a desktop monitor, with an HDMI, or VGA cable. Thus you will find out that you only need to replace the screen and your graphic processor and other components are functional. Also if you need to work with your laptop and can't wait for the replacement, you can do still do it. Your keyboard and mouse are still functional, so you will see and work on your desktop monitor.

8 0
3 years ago
A personal directory of e-mail addresses stored and maintained with one’s e-mail program
iris [78.8K]

Answer:

It’s a address book

8 0
4 years ago
Other questions:
  • What advantage does a reliable web page have over published textbooks and encyclopedias?
    15·2 answers
  • Find Multiplication of Binary Numbers: 1100112 x 10012
    9·1 answer
  • While configuring a switch, you noticed a configuration issue with an Ether Channel bundle. You thought you corrected the issue,
    11·1 answer
  • You want to figure out how much your next paycheck will be. You worked 80 hours and you make $12.50 per hour. You enter the numb
    15·1 answer
  • For the following data, what is the average number of cycles per instruction?
    10·1 answer
  • What are the diffrent types of contract
    9·1 answer
  • In which type of modulation is a 1 distinguished from a 0 by shifting the direction in whichthe wave begins?
    14·1 answer
  • To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
    14·1 answer
  • Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
    11·1 answer
  • Enter a formula in cell C13 to look up the registration fee for the first vehicle. Use the vehicle type in cell C4 as the Lookup
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!