1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
3 years ago
10

What is the device that uses sprockets along a film's perforated edges to run 50 feet of film in thirty seconds? A. cinematograp

he B. kaleidoscope C. kinetoscope D. vitaphone
Computers and Technology
1 answer:
katovenus [111]3 years ago
5 0
The answer is C. <span><span>Kinetoscope
</span>
</span>A Kinetoscope was a film viewing device in which the film was watched through a peephole. Early versions required you to spin it. One of the features was that it ran 50 feet of film in 30 seconds, So this is the correct answer to your question. :)<span>

I hope this helped. Have a great day!</span>
You might be interested in
Using functions,
ZanzabumX [31]

Answer:

See explaination

Explanation:

#include <iostream>

using namespace std;

int main()

{

double h, w;

int s, a, b;

cout<<"height in feet: ";

cin>>h;

cout<<"width in feet: " ;

cin>>w;

cout<<"tile size in inches:";

cin>>s;

int height = h*12;

if(height%s==0)

a = height/s;

else

a = height/s + 1;

int width = w*12;

if(width%s==0)

b = width/s;

else

b = width/s + 1;

cout<<"Number of tiles: "<<a*b;

}

8 0
3 years ago
Assume that a program uses the named constant PI to represent the value 3.14. The program uses the named constant in several sta
mihalych1998 [28]

Answer:

The advantage for the above condition is as follows:-

Explanation:

  • If a user creates a defined constant variable and assigns a value on its and then uses that variable instead of the value, then it will a great advantage.
  • It is because when there is a needs to change the value of that variable, then it can be done when the user changes the value in one place. There is no needs to change the vale in multiple places.
  • But if there is a value in multiple places instead of a variable and there is no constant variable, then the user needs to change the value in multiple places.
7 0
3 years ago
Assume that an array of Integers named a that contains exactly five elements has been declared and initialized. In addition, an
just olya [345]

Complete Question:

Assume that an array of Integers named a that contains exactly five elements has been declared and initialized. In addition, an int variable j has also been declared and initialized to a value somewhere between 0 and 3.

Write a single statement that assigns a new value to the element of the array indexed by j. This new value should be equal to twice the value stored in the next element of the array (i.e. the element after the element indexed by j ). Do not modify any other elements of the array!

Answer:

a[j] = 2 * a[j+1];

Explanation:

Since the array is named a and its indexes are referenced by the variable j

it means the elements of the array will be a[j] for (j=0; j=1;j=2).

The first element in the array (j=0) will be a[0], second element will be a[1] and so on.

The statement a[j] = 2 * a[j+1]; assigns a new value to the element of the array indexed by j, the  value is equal to twice the value stored in the next element of the array (j+1).

4 0
3 years ago
An engineer plans to acquire data from a disk. The disk is connected to the forensics workstation and is ready for the engineer.
aksik [14]

The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

<h3>Is non-repudiation an aspect of integrity?</h3>

In general, nonrepudiation is known to be a term that puts together or combines authentication and integrity.

Note that Nonrepudiation is said to be a key or one of the pillars that pertains to information assurance.

The integrity in cyber security is known to be the act of keeping safe against any form of an improper information modification or destruction.

Hence, The correct steps that indicate a correct order of acquisition as they relate to integrity and non-repudiation are:

  • A hash of the disk is made
  • A bit-by-bit copy is made
  • A second hash is made
  • A copy is made of the reference image

Learn more about acquisition from

brainly.com/question/11412887

#SPJ1

8 0
2 years ago
Line 9 and 10
Reika [66]

Answer:

22,332

Explanation:

The taxable income :

Line 8 = Standard deduction or itemized deduction

Line 9 = Qualified business income deduction

Line 7 = Adjusted gross income

Taxable income = Adjusted gross income - (Qualified business income deduction + standard deduction)

Taxable income = 34732 - (12400 + 0)

Taxable income = 34732 - 12400

Taxable income = 22,332

4 0
3 years ago
Other questions:
  • Give one example of a civil engineering structure.
    5·1 answer
  • Gregory Yob is associated with which of these games?
    7·2 answers
  • Which term means a device that converts one voltage to another?
    13·1 answer
  • Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct
    15·1 answer
  • At what x position are the ellipses drawn??? thanks ♡​
    6·1 answer
  • Write a program that reads a file called 'test.txt' and prints out the contents on the screen after removing all spaces and newl
    7·1 answer
  • What is the shortcut to select all text?
    12·2 answers
  • Look at the network topology. What will happen with the other computers if the computer breaks at the RED X?
    8·1 answer
  • Which of the following is a productivity strategy for collaboration?
    9·1 answer
  • 1.What is the output of the following program? [10 Marks]namespace ConsoleApp1{class Program{static void Main(string[] args){int
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!