1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
9

Investigators are combing the site of an explosion with mesh screens to collect evidence. The explosion was very large, leaving

very little evidence behind. The investigators think that they have collected a part of the original explosive. What tool could they then use to confirm this find?
Computers and Technology
2 answers:
Romashka-Z-Leto [24]3 years ago
7 0

Answer:

The answer is an ion mobile spectrometer. This tool can detect explosive materials, and a bomb will naturally have explosive materials on it. Investigators will be able to say that a piece of debris with explosive materials was likely part of the original bomb.

rewona [7]3 years ago
6 0

Answer: SCANNING ELECTRON MICROSCOPY,

Explanation:Many methods are available for use in an explosion site to determine or confirm the explosive materials or bomb fragment seen or obtained from the site they include the following; SCANNING ELECTRON MICROSCOPY,

CHROMATOGRAPHY-MASS SPECTROMETRY, STEREO MICROSCOPY, CAPILLARY ELECTROPHORESIS.

SCANNING ELECTRON MICROSCOPY, is a technique used to identify or confirm a material by scanning the surface of the material using FOCUSED BEAM OF ELECTRONS IN AN ELECTRON MICROSCOPE.

You might be interested in
The field of ____ is concerned with the technical issues involved in information display. computer science
Nataliya [291]

The field of <u>Computer graphics</u> is concerned with the technical issues involved in the information display. The correct option is A.

<h3>What is computer graphics?</h3>

Computer graphics is a branch of computer science called computer graphics research techniques for digitally synthesizing and modifying visual content.

Even while the phrase is frequently used to describe the study of three-dimensional computer graphics, it also includes image processing and two-dimensional graphics. This section works for information display.

Thus, the correct option is A. Computer graphics.

To learn more about computer graphics, refer to the link:

brainly.com/question/1169945

#SPJ4

The question is incomplete. Your most probably complete question is given below:

Computer graphics

computer-aided visualization

computer visualization

engineering graphics

7 0
1 year ago
Describe a situation in which a robot may have to avoid an obstacle without coming to a complete stop before turning.
Airida [17]

A robot may have to avoid an obstacle without coming to a complete stop before turning. If the robot is able to make a wide enough, long turn. instead of stopping, then turning sharply. For example if the robot were to come across an object and can sense said object before hand. it can then take action into turning before it is close enough.

3 0
3 years ago
Read 2 more answers
Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IP
chubhunter [2.5K]

Answer:

The five eras are general- purpose mainframe and minicomputer computing, personal computers, client/server networks, ...

7 0
3 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
The _____ stage occurs when advancing IT leads to the development of a more advanced IT product making the old one obsolete and
Nikolay [14]

Answer

decline

Explanation:

The decline stage is the period where the relevance of a Technology making way for more advanced technology.

6 0
3 years ago
Other questions:
  • _____ allow(s) a user to double click with the mouse in a document to move the insertion point to a new location.
    11·1 answer
  • You are preparing to program a replacement system board, but the "system is booting in mpm mode" message is not displayed. what
    10·2 answers
  • What type of program would you use to create a personal budget?
    9·1 answer
  • If you were setting up a network with 100 nodes and you wanted no more than 25 nodes per segment: what devices and connections w
    9·1 answer
  • List and describe the tools for all the main stages of app/application development.
    11·1 answer
  • Which result is most likely if a network packet has no header?
    9·2 answers
  • What is the second stage of information processing cycle​
    10·2 answers
  • When using the Photo Album dialog box, a picture
    13·2 answers
  • Name four successful conversions to an electronic health record system in a medical facility
    6·1 answer
  • Which operation is not efficiently supported by heaps?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!