1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
2 years ago
9

Investigators are combing the site of an explosion with mesh screens to collect evidence. The explosion was very large, leaving

very little evidence behind. The investigators think that they have collected a part of the original explosive. What tool could they then use to confirm this find?
Computers and Technology
2 answers:
Romashka-Z-Leto [24]2 years ago
7 0

Answer:

The answer is an ion mobile spectrometer. This tool can detect explosive materials, and a bomb will naturally have explosive materials on it. Investigators will be able to say that a piece of debris with explosive materials was likely part of the original bomb.

rewona [7]2 years ago
6 0

Answer: SCANNING ELECTRON MICROSCOPY,

Explanation:Many methods are available for use in an explosion site to determine or confirm the explosive materials or bomb fragment seen or obtained from the site they include the following; SCANNING ELECTRON MICROSCOPY,

CHROMATOGRAPHY-MASS SPECTROMETRY, STEREO MICROSCOPY, CAPILLARY ELECTROPHORESIS.

SCANNING ELECTRON MICROSCOPY, is a technique used to identify or confirm a material by scanning the surface of the material using FOCUSED BEAM OF ELECTRONS IN AN ELECTRON MICROSCOPE.

You might be interested in
When inserting a fly in animation what is the first step in the process?
weqwewe [10]

Answer:

you select the element you wish to animate

6 0
3 years ago
Choose all of the items that accurately describe an operating system.
Simora [160]

Answer:

provides the platform that application software runs on, manages a computer's hardware, and implements features like file and folder management.

Explanation:

6 0
2 years ago
In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a
Shalnov [3]

Answer:

metrics

Explanation:

Given that Metrics is Metrics is an accepted technique of measuring quantities of elements or commodities.

It is used in all facets of human activities particularly in value measurement such as production operation, financial assessment, comparison purposes, etc.

Hence, In addition to benchmark testing, performance measurements, called METRICS, can monitor the number of transactions processed in a given period, the number of records accessed, and the volume of online data.

3 0
2 years ago
please help, touch pad and trackpad are the same thing and the other answers don’t really make sense to me..
WINSTONCH [101]

Answer:

The answer to the problem is B

8 0
2 years ago
Suppose there are two ISPs providing WiFi service in a café. Each ISP operates its own AP and has its own IP address block. If b
Alinara [238K]

Answer:

As a design rule, access points within range of each other should be set to channel frequencies with minimal signal overlap. Users will find that roaming doesn’t work well, and performance will degrade because of interference between access points.

Explanation:

8 0
3 years ago
Other questions:
  • A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing back
    5·1 answer
  • Blind spots are those areas not reflected in your:
    7·2 answers
  • Develop a program that will maintain an ordered linked list of positive whole numbers. Your program will provide for the followi
    13·1 answer
  • 7.
    15·1 answer
  • Write a method named isNumericPalindrome that accepts an integer parameter named num. If num is a palindrome the method must ret
    6·1 answer
  • If you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is ca
    13·1 answer
  • Did brainly.com go down today? i coudlnt get in it
    15·2 answers
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
  • Why do we use the internet so much?​
    6·1 answer
  • How to edit slides into video.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!