1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
9

Investigators are combing the site of an explosion with mesh screens to collect evidence. The explosion was very large, leaving

very little evidence behind. The investigators think that they have collected a part of the original explosive. What tool could they then use to confirm this find?
Computers and Technology
2 answers:
Romashka-Z-Leto [24]3 years ago
7 0

Answer:

The answer is an ion mobile spectrometer. This tool can detect explosive materials, and a bomb will naturally have explosive materials on it. Investigators will be able to say that a piece of debris with explosive materials was likely part of the original bomb.

rewona [7]3 years ago
6 0

Answer: SCANNING ELECTRON MICROSCOPY,

Explanation:Many methods are available for use in an explosion site to determine or confirm the explosive materials or bomb fragment seen or obtained from the site they include the following; SCANNING ELECTRON MICROSCOPY,

CHROMATOGRAPHY-MASS SPECTROMETRY, STEREO MICROSCOPY, CAPILLARY ELECTROPHORESIS.

SCANNING ELECTRON MICROSCOPY, is a technique used to identify or confirm a material by scanning the surface of the material using FOCUSED BEAM OF ELECTRONS IN AN ELECTRON MICROSCOPE.

You might be interested in
Suppose that a function dynamically allocates a block of memory with a local pointer variable p pointing to the allocated block.
Kaylis [27]

Answer:

The Pointer P becomes a dangling pointer.

Explanation:

int calculate(){

int *p = (int*)malloc(10);

*p = 10;

return p;

}

In this program, the scope of p is only with the calculate function block. Hence, once the compiler comes out of the function, it can no more access the pointer p or the memory location p is pointing to. To overcome the dangling pointer, we need to declare p as static, so that the scope of p is throughout the program.

6 0
4 years ago
How can artificial intelligence be used in learning science?
tiny-mole [99]

Artificial intelligence can be used to help science students research and verify their research. It is also a very interesting topic to study in general.

Hope that helped!!! k

5 0
4 years ago
Which technology do online storesusually use to present customized content?
k0ka [10]

Answer:

real time analytics technology

Explanation:

Online stores usually use real-time analytics technology to present customized content. Explanation: Real-time analytics is gaining popularity nowadays. It is basically the procedure of measuring and preparing the data as it enters the database

8 0
3 years ago
Photographing during the midday can produce which of the following?
deff fn [24]
It can produce harsh shadows
5 0
3 years ago
Read 2 more answers
In what way, if any, is a model different from a simulation?
madam [21]

Answer:

Models and Simulations are completely different in that they achieve diffenet results.

Explanation:

Modeling is the act of building a model. A simulation is the process of using a model to study the behavior and performance of an actual or theoretical system. In a simulation, models can be used to study existing or proposed characteristics of a system. ... Simulating is the act of using a model for a simulation.

6 0
3 years ago
Other questions:
  • Windows domain policy to disable windows 10 update
    7·1 answer
  • What's a listserver ?
    8·1 answer
  • Complete the statement pertaining to the number of frames used by the national television system committee. The national televis
    9·1 answer
  • A set of blocks contains blocks of heights 1,2, and 4 centimeters. Imagine constructing towers of piling blocks of different hei
    15·1 answer
  • Green Fields Landscaping Company sells evergreen trees which are priced by height. Customers have a choice of purchasing a tree
    15·1 answer
  • Advantages of a grain crush​
    9·1 answer
  • Who has a brainpop acct. can i pls use it !
    12·1 answer
  • Table Setting in any occasion can add to the beauty and significance of the event. It may
    6·1 answer
  • Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
    5·1 answer
  • What is the missing line of code? >>>from math th import >>> Point = [1,5) >>> bPoint [4.9]​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!