1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
4 years ago
11

Why did scientists in the 1800s decide that the list of known elements needed to be more

Computers and Technology
1 answer:
Dmitrij [34]4 years ago
3 0

Answer:In the mid-1800's there were only 64 known elements. Scientists then came up with the idea that they could arrange the element by the atomic mass number. Every element has its own unique atomic mass number because elements have different numbers of protons and neutrons.

Explanation:

You might be interested in
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
Define the term editing​
Harrizon [31]

Answer:

editing is a word file mean making changes in the text contain is a file. or a word file is one of the most basic ms office word operation.

8 0
3 years ago
All of the different devices on the internet have unique addresses.
Sindrei [870]

Answer:

Yes

Explanation:

Just like a human fingerprint, no 2 computers are the same.

3 0
3 years ago
What function can be used to detect when the end of an input file has been reached?
il63 [147K]

Answer:

getc() or feof() in c/c++.

Explanation:

getc() returns EOF(End of File) when the end of the file reached is reached but it is not efficient because it also return EOF when it fails.

feof() returns non-zero value when the EOF is reached otherwise it return 0.So feof() is an efficient method to read a file.

For example:-

#include <stdio.h>    

int main()  

{  

 FILE *f = fopen("sample.txt", "r");  

 int c = getc(f);  

 while (c!= EOF)  

 {  

    putchar(ch);  

   ch = getc(f);  

 }  

 if (feof(f))  

    printf("\n File has ended.");  

 else  

    printf("\n Reading not happened.");  

 fclose(f);

 getchar();  

 return 0;  

}

7 0
3 years ago
The power supply or laptop DC adapter converts the wall outlet DC power into AC power
scoray [572]

Answer:

False.

Explanation:

Its a DC current which charges any equipment which functions on a energy storage  device such as battery. As a battery is a storage device and we know that AC power can't be stored, so chargers are provided with the special type of circuit which converts this AC current into DC.

3 0
3 years ago
Other questions:
  • Which of the following are true statements about the data that can be represented using binary sequences?
    5·1 answer
  • If a ≤m b and b is regular, does that imply that a is a regular language? why or why not?
    6·1 answer
  • ________ is the presentation of information to the user and the acceptance of the user’s commands. a.data storageb.data access l
    7·1 answer
  • If you want to access your files anywhere from almost any connected device, you should store your files on your ________.
    9·1 answer
  • Ada lovelace designed the first computer
    7·1 answer
  • Does anyone know what type of Honda this is and the year of it lol this isn’t school related
    10·1 answer
  • Which print setting enables multiple slides to be printed on one page?
    5·2 answers
  • The following procedure is intended to return the number of times the value val appears in the list nylist. The procedure does n
    15·2 answers
  • String objects are modified with string slices true or false
    9·1 answer
  • How do you create a turtle in python again-
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!