1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
4 years ago
14

Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t

echnology D. communications technology
Computers and Technology
1 answer:
Tcecarenko [31]4 years ago
4 0

Answer:

B) Nuclear Technology

Explanation:

Nuclear technology involves atomic nuclei reactions which are used to generate energy. The product of nuclear reactions has huge advantages in Medicine, Agriculture, power generation, Water Desalination etc. However This technology can be misused to produce nuclear bombs (atomic bombs) Which are very dangerous weapons of mass destruction.

Since nuclear reactions involve chain (continous) reactions, they effective damage of detonating a nuclear bomb is huge.

You might be interested in
Exercise 3.16.4: Happy Face Solita
enot [183]

first do a happy face and a circule thats it

7 0
3 years ago
A huge variety of networking hardware and software appeared. One challenge was to enable these different networks to communicate
madam [21]

Answer:

Internet Protocol (IP)

Explanation:

The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

6 0
3 years ago
How many instructions could fit into a 256 byte memory unit, given a 32-bit architecture?
andriy [413]

Answer:

64

Explanation:

We have given the 32 bit architecture

We know that 1 byte =8 bit

So memory of given architecture 32 bit \frac{32}{8}=4bytes

Total memory = 256 bytes

So total number of instruction that fit into 256 bytes \frac{256}{4}=64

So total 64 instruction can be fit in 256 byte memory.

3 0
3 years ago
Which of the following types of network is described in the statement below?"It represents a wireless network that connects two
jekas [21]

Answer:

B. WMAN

Explanation:

A WMAN or a wireless metropolitan area network is a network bigger than a WLAN (wireless local area network) but smaller compared to the WWAN or the wireless wide area network. It is used for long haul point to point and point to multipoint communication. It is a network, service providers use to connect LAN networks wireless within a city.

The WPAN is a small wireless network as compared to WLAN, that uses Bluetooth technology for connectivity.

6 0
3 years ago
On the 80x86 CPU, the ESP register keeps track of the value on the top of the runtime stack.
Ronch [10]

Answer:

True

Explanation:

The ESP register acts as an indirect operand pointing to the top of the stack at any time.

Stack grows downwards from high memory when a program adds to the stack. However, when items are removed from the stack, it shrinks upwards from low to high memory.

The assembler reduces the stack pointer(ESP) register by 2, when a word value is pushed on to the stack. On the other hand, the assembler increases the stack pointer by 2 when a word value is popped off.

The assembler decreases or increases the ESP register by 4 when a double word value is pushed or popped off the stack respectively. Therefore the ESP register changes in multiples of 4.

8 0
3 years ago
Other questions:
  • If you ping a device, you are using the______protocol
    11·1 answer
  • Which of the following is a goal of paraphrasing​
    12·1 answer
  • Choose the statements that CORRECTLY describe a business organization.​
    11·1 answer
  • You have local administrative rights to your computer running windows 7. you cannot find some of the operating system files on y
    8·1 answer
  • What is used to configure data sources for applications that require access to a database?
    14·1 answer
  • How can you tell that a spreadsheet was saved as a 2007 Excel file?
    7·1 answer
  • The construction of a mixed media assemblage would be considered
    9·1 answer
  • HI How are you anyways are any of you intreseted in my giveaway
    7·2 answers
  • A ______ is a group of slides designed and formatted for a specific purpose. These include themes as well as content.
    8·1 answer
  • Which is true for comments? Group of answer choices The compiler does not generate machine code for comments. The compiler conve
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!