1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
3 years ago
14

Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t

echnology D. communications technology
Computers and Technology
1 answer:
Tcecarenko [31]3 years ago
4 0

Answer:

B) Nuclear Technology

Explanation:

Nuclear technology involves atomic nuclei reactions which are used to generate energy. The product of nuclear reactions has huge advantages in Medicine, Agriculture, power generation, Water Desalination etc. However This technology can be misused to produce nuclear bombs (atomic bombs) Which are very dangerous weapons of mass destruction.

Since nuclear reactions involve chain (continous) reactions, they effective damage of detonating a nuclear bomb is huge.

You might be interested in
What is the correct order of precedence of the mathematical operators?
LenaWriter [7]
A common technique for remembering the order<span> of </span>operations<span> is the abbreviation "PEMDAS", which is turned into the phrase "Please Excuse My Dear Aunt Sally". It stands for "Parentheses, Exponents, Multiplication and Division, and Addition and Subtraction".</span>
7 0
3 years ago
Write a recursive Scheme function merge(firstNameList, lastNamelist) that receives a simple list of first names and a simple lis
miv72 [106K]

Answer:

Write a recursive Scheme function power(A, B) that takes two integer parameters, A and B, and returns A raised to the B power. A must be a positive value, but B maybe a negative value.

Explanation:

7 0
3 years ago
What could be one possible reason where the recipient is not guaranteed that the data being streamed will not get interrupted?
anyanavicka [17]

Answer

The senders PC is using UDP protocol

Explanation

UDP is the User Datagram Protocol which is used as an alternative communication protocol to the TCP which is used primarily for establishing low latency and loss of tolerating connections between applications on the internet UDP is normally used by the programs running on different computers on a network. Its purposes is to send short messages which are datagrams. It is not much reliable because of its occasional loss of packet. Due to this packet loss  the recipient is not guaranteed that the data being streamed will not get interrupted. This is because If a router on the Internet starts getting overloaded, or a packet gets corrupted due to interference or anything, the packet will be dropped unlike the TCP (Transmission control  protocol)which resend the packets and keeps re sending. The UDP does not resend the packets which are dropped. Once they are dropped that all.


3 0
3 years ago
By default the Windows desktop displays programs, task bar and gadgets. T/F
pychu [463]
True, the Windows desktop displays task manager, all programs, computer status, documents...
3 0
3 years ago
Briefly explain the conceptual of effective computer based instruction for adults outlining the three units output process and i
Shtirlitz [24]

Based on the research analysis, the concept of effective computer-based instruction for adults is the integration of the key organs of computer-based instruction to deliver desired guidelines for research in CBI for adults.

<h2>The three units output process and input</h2><h3>Output process</h3>
  • External support
  • CBI Design
  • Instructional Strategy design

<h3>Input Process</h3>
  • Self Directedness
  • Computer Self Efficacy
  • Learning Goal Level

Hence, in this case, it is concluded that computer-based instructions can be practical for adult learning.

Learn more about CBI here: brainly.com/question/15697793

4 0
2 years ago
Other questions:
  • The_provides access to the internet may also be internal​
    9·1 answer
  • Which statement is true regarding bitmap images?
    6·2 answers
  • 2
    11·1 answer
  • Write a regular expression that selects lines containing any of the following words: linux windows solaris macos. For this exerc
    13·1 answer
  • What is contrast (in Photography)?
    14·1 answer
  • Which type of microscope can only be used to view non-living specimens?
    10·2 answers
  • A sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not dete
    12·1 answer
  • Task 2: Typing a School Speech
    12·1 answer
  • 2. The On and Off states are represented by _____________ class 7 number system​
    7·2 answers
  • Part of an algorithm which is repeated for fixed number of times is classified as.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!