1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qaws [65]
3 years ago
12

Which statement about muzzleloaders is true? All muzzleloaders are rifles. All muzzleloaders have only one barrel. Muzzleloaders

are safer and easier to use than modern firearms. Muzzleloaders are early firearms that are loaded from the open end.
Computers and Technology
1 answer:
NeX [460]3 years ago
6 0

Answer:

Muzzleloaders are early firearms that are loaded from the open end

Explanation:

A muzzleloader is any firearm into which the projectile and usually the propellant charge is loaded from the muzzle of the gun.

This is distinct from the more popular modern designs of breech-loading firearms.

Thus, muzzleloaders are early firearms that are loaded from the open end.

You might be interested in
Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up
kakasveta [241]

Answer:

Task A

Explanation:

8 0
3 years ago
NWhen you measure a person’s weight, you are measuring the
MAVERICK [17]

Answer:

gravitational force acting on that person.

Explanation:

5 0
3 years ago
Read 2 more answers
How can interference benefit a quantum system?
Marizza181 [45]

Answer:

The interference is where waves enhance or diminish each other is at the heart of creating probability distributions that provide desired results in Quantum Computing

Explanation:

4 0
2 years ago
1. Write a telephone lookup program. Read a data set of 1, 000 names and telephone numbers from a file that contains the numbers
Fed [463]

Answer:

Kindly note that, you're to replace "at" with shift 2 as the brainly text editor can't take the symbol

Explanation:

PhoneLookup.java

import java.io.FileReader;

import java.io.IOException;

import java.util.Scanner;

public class PhoneLookup

{

  public static void main(String[] args) throws IOException

  {

     Scanner in = new Scanner(System.in);

     System.out.println("Enter the name of the phonebook file: ");

     String fileName = in.nextLine();

     LookupTable table = new LookupTable();

     FileReader reader = new FileReader(fileName);

     table.read(new Scanner(reader));

   

     boolean more = true;

     while (more)

     {

        System.out.println("Lookup N)ame, P)hone number, Q)uit?");

        String cmd = in.nextLine();

       

        if (cmd.equalsIgnoreCase("Q"))

           more = false;

        else if (cmd.equalsIgnoreCase("N"))

        {

           System.out.println("Enter name:");

           String n = in.nextLine();

           System.out.println("Phone number: " + table.lookup(n));

        }

        else if (cmd.equalsIgnoreCase("P"))

        {

           System.out.println("Enter phone number:");

           String n = in.nextLine();

           System.out.println("Name: " + table.reverseLookup(n));

        }

     }

  }

}

LookupTable.java

import java.util.ArrayList;

import java.util.Collections;

import java.util.Scanner;

/**

  A table for lookups and reverse lookups

*/

public class LookupTable

{

  private ArrayList<Item> people;

  /**

     Constructs a LookupTable object.

  */

  public LookupTable()

  {

      people = new ArrayList<Item>();

  }

  /**

     Reads key/value pairs.

     "at"param in the scanner for reading the input

  */

  public void read(Scanner in)

  {

     while(in.hasNext()){

         String name = in.nextLine();

         String number = in.nextLine();

         people.add(new Item(name, number));

     }

  }

  /**

     Looks up an item in the table.

     "at"param k the key to find

     "at"return the value with the given key, or null if no

     such item was found.

  */

  public String lookup(String k)

  {

     String output = null;

     for(Item item: people){

         if(k.equals(item.getName())){

             output = item.getNumber();

         }

     }

     return output;

  }

  /**

     Looks up an item in the table.

     "at"param v the value to find

     "at"return the key with the given value, or null if no

     such item was found.

  */

  public String reverseLookup(String v)

  {

      String output = null;

         for(Item item: people){

             if(v.equals(item.getNumber())){

                 output = item.getName();

             }

         }

         return output;

  }

}

Item.java

public class Item {

  private String name, number;

 

  public Item(String aName, String aNumber){

      name = aName;

      number = aNumber;

  }

 

  public String getName(){

      return name;

  }

 

  public String getNumber(){

      return number;

  }

}

input.txt

Abbott, Amy

408-924-1669

Abeyta, Ric

408-924-2185

Abrams, Arthur

408-924-6120

Abriam-Yago, Kathy

408-924-3159

Accardo, Dan

408-924-2236

Acevedo, Elvira

408-924-5200

Acevedo, Gloria

408-924-6556

Achtenhagen, Stephen

408-924-3522

Kindly check the attached output image below.

3 0
3 years ago
Which of the following statements is true of intrapreneurs
chubhunter [2.5K]

<u>Answer is:</u>

They take risks, but not with their own investments.

<u>Explanation:</u>

Intrapreneurship is the act of behaving like an entrepreneur while working within a large organization. Intrapreneurship is known as the practice of a corporate management style that integrates risk-taking and innovation approaches, as well as the reward and motivational techniques, that are more traditionally thought of as being the province of entrepreneurship.


<u>Example:</u>

One of the most well-known examples of intrapreneurship is the "Skunk Works" group at Lockheed Martin. The group was originally named after a reference in a cartoon, and was first brought together in 1943 to build the P-80 fighter jet. Because the project was to eventually become a part of the war effort, the project was internally protected and secretive. Kelly Johnson, later famous for Kelly's 14 rules of intrapreneurship, was the director of this group.

4 0
4 years ago
Other questions:
  • Write a script that will generate random integers in the range from
    10·1 answer
  • What range of leakage current must trip an IDCI?​
    15·1 answer
  • Big data: options:
    8·1 answer
  • Useful open source applications include the popular Web browser Mozilla Firefox, the e-mail application Thunderbird, the relatio
    7·2 answers
  • The one who will defeat me in this typing race I will mark him/her brainliest
    10·1 answer
  • 8.10 Code Practice Question 3
    6·1 answer
  • The alveolar walls and the pulmonary capillaries form the:
    5·1 answer
  • 8. Explain strategies employed by the operating system to ensure safety of programs and data in
    15·1 answer
  • Choose all items that are true about the two example of HTML shown on the right.
    5·2 answers
  • A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!