1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesna [10]
4 years ago
11

Where do i put the lines?

Computers and Technology
1 answer:
Usimov [2.4K]4 years ago
4 0
This is exactly the same situation as the motor circuit
that "we" ( I ) did yesterday.

Wire it up exactly the same as that one, with the light bulb
in place of the DC motor.

See the attached drawing.

Your finger goes in place of the switch and resistor.

When you touch the contact points, a tiny bit of current
from the battery flows through the resistance of your 
finger and into the base.  The transistor amplifies this
base current into a large collector-emitter current that
lights the light.

You might be interested in
NEED HELP NOW WILL MARK BRAINLIEST 27 POINTS!!!!!!!!!!!!!!!!
scoundrel [369]
The first one would be C. 

The second one would be A.

The third one would be  B.

And the fourth one would be A. 

I think that's the right answer.
5 0
3 years ago
Read 2 more answers
Ask the user to input a country name. Display the output the message "I would love to go to [country]"
Savatey [412]

Answer:

import java.util.Scanner;

public class Country{

public static void main (String[] args){

Scanner input = new Scanner(System.in);

System.out.print("Input a country name: ");

String country = input.nextLine();

System.out.println("I would love to go to " + country);

}

}

Explanation:

5 0
3 years ago
Which of the following is not true?A. An organization may express its cybersecurity state through a Current Profile to report re
STALIN [3.7K]

Answer: B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles.

Explanation:

Of the options given in the question, the option that is false is option B "requirements.B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles".

This is not true as the establishment of a target profile is not meant for the critical infrastructure agencies alone. Other infrastructural agencies or companies can also establish the target profile.

8 0
3 years ago
____ allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing
Sphinxa [80]
It is the internet callback technology that allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing. It is a technology that enable one to browse the Internet to cue on a certain website to have a representative call a certain number.<span />
6 0
3 years ago
Read 2 more answers
List 2 end to end test commands. <br><br> Will mark Brainliest!!
Delvig [45]

Answer:

ibm pll

Explanation:

4 0
3 years ago
Other questions:
  • Another important mode, XTS-AES, has been standardized by the __________ Security in Storage Working Group. a. IEEE b. ITIL c. N
    9·2 answers
  • With what information should you provide your support technician if you encounter an error message? the error text and code the
    13·2 answers
  • All phones must have a way of making and then terminating a connection to the phone network; however the exact procedure for doi
    12·1 answer
  • Which of the following is not a protocal? <br><br>A) HTTP<br>B) FTP<br>C) WWW<br>D) HTTPS​
    15·2 answers
  • Boardman College maintains two files—one for Sociology majors and another for Anthropology majors. Each file contains students'
    5·1 answer
  • A simulation system is a technology that enables you to take over a customer’s screen, mouse, or other connected device in order
    13·1 answer
  • Assume you are a security professional. You are determining which of the following backup strategies will provide the best prote
    10·1 answer
  • A Python keyword ______________.
    15·1 answer
  • What is the last phase of the website development process?
    10·2 answers
  • Suppose Uber was considering a new algorithm to recommend ride destinations in the app. Which type of research strategy should t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!