1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ludmilka [50]
3 years ago
11

What New England industry quickly collapsed with the discovery of oil in Pennsylvania?

Computers and Technology
2 answers:
Naily [24]3 years ago
7 0
That would be "Whaling". Whaling was a super important industry at the time before oil was used, because theblubber was uses to make the fuel for lamps and the like. With the discovery of oil however whaling became dangerous and impractical because a stationary accessible resource was there.
chubhunter [2.5K]3 years ago
3 0

Answer:

The <u>Whaling industry</u> was quickly collapsed with the discovery of oil in Pennsylvania.

Further Explanation:

The Whaling industry was a major industry in New England before the discovery oil in Pennsylvania before 1900. Whale oil was used in lamps for illumination in the dark. After the discovery of petroleum oil the whale oil was quickly collapsed since petroleum oil was began to be extract pumped from the ground and refined in to kerosene for lamps.

The main use of whale oil was in lighting the lamps as a candle wax. The whaling industry collapsed partially in the civil war which began in 1861.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

Grade: Senior Secondary School

Subject: Computers and Technology

Chapter: Environmental Study

Keyword:

New England, quickly, collapsed, discovery, oil in Pennsylvania, whaling industry, 1900, 1861, lamps, illumination, dark, petroleum oil, pumping, refine, kerosene oil, candle wax, civil war, partially

You might be interested in
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
3 years ago
❤️❤️❤️❤️❤️❤️❤️❤️IS THERE ANYONE'S STILL AWAKE?? HMM HEHE I'M HERE AGAIN~~~ FOLLOW ME FOR MOR3~~​
insens350 [35]

Answer:

hello?

Explanation:

3 0
2 years ago
Read 2 more answers
PLEASE HELP I WILL REWARD YOU
xxMikexx [17]
What what what what what what
5 0
3 years ago
Norman Bates has a very unusual hobby what is it?
Allushta [10]

Answer:

<h3>Norman only likes to stuff birds, not other animals.</h3>
8 0
3 years ago
You can run a macro by:
oee [108]

Selecting the button assigned

Using the shortcut Keys assigned

Explanation:

By clicking the assigned button one can run a macro and we can assign a short cut key to macro which we created.

So, the two options we can use to run a macro.

7 0
3 years ago
Other questions:
  • What are some consequences of internet addiction​
    9·1 answer
  • Im trying to learn c# for unity does anyone know any good sources
    10·1 answer
  • A technician is talking to end users about the specifications for an upgraded application server. The users of the application r
    11·1 answer
  • 1. In Access, a template is which of the following? a. A database to manage contacts b. Where a database is stored c. Two tables
    5·1 answer
  • Data-as-a-service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
    7·1 answer
  • Design a full adder circuit using NAND gates only (input : A, B, Cin and output = S, Cout).
    5·1 answer
  • What are some ways you can give staying off your phone a "boost" and make it easier to do?
    9·1 answer
  • Why can videos be streamed from the cloud to a computer with no loss in
    5·2 answers
  • Bloxburg Build can anyone help me
    14·2 answers
  • allows users to enter text and control the computer with their voice.allows users to enter text and control the computer with th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!