1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
4 years ago
8

Long form of EMF and examples ​

Computers and Technology
1 answer:
aliya0001 [1]4 years ago
5 0

Answer:

EMF: Electro-Motive force, also called emf (denoted and measured in volts), is the voltage developed by any source of electrical energy such as a battery or dynamo. ... The potential difference of electrical energy is called electromotive force or emf.

Examples; electrochemical cells, thermoelectric devices, solar cells, electrical generators, transformers, etc.

You might be interested in
Which one of these students is having a positive impact?
jeka57 [31]
A because her grade is being raised. it is a positive impact. 
8 0
3 years ago
Read 2 more answers
Hey! PLEASE HELP!!!
Solnce55 [7]

Answer:

change your computer date/skip the videos

Explanation:

hi there!  i've been using brainly for free for some time and found that there a few ways to bypass some of their free member restrictions.

first off, there's really not an easy way to skip the video, unless you want to get technical.  however, i've found that you can drag on the grey video bar on the bottom of the ad to skip to the very end, thus getting you the answer you need very quickly!

also, brainly has a 7 day answer restriction in place, which you can easily bypass by changing the date on your computer!  an easy way to do that is to hit the Windows key and type "date", after which a setting will pop up that reads "Date & time settings".  click on that or hit enter. then, tick off the slider that says "Set time automatically", and go down to "Set the date and time manually", after which you'll hit "Change" and change the day to a couple days in the future.  give it a second, refresh the brainly tab or re-search up your answer, and you should get a lot more daily answers!  one thing i must say about this method is that your computer's date will no longer be accurate. to fix this, you'll have to re-tick the slider that reads "Set time automatically", and it should fix your clock.

one more thing is that, instead of sending your parent an email, you can try to send yourself that email! unless it's an advertisement for buying brainly premium, there also should be no reason to even send the email in the first place, so try to bypass that when you can.

i hope this helps you!

4 0
3 years ago
Give examples of applications that access files by each of the following methods:
KengaRu [80]

Answer:

Explanation:

Usually, applications would have the capability of using either one of these options. But for the sake of the question here are some that usually prefer one method over the other.

Any program that targets an API usually uses Sequential access. This is because API's contain all of the data as objects. Therefore, you need to access that object and sequentially navigate that object to the desired information in order to access the data required.

A music application would have access to an entire folder of music. If the user chooses to set the application to randomly play music from that folder, then the application will use a Random Access method to randomly choose the music file to load every time that a song finishes.

4 0
3 years ago
Which type of attack is being utilized when the attacker asks you to hold a security door open for them after you have successfu
ddd [48]
When the attacker <span>asks you to hold a security door open for them after you have successfully authenticated using your proximity badge or access badge backdoor attack is being utilized. The backdoor malware gives you to have normal authentication procedure and the remote access is granted.
</span><span>This attack exploits vulnerabilities within applications.</span>
Backdoors are used for a number of malicious activities: data theft, server hijacking, Website defacing and many more.
6 0
3 years ago
Oliver wants to send a report to his boss discussing the upcoming project. Which communication facility would he use to send a f
vladimir2022 [97]
I pretty sure email
5 0
4 years ago
Read 2 more answers
Other questions:
  • A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
    15·1 answer
  • Which tab provide text formatting features
    11·1 answer
  • Main characteristic of open source software<br> ?
    7·1 answer
  • Idea citizen activation
    9·2 answers
  • ____ that allow individuals to perform specific tasks are launched via the operating system, such as by using the windows start
    11·1 answer
  • Here's another question!<br><br> What is some iterative programming structure uses?
    13·1 answer
  • You should avoid “S” curves in your photographs. True or False?
    11·1 answer
  • URGENT: I need to add a while loop in this program but I don't know-how. I am also having trouble neatening some lines of code.
    15·1 answer
  • Assume the user responds with a 3 for the first number and a 5 for the second number.
    13·1 answer
  • Given a list of twenty number count the numbers among the list
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!