1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksana_A [137]
3 years ago
12

Whose work is responsible for the invention of the air bag? Scientist, Engineers or both?

Computers and Technology
1 answer:
jenyasd209 [6]3 years ago
3 0

The scientist and the engineers were both responsible for the invention of the airbag.

  • Peter Florhancicn was a scientist and he invented the airbag because of the Dutch people who drowned when they drove into the canals

  • Also, John Hetrick who was an engineer filed for the patent of airbags when he saw that deers were running across the road. He believed that it could cause an accidentthat led to the invention.

In conclusion, both the engineers and the scientists were responsible.

Read related link on:

brainly.com/question/24686827

You might be interested in
Can someone please help me in answering this!?! <br> The language is C++
Llana [10]

Here is a somewhat cryptic solution that works:

#include <algorithm>

#include <cstdlib>

using namespace std;

void q(char c, int count)

{

for (int i = 0; i < count; i++) {

 putchar(c);

}

}

void p(int b1, int plusses)

{

q(' ', b1);

q('+', plusses);

}

int main()

{

for (int i = -3; i <= 3; i++)

{

 int pl = min(6, (3 - abs(i)) * 2 + 1);

 p(6-pl, pl);

 i == 0 ? p(0, 6) : p(6, 0);

 p(0, pl);

 putchar('\n');

}

getchar();

}


5 0
3 years ago
match the type of secondary storage devices to their examples. CD, hard disk, flash memory. answer choices: magnetic storage dev
alisha [4.7K]
Hi pupil here's your answer ::


➡➡➡➡➡➡➡➡➡➡➡➡➡

Column A Column B

1》CD = Optical Storage Devices

2》Hard Disk = Magnetic Storage Device

3》Flash Memory = Solid State Storage


⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅


Hope this helps. . . . . . .
3 0
3 years ago
Cindy wants to send threat information via a standardized protocol specifically designed to exchange cyber threat information. W
Dahasolnce [82]

Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

<h3>What is standardized protocol?</h3>

Standardized protocols is known to be the one that gives room for people or clients to communicate with any given window manager.

Note that in the above case, Cindy  can choose to exchange cyber threat information in the given scenario via the use of TAXII.

Learn more about standardized protocol from

brainly.com/question/14672166

#SPJ1

8 0
2 years ago
please help me with the 2 questions above. if you know a lot about game design I have lots more questions!
ratelena [41]

1 is A

2 is probably C or B but I don't use Unity so I can't help much with that one.

3 0
3 years ago
Only one indented line of code will be executed after an if statement. True False
leva [86]

Question: Only one indented line of code will be executed after an if statement. True False

Answer: False

3 0
2 years ago
Other questions:
  • When you see a blank pointer this means you can drag the row or column border to change height or width
    14·1 answer
  • ________ is typically used as the last string of letters in the name of a website. Group of answer choices the name of the indiv
    13·1 answer
  • Write any 2 differences between implicit variables and explicit variables.​Plz tell :' (
    10·1 answer
  • A ____ appearing in the main text of a document indicates a footnote or endnote.
    15·1 answer
  • We want to construct a memory with 256 bytes in capacity. Assume that each byte has a unique address. (a) How many address lines
    14·1 answer
  • What keyboard command opens the Go To dialog box?
    11·2 answers
  • The icon below represents the ____________.
    8·1 answer
  • So I emailed Brainly to deleted my account. Why haven’t they done so yet? I don’t want to get charged money for this app I was p
    14·1 answer
  • The identification of the technology management framework contain?
    6·1 answer
  • The code to perform a binary search is below. Match the variable name with what it holds.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!