Industrial technology created new distilling methods for ______, which was used to make candles and lamp oil, among other things.

Answers

Answer 1

Industrial technology created new distilling methods for petroleum, which was used to make candles and lamp oil, among other things.

What does petroleum means?

Petroleum, is known to be a term that is often known as crude oil, it is seen as a kind of  naturally occurring liquid that is said to be seen under  the earth's surface that can be worked on that is refined into fuel.

Note that fossil fuel, petroleum is form by the decomposition of organic matter as well as the use of Industrial technology.

Hence, Industrial technology created new distilling methods for petroleum, which was used to make candles and lamp oil, among other things.

Learn more about petroleum from

https://brainly.com/question/26412451

#SPJ1


Related Questions

write code to read a list of song durations and song names from input. for each line of input, set the duration and name of newsong. then add newsong to songslist.

Answers

Here's the Python code to read a list of song durations and song names from input and then add them to a songslist:```python songslist = [] while True:  try: duration, name = input().split()  newsong = {"duration": duration, "name": name} songslist.append(newsong except: break


```In this code, we first create an empty `songslist` list to store the songs. Then, we use a `while` loop to repeatedly read lines of input until there is no more input left (`while True` is an infinite loop, but we break out of it when there is an error reading input).For each line of input, we split it into the duration and name using `input().split()`.

Then, we create a dictionary `newsong` with two keys `"duration"` and `"name"`, and set their values to the duration and name respectively.Finally, we add `newsong` to the `songslist` using the `append()` method.I hope this helps! Let me know if you have any further questions.

To know more about durations visit:

https://brainly.com/question/13567541

#SPJ11

Aaden went to the zoo and he was fascinated by the platypuses and wants to learn more about them. What is the best online resource Aaden could use to find this information quickly?

An online animal encyclopedia
A subscription to an online animal magazine that costs money
A brochure from the zoo
An animal outreach section of an online newspaper

Answers

Answer:

An online animal encyclopedia

Explanation:

Encyclopedias are the most reliable source on this list, as they are normally peer-reviewed and checked for falsities.

suggest one blockchain technology use case that has not been discussed in our course. please include:

Answers

One blockchain technology use case that has not been discussed in our course is in the field of supply chain management. With the help of blockchain, it becomes possible to track and record every transaction that happens in the supply chain, starting from the manufacturer to the end consumer.

This not only makes the process transparent, but also reduces the chances of fraud, counterfeiting, and theft, thereby increasing the overall efficiency and security of the supply chain.

For instance, a manufacturer could use a blockchain-based system to record the details of every product that is produced, including the materials used, date of production, and location of the production facility. This information could then be shared with suppliers, distributors, and retailers, allowing them to track the movement of the product through the supply chain. This ensures that the product is genuine and has not been tampered with, as any attempts to modify the information on the blockchain would be instantly detected.

Another advantage of using blockchain in supply chain management is that it can help to streamline the process of verifying certifications and licenses. For example, if a product is certified as organic or sustainable, this information could be recorded on the blockchain, making it easy for consumers to verify the authenticity of the certification.

Overall, the use of blockchain technology in supply chain management has the potential to improve the transparency, security, and efficiency of the entire supply chain, while also reducing costs and increasing trust between all parties involved.

Learn more about blockchain here:

https://brainly.com/question/31080398

#SPJ11

Kevin recently discovered that unknown processes are running in the background on his company’s web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website. What type of attack occurred?

Answers

Answer: botnet

Explanation:

The type of attack that occurred is botnet. Botnets refers to the networks relating to hijacked computer devices that are used for scams and cyberattacks.

They're Internet-connected devices, where each one of them each runs one or more bots which can be used to steal data, and send spam.

Write a definition in your own words for intranet. Please don't copy and paste.

Answers

Answer:

An Intranet is a communication network, usually, a private network that was created using the World Wide Web software.

Explanation:

An Intranet is an private Network based on internet standards but only available within a business or other organizations.

How can computers store pictuers when they only use numbers?

Answers

Images are stored in the form of a matrix of numbers in a computer where these numbers are known as "pixel values". 0 represents black and 255 represents white. The computer records a number to represent the colour of each square. It works a bit like a digital colour by numbers! The more squares in the grid, the better the images will look, as more pixels are used to represent the image.

Which printing option results in a word document with images of the slides and an area to take notes

Answers

Answer:

handout is the correct answer

Explanation:

on edge

Answer:

It's C - Handout

on edge 2021

Explanation:

Jean-Ann works in the finance business. She analyzes insurance applications in order to determine the level of risk involved in insuring the applicant, then decides whether or not to insure them. Jean-Ann works as

Answers

Answer:

She works as a insurance or tech applicator

Explanation:

Answer:

A) Insurance Underwriter

Explanation:

Please help!! Thank you!

Please help!! Thank you!

Answers

Answer:

D

Explanation:

Answer: D



Explanation: easiest question ever

question 1 relational databases contain a series of tables connected to form relationships. which two types of fields exist in two connected tables?

Answers

A relational databases typically have two types of fields: a foreign key field in one table, and a primary key field in the other table.

What is database?

Any type of data may be stored, maintained, and accessed using databases. They gather data on individuals, locations, or objects. It is gathered in one location so that it may be seen and examined. You might think of databases as a well-organized collection of data.

In a relational database, two tables that are connected to form a relationship typically have two types of fields: a foreign key field in one table, and a primary key field in the other table.

The foreign key field in one table is used to refer to the primary key field in the other table. For example, consider a database that has two tables: a "customers" table and an "orders" table. The "customers" table might have a primary key field called "customer_id", and the "orders" table might have a foreign key field called "customer_id" that refers to the "customer_id" field in the "customers" table.

The primary key field in a table is used to uniquely identify each record in the table. It is typically a field that contains a unique value for each record, such as a customer's ID number or a product's serial number. The primary key field is often used as the foreign key field in other tables to establish relationships between those tables.

To know more about database checkout  https://brainly.com/question/29412324

#SPJ4

the open-source descendant of nessus is called which of the following?

Answers

The open-source descendant of Nessus is known as OpenVAS (Open Vulnerability Assessment System). OpenVAS is a framework of several services and tools that offer vulnerability scanning and management. It scans computers, servers, and network devices to detect vulnerabilities and generate detailed reports.

It is capable of detecting security holes in web applications, operating systems, and databases, among other things. OpenVAS was created as a fork of the last free version of Nessus, which was 2.2.11, and is now the most widely used open-source vulnerability scanning tool. OpenVAS is constantly updated with the latest vulnerability detection routines and is an excellent tool for identifying and addressing security vulnerabilities. With OpenVAS, administrators can evaluate their IT infrastructure's security status and create a plan to address vulnerabilities to ensure a secure computing environment.In a nutshell,

OpenVAS is the open-source descendant of Nessus. It offers vulnerability scanning and management, scans computers, servers, and network devices to detect vulnerabilities, and generates detailed reports. It was created as a fork of the last free version of Nessus, and is now the most widely used open-source vulnerability scanning tool.

To know more about Assessment visit:

https://brainly.com/question/32147351

#SPJ11

​you must have a for every variable you intend to use in a program. a. purpose b. variable definition c. memory space d. literal value e. none of these

Answers

Answer:a

Explanation:

all network switches require substantial configuration before they can be put into operation in a network. true false

Answers

The statement "All network switches require substantial configuration before they can be put into operation in a network" is partially true. However, a long answer would be required to explain why. Here's why:Explanation:Most network switches require some configuration before they can be used in a network.

There are, however, several unmanaged switches available on the market that do not require configuration, making it simple to add them to a network quickly. Furthermore, several switches are now designed to be simple to set up and operate with no technical knowledge required. On the other hand, many network switches are quite complicated and will require considerable configuration to function properly.

They can have dozens of ports and advanced features such as VLAN tagging and port mirroring, and setting up these features can take some time and expertise. Some switches come with pre-installed templates, making it easier for switches require some degree of configuration, there are exceptions to this rule, and the amount of configuration required varies depending on the type of switch.

To know more about configuration visit:

brainly.com/question/32886519

#SPJ11

Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?

Answers

The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,

One of the challenges of EDI is that it is ensuring compatibility between different systems and  also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.

Learn more about EDI here

https://brainly.com/question/29755779

#SPJ4

Write an algorithm to get the value of length and breadth of a rectangle from the user and find its area. inn qbasic

Answers

Answer:

IN PYTHON ::

x=int(input('Enter length:'))

y=int(input('Enter width:'))

print('Area of the rectangle is', x*y,'squared units')

I hope it will be useful.

Which of the components of the systems model provides information so
the system can adjust its function? *
A. input
B. feedback
C. process
D. output

Answers

Answer: Feedback

Explanation:

The input components of the systems model can consist of resources like people, energy, tools, capital, etc.

The feedback components of the systems model provides information so

the system can adjust its function. An example of the feedback mechanism for a system is the progress bar which shows when one is downloading a file on iTunes.

write a program to count the number of elements in an array whose bits 3, 4, and 7 are 0s. the array has n 8-bit elements and is stored in memory locations starting from $1000.

Answers

To count the number of elements in an array with 8-bit elements stored in memory locations starting from $1000, where bits 3, 4, and 7 are all 0s, we can iterate over the array and use bitwise operations to check the desired bits.

We can begin by initializing a counter variable to 0. Then, using a loop, we can iterate through each element in the array. To access the array elements stored in memory locations starting from $1000, we can use a pointer or an index-based approach. Within the loop, for each element, we can apply a bitwise AND operation with a bit mask to check the specific bits. In this case, the bit mask would be 0b11011111 since we want bits 3, 4, and 7 to be 0s. If the result of the bitwise AND operation is 0, it means that the element satisfies the condition. We can increment the counter variable by 1 for each element that meets the criteria.

After iterating through all the elements in the array, the value of the counter variable will represent the count of elements that have bits 3, 4, and 7 as 0s. This count can be used for further processing or simply printed as the final result of the program. By using bitwise operations and a loop, we can efficiently count the desired elements in the array.

Learn more about array here:

https://brainly.com/question/33609476

#SPJ11

Darshan does a self-assessment of his entrepreneurial mindset. he finds that future orientation is a domain
that he wants to improve. what action should he take to improve this?

Answers

The action should he take to improve this is to spend time alone thinking of new ideas.

What is entrepreneurial mindset?

This is known to be the way of thinking that helps a person to be able to get or attain  their goals. Successful entrepreneurs embrace challenges, mistakes, and failure as opportunities to develop new skill sets to help them succeed in the future.

Note that the action should he take to improve this is to spend time alone thinking of new ideas as it will help him to finds that future orientation is a domain that he wants to improve.

Learn more about entrepreneurial mindset from

https://brainly.com/question/24642830

#SPJ1

HOW MEANY PEOPLE PLAY AMONG US

Answers

Answer:

up to 1.5 million people are playing Amoung Us

Explanation:

Answer: I Play Among Us But this is a website for learning and questions so please ask that somewhere else. Thank You Have A Nice Day!

Explanation:

The ____ button can be used to display the values from the final record in the data source

Answers

The Last Record button can be used to display the values from the final record in the data source. The Last Record button is located in the Data tab in the Controls group.

The button resembles a small square with an arrow pointing downwards. When you click the Last Record button, it takes you to the final record in the database table or query and displays all the data for that record.

The Last Record button is not the same as the End button, which takes you to the end of the current record but not the final record. The Last Record button is also different from the Last Record navigation bar in Microsoft Access, which displays the final record in a table or query in the lower half of the window.

To know more about source visit:

https://brainly.com/question/2000970

#SPJ11

A(n) __________ provides a consistent definition for how an organization should handle and secure different types of data.

Answers

A data classification framework provides a consistent definition for how an organization should handle and secure different types of data.

A data classification framework is a systematic approach that helps organizations categorize and label their data based on its sensitivity, value, and potential impact if compromised. It provides a consistent set of guidelines and criteria for classifying data into different levels or categories, such as public, internal, confidential, or highly sensitive.

The framework typically involves the collaboration of various stakeholders, including data owners, IT personnel, and security experts, to define and agree upon the classification criteria. The criteria may consider factors like data content, regulatory requirements, legal obligations, and business impact. By classifying data, organizations can implement appropriate security controls, access restrictions, and data protection measures based on the classification level.

A well-defined data classification framework helps organizations effectively manage and protect their data assets. It ensures that data is handled in a consistent and appropriate manner, regardless of its location or format. It helps organizations identify their most critical and sensitive data, prioritize security investments, and allocate resources accordingly. Additionally, it facilitates compliance with industry regulations and privacy laws by providing a clear roadmap for data protection practices.

Overall, a data classification framework is an essential component of an organization's data governance and security strategy, providing a structured approach to safeguarding data and minimizing the risk of unauthorized access, disclosure, or misuse.

Learn more about secure  here: brainly.com/question/32133916

#SPJ11

A programmer is developing an action-adventure game that will be geared
toward dedicated and experienced gamers ages 13 and up. Which part of the
game design document should include this information?

A programmer is developing an action-adventure game that will be gearedtoward dedicated and experienced

Answers

Answer:

D. demographics

Explanation:

demographics refers to the age or group of people that this game will be targeted towards

The given data should be included in the game design document's section on demographics. Option D is correct.

What are the demographics?

Statistics that characterize populations and their traits are known as demographics. The study of a population based on characteristics like age, race, and sex is known as demographic analysis.

The gathering and analysis of broad characteristics about populations and groups of individuals is known as demographic analysis. For businesses to understand how to sell to consumers and make strategic plans for upcoming patterns in consumer demand, demographic data is highly helpful.

Therefore, option D is correct.

Learn more about the demographics, refer to:

https://brainly.com/question/13146758

#SPJ2

While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches you have performed. what is this an example of

Answers

Answer:

Cookies or targeted advertising.

Identify an advantage of working in teams

Answers

Answer : More ideas is correct answer

Select the correct answer.
Which of these components is utilized in use case diagrams?
A.
classes
B.
components
C.
flow
D.
actors

Answers

Answer:

B.components

Explanation:

What pets are on Terraria and how can you get them?

Answers

Answer:

There are over 15 new pets that can be found in chests and dropped rarely off enemies: Baby Dinosaur, Baby Eater, Baby Hornet, Baby Penguin, Baby Skeletron Head, Baby Snowman, Baby Truffle, Black Cat, Eyeball Spring, Pet Lizard, Pet Parrot, Pet Sapling, Pet Turtle, Squashling, and Tiki Spirit.

Explanation:

There are over 15 new pets that can be found in chests and dropped rarely off enemies: Baby Dinosaur, Baby Eater, Baby Hornet, Baby Penguin, Baby Skeletron Head, Baby Snowman, Baby Truffle, Black Cat, Eyeball Spring, Pet Lizard, Pet Parrot, Pet Sapling, Pet Turtle, Squashling, and Tiki Spirit.

Answer:

Depends on version

Explanation:

Check ther official website entering your vertion in ther

The control unit sends _____ bits to the ALU control.
0
1
2

Answers

The control unit sends 6 bits to the ALU control. These bits indicate which operation the ALU should perform on the data inputs.

The control unit sends control signals as binary bits (0s or 1s) to the ALU control. These control signals determine the operation that the ALU (Arithmetic Logic Unit) will perform, such as addition, subtraction, multiplication, or logical operations. The number of bits sent by the control unit depends on the complexity of the ALU and the instructions being executed. For example, a simple ALU may require only a single bit to represent the operation to be performed, while a more complex ALU may require multiple bits for more intricate instructions. These control signals are essential for coordinating the ALU's operations within the overall operation of a computer's central processing unit (CPU).

learn more about ALU here:

https://brainly.com/question/14247175

#SPJ11

¿Si tengo un disco de 1Tb, y en el tengo almacenado lo siguiente:
a) 300 videos de 126GB en total
b) 1376 archivos de office que cada uno pesa 117kb.
c) 3000 mp3 de 3.8mb cada uno.
d) 4Gb ocupados en el sistema operativo.
¿Cuánto espacio me sobre en el disco duro?

Answers

Answer:

Espacio a la izquierda = 858,8439008 Gb

Explanation:

Dados los siguientes datos;

Tamaño del disco duro = 1 Tb

Vídeos = 126 Gb

Archivos de Office = 1376 * 117 Kb = 160992 Kb

Mp3 = 3000 * 3.8 mb = 11400 Mb

Sistema operativo (OS) = 4 Gb

Conversión:

En primer lugar, convertiríamos el tamaño del archivo en kilobytes a megabytes.

1000 Kb = 1 Mb

160992 Kb = 160992/1000 = 160.992 Mb

Memoria total (Mb) = 11400 + 160,992

Memoria total (Mb) = 11560.992 Mb

A continuación, convertiríamos el tamaño del archivo en megabytes a gigabytes;

1000 Mb = 1 Gb

11560.992 Mb = 11560.992/1000 = 11.560992 Gb

Por último, sumaríamos todos los tamaños de archivo en gigabytes;

Espacio total (memoria) utilizado = 126 + 11.560992 + 4

Espacio total (memoria) utilizado = 141,560992 Gb

Conversión:

1000 Gb = 1 Tb

Espacio restante = tamaño del disco duro - memoria total utilizada

Espacio a la izquierda = 1000 - 141.560992

Espacio a la izquierda = 858,8439008 Gb

Nota:

Kb significa kilobyte. Mb significa megabyte. Gb significa gigabyte. Tb significa terabyte.

Which protocol is responsible for transporting files between a client and a server?

HTTP
FTP
LLP
TCP

Answers

Answer:

FTP

Explanation:

FTP stands for File Transfer Protocol.

HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!
Express the diagram in the form of a logic statement. [2]
P = ________________________
3. (a) Complete the truth table below for the logic circuit which is made up of NAND gates only.

HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!Express the diagram in the form of a logic statement. [2] P = ________________________3.

Answers

Answer:

different or difference between Dot-matrix and Daisy-wheel printer

Other Questions
The capital and operating cost of generation using different types of fuels are given in the table below. With an annual carrying charge of 10% for the capital cost, determine the cost equation for each of the fuel options. Plot graphs of these equations on the attached graph paper with hours on the x-axis and cost of the y-axis. Compute the time in hours at which the graph interact each other.POWER PLANT CHARACTERISTICSABCNet Plant Output, MW50025090Direct Capital Cost, $/kW280020001600Fixed O&M Cost, $/kW-yr201510Variable O&M Cost, $/MWh6.05.04.0Fuel Cost, $/kWh0.020.050.08 scott traveled left his home on his bicycle and went 2 miles to the beach. the trip took him 15 minutes. he returned home at a speed of 6 miles per hour. how many minutes left was the trip to the beach than the return trip. match each biome with the correct description.1. driest biome2. largest biome3. most species4. least species5. four seasons6. used to grow crops- rainforest - tundra- desert- coniferous forest- temperature deciduous forest- grasslands How can one determine if a compound is ionic or covalent? Based on this image of acontainer with aselectively permeablemembrane, which waywill the water move if thesolute concentration ishigher on the left thanthe right?A. Water will move from right to leftto get the concentration of solutesat equilibrium.B. Water will move from left to rightto get the concentration of solutesat equilibriumC. The water will not move becauseequilibrium is not necessary. will give brainliest for correct answer so pls help me Which of the following statement is correct? A. Normal practice of the bearing fitting is to fit the stationary ring with a "slip" or "tap" fit and the rotating ring with enough interference to prevent relative motion during operation.B. Helical gears are commonly used for high-speed and low-power applications. C. Shaft alignment is not critical for bevel gears, therefore, bevel gears can be inexpensive. D. Worm gear has a compact design for large gear ratios. In general, wear by abrasion is not of any concem. E. Planetary gear trains must be held together by an arm known as the planet carrier (or simply, arm). *PLEASE help* *spam=reported*(1) Some people say the rain makes them feel depressed and prevents them from doing things they want to do, I welcome the welcome secure feeling that I get when it rains. (2) I always feel refreshed, as if the rain were a blanket wrapping itself around me, closing out the rest of the world. (3) I like the way it changes the routine of the day. (4) it relieves the monotony and brings with it an air of expectancy. Which sentence in the paragraph is a run-on sentence?A. SENTENCE 3B. SENTENCE 1C. SENTENCE 2D. SENTENCE 4 What is the y-intercept of the function, represented by the table of valuesbelow?O A. 5O B. 3O c. 10O D. 6 Discuss the risks and benefits of teleworking during COVID-19. Support your answer with examples. Locate the median of 30, 37, and 8 How much work is done by a constant horizontal 20-N force pushing a 50-kg block a distance of 10 m on a horizontal surface Placement of elements in a composition controls ________ and creates multiple focal points What is the probability that a new college graduate in business will earn a starting salary of at least (to 4 decimals)? Help please giving out brainlist too! describe the importance of international capital structure. what risks can you identify when working with cash, credit and inventory management? provide your rationale and any supporting data. The four-digit numeral $3AA1$ is divisible by $9$. What digit does $A$ represent? Question 1. Authentication Protocol (30 marks) Max length: Two A4 pages including all diagrams. Text in the diagram must at least be 11 points Font size: 11 or 12 points. Line spacing: \( 1.5 \) lines Consider the elliptic curve group based on the equation y2 = x3 + ax +b mod p where a = 1740, b 592, and p=2687 We will use these values as the parameters for a session of Elliptic Curve Diffie-Hellman Key Exchange. We will use P = (4,908) as a subgroup generator. You may want to use mathematical software to help with the computations, such as the Sage Cell Server (SCS). On the SCS you can construct this group as: G=EllipticCurve(GF(2687),[1740,592]) Here is a working example. (Note that the output on SCS is in the form of homogeneous coordinates. If you do not care about the details simply ignore the 3rd coordinate of output.) Alice selects the private key 33 and Bob selects the private key 9. What is A, the public key of Alice? What is B, the public key of Bob? After exchanging public keys, Alice and Bob both derive the same secret elliptic curve point TAB. The shared secret will be the x-coordinate of TAB. What is it? guess the songla da deee la de daaa la da dee la de daaa OOOOHHHHH all im sayin