Which one of the following metals is the poorest conductor of electricity?

Answers

Answer 1
There are many, but some include Aluminum, Bismuth, Gallium, Indium, Lead, Thallium, Tin, Ununhexium, Ununpentium, Ununquadium, and Ununtrium.
Answer 2

Answer:lead

Explanation:


Related Questions

The Astroliner, in theory, eliminates the two solid rocket boosters on the side of the shuttle, and replaces them with a ______________________ which will ____________ the Astroliner off the ground and into the air to about 20,000 feet.

Answers

The Astroliner, in theory, eliminates the two solid rocket boosters on the side of the shuttle, and replaces them with a 747 aircraft. Which will tow the Astroliner off the ground and into the air to about 20,000 feet. 60 years ago,first demonstration of the basic concept of towing an un-powered aircraft behind a powered aircraft and then releasing it for autonomous flight. It was first accomplished with the German ME321 transport glider. 

are the ways data represented and transmitted with computers law of nature or law of man?

Answers

The way in which data are transmitted and represented with computers is done through the law of man because it is the man who determines through his technological knowledge the rules that must be established for the introduction and transmission of computational data. The data are represented by the use of codes under norms and lines according to a system of which it is studied and designed with a target.

Is a list of variable information such as a name and address that is included in a document?

Answers

the Answer is a Data Source

On the home ribbon, what do you use to change the font size of characters in a cell

Answers

The font tab in the home ribbon

With a(n) ____ the editor, compiler, and executer are combined in the same application.

Answers

IDE, Integrated Development Environment

An array of strings , names , has been declared and initialized . write the statements needed to determine whether any of the the array elements are null or refer to the empty string . set the variable hasempty to true if any elements are null or empty-- otherwise set it to false .

Answers

#Python

hasempty = False
for name in names:
   if ( not name ):
      hasempty = True
      break  # speed things up

Someone who buys a song online and copies it for friends is violating
A)privacy rights.
B)ethical rights.
C)appropriate Internet use.
D)intellectual property rights.

Answers

Answer:

I know

I gave him a 5 star by mistake

The answer is actual D

Explanation:

Music is can be property

Because it can be owned

Two students are discussing how programmable thermostats work. Student A says that a piece of material within the thermostat changes length depending on moisture content of the air and that temperature is related to this change in moisture. Student B says that there's a material within the thermostat that changes its length based on temperature and that the measured temperature is related to the change in length. Which of the following statements is correct?

Answers

Student B is correct.

Which website can help you find antivirus software?

Answers

McAfee!!! you should get it

The awser is b. i took the testo

A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

Answers

Virus                     

When operating a computer, a user interacts with
the operating system.
a software license.
the BIOS.
application software

Answers

When operating a computer, a user interacts with application software. Thus, option D is correct.

What is the application software?

An application is a computer software package that performs a specified job directly for an end user or, in certain situations, for another application. It is also known as an application program or application software.

An application can be a single program or a collection of applications. A computer programme that responds to user input and assists users in performing personal, professional, and educational tasks is known as application software.

This programme is frequently useful since it enables you to undertake tasks that express creativity, increase productivity, and improve communication. Application software's main function is to assist the user in doing certain activities.

Therefore, option D is correct.

Learn more about the application software, refer to:

https://brainly.com/question/29353277

#SPJ2

__ is/are the amount of blank space between lines of text in a paragraph

Answers

Indents? Double Space? one of those

Answer:

The correct answer is line spacing

Explanation:

Which of these can be considered data?

A.facts


B.information


C.belief


D.all of these

Answers

B.Information
can be considered data

Answer:

B) Information

Explanation:

Information is data

What is the difference between the RAM and ROM

Answers

ROM is data that is written to the hard drive and is not erased when the comupter is shut off

RAM is temporary data that is erased when the the computer is shut off

A cyberbully is someone who invades another person’s privacy by

Answers

Insulting or harassing them over the Internet
intimidating someone online with threats.

With network management software, a network manager can ____.

Answers

Manage all network resources such as users, computers, printers, rights etc.

The standard character code that represents characters from multiple languages using 16 bits is called _____.

Answers

The answer is character encoding.  It is used in a way to represent charaters and in which can be used in different or even in languages that are multipled. This type of character standard uses sixteen bits in order for it to function.

Which commas is used to combine two or more cells together into one cell

Answers

The command is Merge & Center
This command could be easily found in the toolbar of your excel.
If you execute this command in two different cells, those cells will be merged into one larger cell and the content in that cells will be placed exactly in the middle of the combined cell (measures according to combined cells' length)

The number of distinct values that can be represented using 5 bits is

Answers

2 to the power of 5, ie., 2^5 = 2*2*2*2*2 = 32.

A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer works without the userâs knowledge or permission.

Answers

virus










-----------------------------------

You can use ____ arguments to initialize field values, but you can also use arguments for any other purpose.

Answers

do you need help , i think the answer is right in tha tsentence

Leah deals with several file conversions every day.

Answers

That’s not a question but good for her

Which of the following is not an operating system?



A.Linux


B.Leopard


C.Microsoft Windows


D.Internet Explorer

Answers

D. Internet Explorer is a web browser application.

Which option helps you choose the design of a slide in a presentation?

A.Slide Layout
B.Shapes
C.Animation
D.Slide Transition

Answers

Hello! The slide transition helps with the transitions of slides and the animation helps out with the words appearing on the screen in a more creative way. Therefore, C and D are out. The slide layout is the part where if you click on it, slide designs are shown for you to choose from. The shapes can be used for design, but it doesn't help if you're looking for the design of a slide. The answer is A: slide layout.

Which component of a computing device drains the battery the fastest?

Answers

The LCD panel of the computing device drains the battery the fastest.This component  drains approximately 43% of the total battery life. Since the display is the biggest power drain in order to maximize the battery life of your computing device you should enable Power saver mode and make sure it's set to turn off the display quickly after inactivity. 

Alex is setting up a network for his company's computers. He installs a circuit board into each computer, enabling it to be connected to the network. This circuit board is the _____.

fiber optic
network interface card
network operating system
peripheral

Answers

If it's an ethernet network:  network interface card

The java compiler is able to find all programmer errors.

Answers

No compiler can do that. Maybe with AI, but that's beyond the scope of a compiler.

In your presentation you added a text box to?

Answers

The correct answer would be to - Cite a source

Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?

Answers

Router1(config)# ipv6 route 2001:db8:acad:1::/32 2001:db8:acad:6::2 200

Which device should be used for enabling a host to communicate with another host on a different network?

Answers

A router should be used for enabling a host to communicate with another host on a different network.
Other Questions
What is the main reason for a conglomerate to want diversification? What is the blood volume of an average-sized adult male? PRE CAL f(x)=x^3+x^2+4x+4Solve with Synthetic division and find all zeros of the function Find the volume of a rectangular block of ice 3 feet by 6 1/3 and 1 1/2 feet Which of the following accurately describes they way China interacted with its neighbors during the tang and Song Dynasty?A-China's traditional system of government was replaced by more efficient foreign models.B-China's refusal to trade with other countries let to widespread hostility and warfareC-China's culture influenced politics and religion in countries throughout AsiaD-China's powerful military allowed it to conquer and govern nearly all its neighbors How long did the neo-babylonian empire last? what would be the maximum value for f(x) = 5x2 + 9 Identify the need for a declaration of independence A client with end-stage pancreatic cancer has decided to terminate medical intervention. what should a nurse anticipate when consulting with palliative care? A scientist has been collecting data on the soil composition in a forest after a wildfire. Every year she visits the forest and takes a sample from the same area. She then analyzes the sample and determines its content. She plans on collecting data for ten years and then determining the trends that have occurred. Which type of investigation is the scientist performing?collectivecomparativeexperimentaldescriptive Allison drive 30 mph through the city and 55 mph on the New Jersey Turnpike she drove 90 miles from battery Park to the Jersey shore how much of the time was city driving if she needs about 1.2 hours on the turnpike What were the results of the repeated invasions of the roman empire? If 2x^2-5x+7 is subtracted from 4x^2+2x-11, what is the coefficient of x in the result? A la edad de catorce aos, Rod Carew y su familia fueron a la ciudad de _______ _________a vivir. Which is a carbohydrate monomer WILL GIVE BRAINEST categorize the graph as liner increase... Collectivistic cultures, such as latino, asian, and native american cultures, have a "we/us" orientation, and independence is highly regarded. true or false. Both external and organization factors shape internal pay structures. a. True b. False Which statement best represents the purpose of these lawsA: the laws forced separation of the races B:The laws denied African American any access to schools C: The laws require inferior facilities for African Americans. D:The laws made it difficult for African American to get an education What is the equation of a line that passes through the point (4, 2) and is perpendicular to the line whose equation is y=x/31 ? Enter your answer in the box. Steam Workshop Downloader