1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
13

To clean dirt and spilled electrolyte from a battery, use a dilute solution of either water and baking soda or water and A. sulf

uric acid. B. cadmium hydroxide. C. ammonium chloride. D. ammonia.
Computers and Technology
1 answer:
siniylev [52]3 years ago
3 0
The answer is
D. Ammonia
You might be interested in
SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick R
adoni [48]

Answer:

Check the explanation

Explanation:

Player 1 Coin

Player 2 Coin

Player 1

Player 2

Round

Count at

Count at

Player

Player

Coin

Coin

Number

Beginning of

Beginning of

1

2

Outcome

Count at

Count at

Round

Round

Spends

Spends

End of

End of

Round

Round

Off-by-

one,

10 - 1

10

10

2

player 2

10 - 2

+

= 8

1

gains 1

= 10

coin

Same,

10 - 2

2

8

10

2

2

player 2

-

gains 1

6

+

=

1

=

9

coin

Off-by-

two,

6 - 1

+

3

6

9

3

player 1

2

9 - 3

gains 2

=

=

7

6

coins

Same,

4

7

6

2

2

player 2

7 - 2

6 - 2+

gains 1

=

5

=

coin

5

Kindly check the attached image below to see the well arranged table to solve the above question.

4 0
3 years ago
What is the formula equivalent to the function =SUM(B1:B5)? A. =B1+B5 B. =$B$1+$B$5 C. =B1+B2+B3+B4+B5 D. =$B$1+$B$2+$B$3+$B$4+$
Contact [7]

Given the options, I would choose Option C. =B1+B2+B3+B4+B5.

5 0
3 years ago
A site, a domain, or an organizational unit in active directory is referred to as a:____.
grandymaker [24]

A site, a domain, or an organizational unit in an active directory is referred to as a <u>container.</u>

<h3>What is a domain?</h3>

A domain is a name of a site of a name that is given online to a website. This name is the identity of the website. This gives the detail of your site, and your site will be identified by this name.

An active directory is a function developed by Microsoft. It maintains the network of a windows domain. This contains the site, domain, and together called a container.

Thus, a container in an active directory is a site, a domain, or an organizational unit.

To learn more about the domain, refer to the link:

brainly.com/question/17562152

#SPJ4

8 0
2 years ago
Ima go to sleep but I ask a favor can u guys go on eBay Amazon and find the cheapest pre bilt that is actually good
katrin2010 [14]

Explanation:

what do specifically want to buy??

8 0
3 years ago
Read 2 more answers
100 POINTS!!!!!!
Veronika [31]

Answer:

The fundamental limitation of symmetric (secret key) encryption is ... how do two parties (we may as well assume they are Alice and Bob) agree on a key? In order for Alice and Bob to communicate securely they need to agree on a secret key. In order to agree on a secret key, they need to be able to communicate securely. In terms of the pillars of IA, To provide CONFIDENTIALITY, a secret key must first be shared. But to initially share the key, you must already have CONFIDENTIALITY. It's a whole chicken-and-egg problem.

This problem is especially common in the digital age. We constantly end up at websites with whom we decide we want to communicate securely (like online stores) but with whom we there is not really an option to communicate "offline" to agree on some kind of secret key. In fact, it's usually all done automatically browser-to-server, and for the browser and server there's not even a concept of "offline" — they only exist online. We need to be able to establish secure communications over an insecure channel. Symmetric (secret key) encryption can't do this for us.

Asymmetric (Public-key) Encryption

Yet one more reason I'm barred from speaking at crypto conferences.

xkcd.com/177/In asymmetric (public key) cryptography, both communicating parties (i.e. both Alice and Bob) have two keys of their own — just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they ... well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message ... assuming he's kept it secret, of course.

Explanation:

3 0
2 years ago
Other questions:
  • What is a step by step procedure written to carry out a task?
    11·1 answer
  • Which of the following parameters should match in order for a pair of routers to form an adjacency when running OSPFv2? (Points
    9·1 answer
  • Our readings so far explored computer hardware and software, in particular operating systems and application software. There are
    11·1 answer
  • Match letters from column B to Column A by looking at the picture above.
    11·1 answer
  • Science Help
    11·1 answer
  • Drag each label to the correct location on the image. Match the movie qualities with the right period of movies.
    8·1 answer
  • Rideshare companies like Uber or Lyft track the x,y coordinates of drivers and customers on a map. If a customer requests a ride
    5·1 answer
  • Which of the following lines of code correctly defines a function called combine? OA define "combine(a, b, c)" as: B. define(com
    9·1 answer
  • What is Parallelism? And what is Pipelining?<br> Can someone please explain them fully?!
    14·1 answer
  • What does ATM mean on lego mario mean I know that this is not school related but I trying to help my brother ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!