1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
3 years ago
12

What happens when a magnet is close to a iron nail?

Computers and Technology
1 answer:
kykrilka [37]3 years ago
6 0
Hello
It will attach because of the magnetic filed
have a nice day
You might be interested in
Which spreadsheet toolbar displays options such as Cut and Paste?
Lilit [14]
The answer would be ''Drawing Toolbar'' and you can find this inside your mouse area, where u click the right button (right side) and it shows a small chart/toolbar where it gives you the options to copy, cut, paste and more.
6 0
3 years ago
Read 2 more answers
Checking authentication, checking authorization and access control, auditing systems, and verifying firewalls and other filters
nadezda [96]

Answer: Logical security list

Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.

These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.

3 0
4 years ago
In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ___________________
allsm [11]

Answer:

WAN router security standard, Web services standard

Explanation:

Complete statement with blanks filled:

In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the WAN router security standard explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the Web services standard identifies which controls are vital for use of Web services provided by suppliers and external partnerships.

7 0
3 years ago
The sales of last 6 months are stored in a list,
MissTica

list1 = [12500, 35000, 12000, 40000, 55000,60000]

print(sum(list1)/len(list1))

We take the sum of all the elements in the list and divide the sum by the quantity of the elements. You can put however many elements in this list and you'll always get the average using the algorithm above.

6 0
3 years ago
The motion of any object can be broken down into it's component (parts of) vectors. true or false
Zepler [3.9K]

Answer:

The correct answer choice is true.

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the core of an operating system that manages memory and devices, maintains the computer’s clock, starts programs, and as
    7·1 answer
  • In Word, tables can be styled much like text can.<br> True<br> False
    6·1 answer
  • In a PowerPoint presentation, it is not possible to add notes that are hidden from the audience's view.
    9·1 answer
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • If you need to set up direct deposit, which information from your check would you likely need?
    7·2 answers
  • Why is information broken down into packets
    15·1 answer
  • Which of the following is NOT a font style? Color Bold Italic Regular
    10·2 answers
  • How do I change my name on my Brainly Profile?
    15·2 answers
  • Using a while loop, create an algorithm extractDigits that prints the
    6·1 answer
  • Will give 5 star and mark brainleist
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!