1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
3 years ago
12

What happens when a magnet is close to a iron nail?

Computers and Technology
1 answer:
kykrilka [37]3 years ago
6 0
Hello
It will attach because of the magnetic filed
have a nice day
You might be interested in
In Broadbent's filter model of attention, the stages of information processing occur in which order?
victus00 [196]

Answer:SENSORY STORE, FILTER, DETECTOR, STM.

Explanation:Donald Broadbent in 1958 stated one of the earliest theory of attention,he stated that physical features of messages are used to select one message for further processing and that all others are lost.This differs from inattentional blindness, which is when you focus hard on something and fail to notice unexpected things entering your visual area. He believes that

Information from all of the stimuli presented at any given time enters a sensory buffer with unlimited capacity.

3 0
3 years ago
ShellShock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, whi
mina [271]

Answer: Windows

Explanation:

ShellShock: Also called Bashdoor, it is a security bug which is found in the Bash shell of operating system e.g. Unix. It allows the hacker to execute scripts and commands by gaining unauthorized access. This affects many machines, devices that use Bash. Servers like web servers are most affected as most of them run Unix based OS like OS X. Most vulnerable are those who use Unix or Linux operating systems.  

Microsoft Windows does not use Bash so it does not directly affect Windows os. For those who are using Windows PC, Windows phones and websites that are developed by MS software are non-vulnerable to ShellShock.

4 0
3 years ago
Computers process information consistently for all transactions. This creates a risk that:______
Anna007 [38]

Answer:

b. erroneous processing can result in the accumulation of a great number of misstatements in a short period of time.

Explanation:

Because of the consistent nature of processing in computers, this is capable of creating certain kinds of risk. From the option, one of the probable risk that can result from consistent information processing for multiple transactions at the same time is erroneous processing. This can therefore lead to a pile of misstatements in only a short period of time.

6 0
3 years ago
Picture question please help me
cluponka [151]

Answer:

where is the picture?????

6 0
3 years ago
Read 2 more answers
You have just assembled your first PC. You hit the power button and the computer turns on. As the computer runs through POST, it
Paha777 [63]

Answer:

Explanation:

If the HDD is spinning, this means that the power cable is correctly connected and that the drive is receiving power and powering on. However, this does not mean that the HDD is functioning correctly and reading the information. Therefore, the next logical step would be to check the SATA cable that connects the drive to the motherboard. The cable may be broken or maybe the SATA slot on the motherboard. Switch out the cables and plug it into another slot. If this does not work, then it may be that the HDD is broken. Multiple Beeps can also mean that the RAM or CPU is not plugged in correctly or broken.

6 0
3 years ago
Other questions:
  • Who are the founders of Microsoft?
    5·1 answer
  • Which of these statements most accurately describes cookies?
    15·1 answer
  • Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho
    8·1 answer
  • Can anyone can tell me and explain me the answer of it please .<br>thanks
    9·1 answer
  • How to get bing with any node unblocker
    10·2 answers
  • What is the family access code right now?
    5·1 answer
  • How can I make [ print(3 * x) ] into a functional python code?
    8·1 answer
  • This is a tableware use to serve the main dish
    11·1 answer
  • Hello guys please help me <br>list and identify the components of computer ​
    15·1 answer
  • What is the full form of MOS<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!