1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
4 years ago
13

Will a pair of bar magnet ,with keepers on the two ends, act as a magnet

Computers and Technology
1 answer:
kiruha [24]4 years ago
8 0

Yes, because the keepers are made up of iron, when the magnet is in contact with it they become temporary magnet.

You might be interested in
your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
nlexa [21]

The protocol that should be used for establishing a secure network connection is SSH.  

The following information is to be considered:  

  • SFTP is secure also it is a protocol for file transferring that applied SSH.
  • IP, FTP, and DHCP should not be for safety purposes as they are not secure.
  • SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

4 0
2 years ago
What are the five types of docs you can create an share with google docs
Mademuasel [1]

Answer:

Documents: For composing letters, flyers, essays, and other text-based files (similar to Microsoft Word documents)

google sheets logo Spreadsheets: For storing and organizing information (similar to Microsoft Excel workbooks)

google slides logo Presentations: For creating slideshows (similar to Microsoft PowerPoint presentations)

google forms logo Forms: For collecting and organizing data

google drawings logo Drawings: For creating simple vector graphics or diagrams

Explanation:

8 0
3 years ago
Read 2 more answers
What is the value of creating recurring tasks?
scoundrel [369]

Answer:

✔️saves time spent manually creating multiple tasks

Explanation:

I did it on edge

4 0
3 years ago
Read 2 more answers
What set of code correctly initializes all elements of the array ar to the value 0, given the declaration
Veronika [31]

Answer:

The correct answer is:

C. ndx = 0;

while (ndx < 3) {

ar[ndx] = 0;

ndx++;

}

Explanation:

The declaration given is:

int ar[3];

This means the array consists of three locations and is named as ar.

We know that the indexes are used to address the locations of an array and the index starts from 0 and goes upto to 1 less than the size of the array which means the indexes of array of 3 elements will start from 0 and end at 2.

Now in the given options we are using ndx variable to run the while loop.

So the code to assign zero to all elements of array will be

ndx = 0;

while(ndx<3)

{

ar[ndx] = 0;

ndx++;

}

Hence, the correct answer is:

C. ndx = 0;

while (ndx < 3) {

ar[ndx] = 0;

ndx++;

}

7 0
3 years ago
Which type of reading is associated with an entry-level job?
REY [17]

Answer:

At entry level of any job, the reading that is essential to know is "<u>User manual</u>" Reading.

Explanation:

In any company or the firm in which some one wants to start at entry level, He needs to know about different rules, components, machines and systems of the company. To fulfill this purpose he needs to read some documents related to operations and functionalities of above mentioned parameters.

<em>These documents are called User Manuals. It contains all necessary information related to the system that will be helpful for the user. In this document step by step process are mentioned to handle the machine or device that is very helpful for entry level employ.</em>

5 0
3 years ago
Other questions:
  • Sizing handles are used in Microsoft® Word® to _____.
    13·1 answer
  • Use the Web as a resource to study the PDF format. a. Describe how PDF provides output that is consistent across different types
    8·1 answer
  • When pasting information copied from a Word document into an Excel spreadsheet, click in the cell that will be the _______ of th
    7·2 answers
  • The item that is clicked in a JList can be retrieved using the _____ method of JList.
    8·1 answer
  • What part of the code is a signal for the function to execute and pass back a value?
    11·2 answers
  • What is the main role of LDAP?
    14·1 answer
  • Write a program that prints the Grade based on the given data. 95-100: A+ 90-94: A 80-89: B+ 70-79: B 60-69: C+ 50-59: C &lt;49
    9·1 answer
  • The exponential distribution is often used to model what in a queuing system?
    12·1 answer
  • Communication is the transmission of messages to large audiences.
    14·1 answer
  • Greg wants to check the amount of requests his website receives. What test can he use?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!