1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
8

What are the properties of magnetic field​

Computers and Technology
1 answer:
qwelly [4]3 years ago
5 0

Answer:

They never cross. Their density increases and they have the same strength

Explanation:

You might be interested in
What are the three different types of hard drives? Briefly describe each, and list the possible configurations and device files
Lady_Fox [76]

The three different types of hard drives are:

  • SATA
  • SSD
  • NVMe

<h3>What is the SATA drive?</h3>

This was said to be Introduced in the year 2003, SATA (or Serial Advanced Technology Attachment) is known to be a kind of a default interface that was made for a lot of desktop and laptop hard drives.

Hence, The three different types of hard drives are:

  • SATA
  • SSD
  • NVMe

Learn more about hard drives from

brainly.com/question/1558359

#SPJ1

5 0
2 years ago
Due to the shift from host-based networks to microcomputer based networks, more than _____ percent of most organizations' total
DanielleElmas [232]
This is ninety percent
8 0
3 years ago
Which button is not present in the font group Home tab?<br> -B<br> -U<br> -I<br> -D
Otrada [13]

Answer:

-i

Explanation:

is the answer of that question

3 0
3 years ago
Read 2 more answers
_____ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.
kap26 [50]

Answer:

"Social engineering" is the correct answer for the above question.

Explanation:

  • Social engineering is a process, which gives the idea for the hacker or unauthorized user to get inside the system or hack the system.
  • It is used to read the humans data or psychologically hack human data.
  • It teaches the processor by an attacker to be the master of the authorized user. By this, an attacker can able to know the authorized term with the help of an authorized person.
  • The above question asks about the term, which is used to help the hackers to hack the system. This term is known as Social Engineering.

6 0
3 years ago
You are instructing a user on how to properly use a new laptop. He asks about the special function keys that are used to perform
ruslelena [56]

Answer:

The Fn key.

Explanation:

In this scenario, you are instructing a user on how to properly use a new laptop. He asks about the special function keys that are used to perform tasks such as toggling the display or adjusting the display brightness.

The user should strike the "Fn" key in combination with the special function keys.

In Computer science, the special function keys found on the top row of a keyboard are the F1, F2, F3, F4, F5, F6, F7, F8, F9, F10, F11, and F12 keys. Each of the special function keys just like their name suggests are used to perform different tasks respectively as defined by the operating system of a computer.

Fn is an acronym for function. In order to use the special function keys, a user must first hold down the Fn key before pressing the specific special function key which then triggers functions configured to use this key.

<em>For instance, </em><em>"Fn+F2" </em><em>is to reduce brightness on the Windows operating system. Also, </em><em>"Fn+F12"</em><em> is to increase audio volume on the Mac operating system. </em>

6 0
3 years ago
Other questions:
  • After installing an update on her MacBook, a user contacts the technician to complain that the WiFi is not working. The WiFi ico
    14·1 answer
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • What is the common name for the growth rate function N?
    8·1 answer
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • Which of the following statements is true? Computer disks are volatile storage devices Volatile storage is lost when a computer
    12·2 answers
  • Sarah has entered data about football players from team A and team B in a worksheet. She enters names of players from team A wit
    9·2 answers
  • It is possible to change the shape of a text box.
    10·1 answer
  • Ima go to sleep but I ask a favor can u guys go on eBay Amazon and find the cheapest pre bilt that is actually good
    14·2 answers
  • Jack was drinking a glass of water near his computer when his dog bumped his arm, spilling water on his keyboard. What is the fi
    6·2 answers
  • What is Microsoft Excel?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!