1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
8

What are the properties of magnetic field​

Computers and Technology
1 answer:
qwelly [4]3 years ago
5 0

Answer:

They never cross. Their density increases and they have the same strength

Explanation:

You might be interested in
What is the best approach to handling the expectation of privacy by employees in the event an investigation needs to be carried
Wittaler [7]

Answer

The best approach to handling the expectation of privacy by employees in the event an investigation needs to be carried out on company-owned digital assets:-<u>A well-defined published policy that clearly states that an employer has the right to examine, inspect or access company-owned assets.</u>

3 0
2 years ago
What are color highlights?
SVETLANKA909090 [29]

A- overusing highlights lowers the contrast and degrads the effect of the highlights.

3 0
3 years ago
Read 2 more answers
How can I put my keyboard back​
zvonat [6]

Flip the laptop over, take off the screws that hold the frame together. Flip it back, take off the top plate. Then, slide the keyboard back in. Replace the frame, and then rescrew the screws. Replace the back side after.

~

8 0
3 years ago
Move the Retro music text object to the Album Title layer.​
Daniel [21]
If anyone say to “click this link for the explanation” do not click IT A VIRUS!!! be safe.
6 0
2 years ago
A(n) ____ occurs when a situation results in service disruptions for weeks or months, requiring a government to declare a state
Scorpion4ik [409]

I believe the answer is 'worst-case scenario.'

8 0
3 years ago
Other questions:
  • Which document would most likely be written in an informal style?
    12·1 answer
  • Create a class named CarRental that contains fields that hold a renter's name, zip code, size of the car rented, daily rental fe
    13·1 answer
  • It is important for security practitioners to take into consideration the __________ element when devising password security pol
    15·1 answer
  • You interact with a program through which of the following, thereby controlling how you enter data and instructions and how info
    5·2 answers
  • Write a program that calculates the total amount of a meal purchased at a restaurant by a customer. The program should ask the u
    15·1 answer
  • your computer is running exceptionally slow. not only does it take the operating system a long time to start, but programs also
    11·1 answer
  • When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share
    7·1 answer
  • What is a file and where can we make use of a file?​
    14·1 answer
  • If a TextView has not been displayed yet, it is possible to retrieve measurements about its width and height using the _________
    7·1 answer
  • If two devices simultaneously transmit data on an Ethernet network and a collision occurs, what does each station do in an attem
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!