1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
9

Explain the difference between true north and magnetic north.

Computers and Technology
1 answer:
Furkat [3]3 years ago
4 0
Magnetic north is the north a compass points in the direction of. True north, on the other hand, is north based on the earth's axis.
You might be interested in
5.William travels a lot on business purpose. He needs to regularly communicate with his business partner. He also needs to send
FromTheMoon [43]

Microsoft Online is free to use. It includes Microsoft Excel, Word, One - Note and PowerPoint.  Microsoft Outlook (email app) is free as well, although it is a seperate download.

Another way to go is via Google docs, The Google drive is rather large and safe to store reports, docs, images, etc.

Both Microsoft online and Google Docs are accessible to use on virtually any device as in: PCs, Laptops, Tablets, Androids and Iphones.


4 0
3 years ago
"Which of the following will help protect against a brute force attack?
Effectus [21]

Answer:

B

Explanation:

A complex and unpredictable password would prove very hard to guess or deduce for any attacker.

3 0
4 years ago
________ was the communication medium of choice for early computer criminals.
vladimir1956 [14]
I would say that morse code would be the answer, but im not sure if that would apply to  computers
5 0
4 years ago
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
notka56 [123]

Answer:

The answer is "compromise"

Explanation:

In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.

  • In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
  • This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.

4 0
3 years ago
Read 2 more answers
To be useful for most household applications, DC voltage is?please <br>​
satela [25.4K]

Answer: To be useful for most household applications, DC voltage is passed through a step-down transformer.

Explanation: Voltage coming through AC or DC outlets is typically far too high for most household appliances to handle, so the current is passed through a step-down transformer to reduce the voltage to a usable level.

3 0
3 years ago
Other questions:
  • hey computor guys. is the MSI B250M GAMING PRO LGA 1151 Intel B250 HDMI SATA 6Gb/s USB 3.1 Micro ATX Motherboards - Intel compat
    8·1 answer
  • A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some
    11·1 answer
  • 1.The small company where you work needs to implement a second server for its accounting system but does not have the funds to p
    15·1 answer
  • Which of the following statements best reflects the usefulness of commercial digital editing programs?
    7·1 answer
  • Grace Hopper led the development of ______, a programming language for business applications.
    6·2 answers
  • Which of the following is true of e-learning and computer-based training (CBT)?
    13·1 answer
  • How many sets of number do both Hex and RGB values have?
    10·1 answer
  • How to get free PS5?
    8·2 answers
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
  • What is the complete path and filename of the file where ports and their associated protocols are defined
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!