1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
9

Explain the difference between true north and magnetic north.

Computers and Technology
1 answer:
Furkat [3]3 years ago
4 0
Magnetic north is the north a compass points in the direction of. True north, on the other hand, is north based on the earth's axis.
You might be interested in
Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents.
Vsevolod [243]
<span>Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents. 
The answer is a. True 

</span>
6 0
3 years ago
Read 2 more answers
Is jesus dead or alive
Morgarella [4.7K]

Answer:

Explanation:

i think he alive but in heaven i dunno

8 0
3 years ago
you have been tasked with configuring a digital information station in the office's lobby. guests will be able to use the statio
REY [17]

The most important security consideration for the station is code signing. With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer.

With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer or mobile device with malware. Code signing has grown in importance for software developers and distributors as more software may be downloaded from the Internet.

Malware can be easily installed on a victim's computer by an attacker who poses as a trustworthy source. As long as users only download software that is regarded as safe by their operating system, code signing ensures that these types of assaults cannot happen.

Nowadays, the Operating System looks for the digital certificate produced through code signing when software is downloaded onto a computer to ensure the security of the software being installed. The user is informed and given the option to stop or continue the installation if no digital certificate is detected.

To know more about code signing click here:

brainly.com/question/28860592

#SPJ4

3 0
1 year ago
...............................
Gemiola [76]

............................

Mark me brainliest^^

7 0
2 years ago
Read 2 more answers
These are statements given by witnesses under oath? A. Testimony B. Admissible Evidence C. Indirect Evidence D. Circumstantial E
Aneli [31]

Answer:A. Testimony

Explanation:when someone knows something about what happened in the case held in court or they had witnessed what happened; In order to actual testify on what they know they are called on the stand and they have to raise their hand as a sign to swear an oath before the can give their testimony in court.

8 0
3 years ago
Other questions:
  • A(n) ____ is a collection of one or more program statements combined to perform some action
    14·1 answer
  • Of which of the following devices are point, drag, and click actions?
    15·1 answer
  • Electromagnetic waves used in ovens and cell phone communications are called
    6·1 answer
  • Line spacing refers to the amount of space between each line in a paragraph. A. True B. False
    14·2 answers
  • ............................... ?
    11·1 answer
  • The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use
    6·1 answer
  • In Google search results, how are organic links different from sponsored links?
    5·2 answers
  • The __________ gear is the input gear.<br> A. Drive<br> B. Driven
    5·2 answers
  • Who Has any idea How to code?
    7·2 answers
  • List 1 reason people invest in Cryptocurrency
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!