1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
9

Chemical formula of Copper(II)trioxonitrate(V)​plz needed urgently

Social Studies
1 answer:
olasank [31]3 years ago
3 0

Answer:

the chemical formula of copper tracksun nitrate cu(no3)2

You might be interested in
The greatest river system in South America is the Mississippi true or false
dimulka [17.4K]

Answer:

The given statement is False

Explanation:

Amazon is the largest river and a great drainage system in South America. Two thirds of the river is located in Brazil.  

It possesses the great and opulent bio diversity and the waters inhabit more than two thousand kinds of marine creatures. It has been a great foundation of protein abundance for the local populace and also a basis of fresh water. Due to soil erosion the nutrients in the river gets exhausted but the decomposed animals and plants serve to be the compost for the growth of new plant and animal species.  

This is called nutrient recycling. Piranha, Giant River Otter, blue dolphins and electric eel are some of the species found in the river. It originates in Peru. It drains through nine American countries.

3 0
3 years ago
What is the approximate present value of $1000 realized 2 years from now if the
Romashka-Z-Leto [24]

Answer:

the first one 4% is equal to 40 dollars

Explanation:

8 0
3 years ago
T
goldenfox [79]

Answer:

mr.president

Explanation:

it is Mr President because he is in charge of the country

3 0
2 years ago
__________ occurs when one person or program successfully masquerades as another by falsifying data and gains an illegitimate ad
jolli1 [7]

Answer:

The answer is a spoofing attack.

Explanation:

The different protocols related to the TCP/IP suite do not provide the correct ways or mechanisms to authenticate the message's source or destination. Thus, these protocols are vulnerable to spoofing attacks because the applications must take more precautions to know the identity regarding the sending or receiving host.

When there are spoofing attacks in the protocols referring to the TCP/IP suite, there is necessary to use firewalls to solve the problem. We can also see spoofing attacks in e-mails. Spammers use this technique to hide the origin of the respective e-mails and provoke issues like misdirected bounces.  

3 0
3 years ago
50. Who represents Oak Ridge in the House of Representatives?
Lady_Fox [76]

Answer:

Charles Joseph Fleischmann

Explanation:

6 0
3 years ago
Other questions:
  • How trade affected the development of early greek civilizations and describe the enduring traditions that greek culture extend t
    8·1 answer
  • If it exists, describe a situation in which drinking milk would be a disadvantage with ​respect to survival and reproduction
    12·1 answer
  • In four or more sentences, Analyze how patriotism leads to greater national unity, and by extension,better citizens
    14·2 answers
  • For a poll of voters regarding a referendum calling for a national airlines safety protocol, design a sample method to obtain th
    12·1 answer
  • What do I know before the start of this module about<br>function<br>of communication?​
    12·1 answer
  • Which of these is a correct description of one of the ways in which a command economy differs from a market economy?
    13·2 answers
  • Why do people believe in conspiracy theories?
    12·2 answers
  • n the levels-of-processing model of memory, information that gets processed at a ________ level (such as accessing the meaning o
    13·1 answer
  • what did The decimation of the native population of the Americas and the need for plantation labor result in
    11·1 answer
  • Which of the following is not a major economic activity of the valley and ridge region?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!