1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
3 years ago
11

The temperature in toronto canada was-4°c and tje temperature in brixton,england was 6°c warmer. what was the difference in temp

erature between two countries?
​
Computers and Technology
1 answer:
Oksana_A [137]3 years ago
7 0

Answer:

It is 10°c difference between them

You might be interested in
A monopoly is a market that has few competing businesses. many sellers of the same item. many sellers of a variety of products.
MissTica

Answer:

It is when a single company has control of a certain commodity or service.

5 0
3 years ago
Read 2 more answers
In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:
tigry1 [53]

Answer:

In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:

1. Sense the current leakage.

2. Trip the circuit.​

3. Cut off the electricity.

Electrical current leakage needs to be sensed at once. Without it being detected, it cant be dealt with. The second step consists of tripping the  circuit so at to remove the flow of electricity. The third step is to Cut the electricity off so to stop the leakage and be safe.

I hope the answer is helpful.

Thanks.

4 0
3 years ago
Which of the following is not a command for determining if MySQL is running on Linux (Ubuntu)?
laila [671]

Answer:

(c) sudo check status mysql

Explanation:

The commands service<em>, </em>ps<em> </em>and<em> </em>systemctl<em>, </em>are different ways to find out <em>if MySQL is running on Linux (Ubuntu), </em>but there is not such a command called <em>check</em> to do so in Linux.

Different programs in Linux operating system are organized in <em>processes</em>, and they are all created for a specific purpose: running an application, starting a web browser, and so on.

Some other programs like the <em>init program</em> start and stop essential service processes and there are currently two major implementations in Linux distributions:

  • <em>System V init</em> (traditional implementation)
  • <em>systemd</em> (emerging standard for <em>init</em>).

The commands service and systemctl are related to <em>System V init</em> and <em>systemd</em>, respectively, and can list the status of a program.

Thus, the command service can list if MySQL is running on Linux using the piece of code in the question: <em>sudo service mysql status</em>.

Likewise, the command systemctl can activate and deactivate services, and, among many other functionalities, list the status of a program (like the one in the question: <em>systemctl status mysql</em>).

The command ps (process status) "displays information about a selection of the active processes" [<em>ps</em> man page]. The command has many options, and some are -e (select all processes) and -f (full-format listing). In this case, the command output is <em>piped </em>to grep (global regular expression print) command to find those processes mainly related to 'mysql'.

It is important to remember that command <em>sudo</em> (superuser do) permits a user to "execute a command as the superuser or another user" [<em>sudo</em> man page], since commands <em>service</em> and <em>systemctl</em> require privileges to be run, for security reasons.

6 0
3 years ago
Will mark brainliest! What does this code do? What kind of code is this called?
gavmur [86]

Answer:

lol u can barly call this a code

Explanation:

its just a type error code i think

3 0
3 years ago
Systematically tackling the threats and vulnerabilities in the seven individual domains of a typical IT infrastructure helps you
Lorico [155]

Answer:

<u>Organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. </u>

Explanation:

The seven domains in an IT structure can be identified as:

  1. User Domain,
  2. Workstation Domain,
  3. LAN Domain,
  4. WAN LAN Domain,
  5. Remote Access Domain,
  6. WAN Domain,
  7. and System / Application Domain

They can be configured as portals for countermeasure failure and intruders, so it is crucial for organizations to look for ways to protect these domains to prevent unauthorized access to private data.

Therefore the relevance of the systematic approach to threats and vulnerabilities, which will assist in organizing the roles, responsibilities and responsibilities for risk management and mitigation.

7 0
4 years ago
Other questions:
  • Write a Python program that will take as input 5 integer values and will output the average of the odd values and the average of
    6·1 answer
  • Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond
    5·1 answer
  • 1. You can apply CSS formatting in which of the following ways?
    6·1 answer
  • What options of the hierarchical star topology within the ANSI/TIA-568-C allow the ability to move the workgroup switches closer
    7·1 answer
  • What is structured​ knowledge?
    10·1 answer
  • What is information associated with a document to help describe that document called?
    14·1 answer
  • Ethical design refers to...
    13·1 answer
  • 1) Using the density equation d=m/V: What is the density of a piece of metal with a mass o
    10·1 answer
  • When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequen
    15·1 answer
  • Explain how mobile phone production could be more sustainable​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!