1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
3 years ago
8

Add me on blizzard none of my friends play ow NADERJABER#2530

Computers and Technology
1 answer:
Alexus [3.1K]3 years ago
8 0

Answer:

Cool but no thanks.

Explanation:

I hope you find some friends to play with. Good luck! :D

You might be interested in
. What is the relationship between frequency, wavelength and speed of a wave?
jeka94

Answer:

vw = fλ

Explanation:

Sound, like all waves, travels at a certain speed and has the properties of frequency and wavelength. You can observe direct evidence of the speed of sound while watching a fireworks display. The flash of an explosion is seen well before its sound is heard, implying both that sound travels at a finite speed and that it is much slower than light. You can also directly sense the frequency of a sound. Perception of frequency is called pitch. The wavelength of sound is not directly sensed, but indirect evidence is found in the correlation of the size of musical instruments with their pitch. Small instruments, such as a piccolo, typically make high-pitch sounds, while large instruments, such as a tuba, typically make low-pitch sounds. High pitch means small wavelength, and the size of a musical instrument is directly related to the wavelengths of sound it produces. So a small instrument creates short-wavelength sounds. Similar arguments hold that a large instrument creates long-wavelength sounds.

The relationship of the speed of sound, its frequency, and wavelength is the same as for all waves: vw = fλ, where vw is the speed of sound, f is its frequency, and λ is its wavelength. The wavelength of a sound is the distance between adjacent identical parts of a wave—for example, between adjacent compressions as illustrated in Figure 2. The frequency is the same as that of the source and is the number of waves that pass a point per unit time.

5 0
3 years ago
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
1 year ago
Read the citation example, and then use the drop-down menus to identify each part.
Lemur [1.5K]

Answer:

im notur e

Explanation:

5 0
3 years ago
Read 2 more answers
Which layer defines an interface that applications can use to request network services, rather than referring directly to applic
Scrat [10]
Explain what is meant by a limited data set and how this HIPAA rule may affect medical assistants
4 0
3 years ago
There are three types of value for money. Which of the following is not a method of value?
AlladinOne [14]
The answer to this question is c
4 0
3 years ago
Other questions:
  • Barr the Bear has started a business to sell fish to Poe and his fellow penguins. The penguin customers submit many fish orders,
    12·1 answer
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • If you want an app to reach the largest possible audience, which two platforms should you use?
    7·1 answer
  • What type of social engineering attack uses email to direct you to their their website where they claim you need to update/valid
    6·2 answers
  • Bill downloaded an antivirus software from the Internet. Under the Uniform Commercial Code (UCC), the software is a: Select one:
    15·1 answer
  • What is the cell reference for the cell located in the second column and fifth row of a worksheet?
    9·1 answer
  • Determine the “answer” to the formula according to the spreadsheet below:<br><br> =A3 + B4 + D2.
    15·1 answer
  • To view the results of a query, open it by pressing and holding or right-clicking the query in the navigation pane and tapping o
    10·1 answer
  • When a chart is selected, numerous customization options can be found on which Chart Tools tabs?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!