1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
11

True or false: erosion takes very long to happen.​

Computers and Technology
2 answers:
Mkey [24]3 years ago
6 0
The answer is true. erosion takes place over time
lesantik [10]3 years ago
4 0

Answer:

True

Explanation:

By definition, erosion is the gradual destruction or diminution of something.

1) Erosion can take many forms

2) The 3 main types of erosion are water, wind, and ice

3) The process of erosion can take up to thousands of years

4) Erosion affects humans because it creates dust that pollutes the air and on average carries around 20 different diseases including anthrax and tuberculosis

You might be interested in
Select the best word or phrase to complete each sentence Jobs that require you to use your v are typically rewarding Individuals
Maslowich

Answer:

aptitudes

personalities

openness

potential career choices

communication skills

current skill levels

Explanation:

7 0
3 years ago
The top of a ladder must extend how many feet above the surface a worker is climbing onto?
Alika [10]
<span>The answer is THREE FEET. This is part of the safety precautions that must be taken when using ladder. Other safety precautions include: only used inspected and certified ladders, keep ladders at least ten feet away from power lines, do not use ladder on slippery surfaces, etc.</span><span />
6 0
3 years ago
Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
Mars2501 [29]

Since Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard, the attacks that is related to encrypted wireless packets is option A: IV attacks.

<h3>Describe an IV attack.</h3>

A wireless network attack is called an initialization vector (IV) attack. During transmission, it alters the IV of an encrypted wireless packet. One packet's plaintext can be utilized by an attacker to calculate the RC4 key stream produced by the IV employed.

Note that A binary vector used to initialize the encryption process for a plaintext block sequence in order to boost security by adding more cryptographic variance and to synchronize cryptographic hardware. The initialization vector is not required to be kept secret.

Learn more about Wi-Fi Protected Access  from

brainly.com/question/13068630
#SPJ1

See full question below

Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understanding that WPA uses a combination of an RC4 stream cipher and Temporal Key Integrity Protocol (TKIP), this makes a wireless access point NOT vulnerable to which of the following attacks when related to encrypted wireless packets?

IV attacks

Malware

Ransoware

5 0
1 year ago
Which statement about broadcasting a slideshow online is true?
9966 [12]

Answer: PowerPoint has a free, built-in service for broadcasting online.

Explanation:

The statement that's true about the broadcast of a slideshow online is that PowerPoint has a free, built-in service for broadcasting online.

Option 1 is wrong as all transitions are not properly displayed to the audience when broadcasting online.

Option 2 is wrong as broadcasting as slideshow online is an option for most PowerPoint users.

Option 3 is wrong because when broadcasting online, third party desktop sharing software isn't necessarily an option and it isn't a must that it must be used.

Therefore, the correct option is 4.

4 0
3 years ago
Read 2 more answers
4
Nataly_w [17]

Answer:

5 hours 25 minutes

Explanation:

It takes 25 minutes to finish a hole

It takes 25*13 minutes to finish 13 holes

325 minutes is require to finish 13 holes

Convert 325 minutes to hours and minutes by dividing it by 60

=5 5/12 hours

Convert 5/12 hours to minutes by multiplying by 60

=25 minutes

The answer is 5 hours 25 minutes

5 0
3 years ago
Other questions:
  • Which OS function does a CLI fulfill? A User interface B Running applications C Hardware interface D Booting
    8·1 answer
  • Susan bought a new sweater on sale for $28.93.she was charged HST of 13%.find the total amount of her bill including taxes.​
    9·1 answer
  • Someone please help! Please fill this out
    10·1 answer
  • Themes are applied from which tab?
    6·1 answer
  • Which option correctly describes a DBMS application? A. software used to manage databases B. software used to organize files and
    7·2 answers
  • Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
    14·1 answer
  • Which is an unethical use of technology and resources at the workplace?
    13·2 answers
  • 1.) Florida has ____________ roads that are designated as part of the National Highway System.
    12·1 answer
  • Importancia del sistema operativo
    6·1 answer
  • On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!