1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
2 years ago
9

While fishing on a lake, a fisherman notices ripples 0.32 m apart, and they are

Physics
1 answer:
Karo-lina-s [1.5K]2 years ago
5 0

the main properties of the main wave propertioes include wavelength amplitude, cruest an trough

You might be interested in
What should you do before each laboratory exercise?
liraira [26]

Answer:

OA. . review all safety procedures and the lab activity procedure

Explanation:

3 0
3 years ago
Read 2 more answers
A 10 kg bowling ball sits at the top of a 10 m hill and then slides down its icy hillside.
Nataly_w [17]
We need more informtion
5 0
3 years ago
Read 2 more answers
What is it that lives if it is fed, and dies if you give it a drink?
IceJOKER [234]
A fire because you feed it wood, it lives longer but if you give it a drink, water, then it dies.
6 0
3 years ago
8 POINTS EASY MULTIPLE CHOICE, BRAINLIST FOR CORRECT ANSWER:
zubka84 [21]
C) Increasing voltage
8 0
3 years ago
Josh manages security at a power plant. The facility is sensitive, and security is very important. He would like to incorporate
Studentka2010 [4]
  • Question: Josh manages security at a power plant. The facility is sensitive, and security is very important. He would like to incorporate two-factor authentications with physical security. Which of the options below is the best way to meet this requirement?  A) Smart cards B) A mantrap with a smart card at one door and a pin keypad at the other door C) A mantrap with video surveillance D) A fence with smart card gate access  Answer: The correct answer is (B) A mantrap with a smart card at one door and a pin keypad at the other door  Explanation: Multi-factor access control systems are access control systems that authorises access only after more than one piece of evidence is presented to authenticate a user. The mechanisms used in multi-factor authentication include 1.  Knowledge (something the user and only the user knows),  2.  Possession (something the user and only the user has), and  3.  Inherence (something the user and only the user is). A two-factor authentication system uses two of these mechanisms to grant or deny access. An authentication system that uses a mantrap with a smart card (possession) on one door and a pin keypad (knowledge ) on the other door is a two factor authentication system.
8 0
3 years ago
Other questions:
  • Mr. Hoffman, a science teacher, drove 10 miles to school from home in 20 minutes. He drove the 10 miles home in 30 min. His aver
    12·2 answers
  • An integrated circuit is a _____.
    6·2 answers
  • When a wire loop is connected to a battery, ______ is produced in the loop
    15·2 answers
  • A helicopter carries a 1000-kg-car suspended from a rope below it. The helicopter flies horizontally at a constant speed of 25 m
    13·1 answer
  • Explain Rutherford's experiment?
    10·1 answer
  • 40 POINTS
    13·2 answers
  • Which describes the type of image formed by a plane mirror?
    12·2 answers
  • A ball is launched from ground level at 20 m/s at an angle of 40° above the
    15·1 answer
  • A spring stretches from 10cm to 22cm when a force of 4n is applied, if it obeys Hooke’s law,its total length in cm when a force
    9·1 answer
  • The following equation shows the position of a particle in time t, x=at2i + btj where t is in second and x is in meter. A=2m/s2,
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!