One drawback with relying on IoT applications to maintain the safety of critical systems is that _____. they only detect patterns or problems as they occur they may analyze data immediately as it streams into the cloud it is impossible to detect faulty sensor data automatically a poor or absent network connection can result in missing data

Answers

Answer 1

One drawback with relying on IoT applications to maintain the safety of critical systems is that a poor or absent network connection can result in missing data.

What is IoT?

IoT, or the Internet of Things, is a rapidly expanding network of physical objects that can connect and exchange data over the internet. An IoT device could be anything from a smartwatch to a sensor on a bridge that can monitor the strength of the structure.

The data generated by these devices is frequently transmitted to the cloud for processing and storage. IoT has a number of advantages that make it useful for a variety of purposes, including improving efficiency and safety, creating new revenue streams, and automating tedious or difficult activities.

IoT-enabled solutions are becoming increasingly common in areas such as transportation, healthcare, and manufacturing.

Learn more about iot network at:

https://brainly.com/question/24912721

#SPJ11


Related Questions

in database, each record is made up of a collection of columns called fields. True or False

Answers

The same is true for databases, where records are kept in the table's rows. The columns in a database are its fields.

A record is a set of characteristics that identify a real-world object. Each field in a record describes a different attribute of the entity.

A table's columns are a field, which is another word for an attribute. You can also conceive of it in the following way: a record is defined by a set of characteristics, and a set of attributes is contained in a record.

Records are assemblages of fields. A record in a database is a collection of fields from a table that are pertinent to one particular entity. Records consist of fields, each of which contains one item of information.

To know more about databases, click the below link

https://brainly.com/question/30634903

#SPJ4

distributive property of multiplication worksheets

Answers

The distributive property is a significant part of the basic arithmetic properties that students learn in math. It is one of the first topics students encounter in algebra, as it involves combining multiple terms to form a single equation.

In multiplication, the distributive property states that multiplying a number by the sum of two or more other numbers is the same as multiplying the number by each of the numbers in the sum and then adding the products. This is a useful tool for simplifying complex calculations and can be applied to many different types of equations.

Distributive property of multiplication worksheets are a great way to help students practice this concept. These worksheets typically include a series of equations or expressions that students must simplify by using the distributive property. Students will need to identify which parts of the equation can be combined and then apply the distributive property to simplify the expression.

There are many different types of distributive property of multiplication worksheets available online, ranging from simple problems for beginners to more complex problems for advanced students.

To know more about encounter visit:

https://brainly.com/question/6776618

#SPJ11

What is the reason for operating system (OS) vendors to create mechanisms for file sharing between devices

Answers

The reason for operating system (OS) vendors to create mechanisms for file sharing between devices is Setting up a network file share can be relatively complex.

What is operating system?The computer's operating system (OS) controls all of the hardware and software. It carries out fundamental duties such processing input and output, managing files, memory, and processes, and managing peripheral devices like disc drives and printers. An operating system performs three primary tasks: managing the computer's resources, including the CPU, memory, disc drives, and printers; creating a user interface; and running and supporting application software. While Windows 10 is reputed to get slower and slower over time, Linux is regarded for being swift and fluid. In addition to having a more contemporary desktop experience and superior operating system features, Linux performs faster than Windows 8.1 and Windows 10, while Windows is slower on older hardware.

To learn more about operating system refer to:

https://brainly.com/question/22811693

#SPJ4

print 3 numbers before asking a user to input an integer

print 3 numbers before asking a user to input an integer

Answers

Answer:

you can use an array to do this

Explanation:

(I've written this in java - I think it should work out):

Scanner input = new Scanner(System.in);

System.out.println("Enter an integer: ");

int userInt = input.nextInt();

int[] array = new int[userInt - 1];

for(int i = userInt-1; i < userInt; i--)

     System.out.println(array[i]);

what is network protocol define any three types of network protocol?

Answers

Answer:

A network protocol is a set of rules that govern the communication between devices on a network. These rules specify how data is transmitted, how messages are formatted, and how devices should respond to different commands.

Three common types of network protocols are:

TCP (Transmission Control Protocol): This is a transport layer protocol that is responsible for establishing connections between devices, breaking data into packets, and ensuring that packets are delivered reliably from one device to another.

IP (Internet Protocol): This is a network layer protocol that is responsible for routing data packets from one device to another based on the destination IP address.

HTTP (Hypertext Transfer Protocol): This is an application layer protocol that is used to transmit data over the web. It is the foundation of the World Wide Web, and it defines how messages are formatted and transmitted between web clients and servers.

pls award brainliest!

Explanation:

application software consists of programs that support day-to-day business functions and provide users with the information they need.
T/F

Answers

True. Application software consists of programs that support day-to-day business functions and provide users with the information they need.

Application software is designed to address specific tasks or activities in various domains, such as word processing, spreadsheet management, database management, project management, communication, and more. These software applications are user-centric and aim to assist individuals or organizations in performing their daily operations efficiently and effectively. They provide features, tools, and functionalities that enable users to input, process, and retrieve data, analyze information, communicate, collaborate, and perform other tasks necessary for their business functions.

learn more about Application software here:

https://brainly.com/question/30630407

#SPJ11

If Two Links To An Existing File Are Created In The Same Directory As The Original (Using The Link Syscall), How Many Inodes Are

Answers

If two links to an existing file are created in the same directory as the original using the link() syscall, then there are still only one inode and one copy of the file's data.

Each link is simply another name for the same file, and all links refer to the same inode number.

In other words, when a file is created in a Unix-like file system, it is assigned an inode, which contains information about the file's ownership, permissions, timestamps, and the location of the file's data on the disk. When a link to the file is created, a new directory entry is created that points to the same inode number as the original file. This means that changes made to the file through one link will be reflected in all other links, as they all point to the same inode.

Therefore, creating multiple links to the same file does not create additional inodes. Only the original file has an inode, and all links to that file simply reference the same inode.

Learn more about directory here:

https://brainly.com/question/7007432

#SPJ11

The pile-up of sand and silt at the site where a river discharges into the ocean forms a _____

AND DON'T PUT THE ANSWER RIVER MOUNTH

Answers

Answer:

delta I think

Explanation:

Any Suggestions on what to do here? I already restarted my PC twice, cleared my browsing data, and rebooted the wifi network....

Any Suggestions on what to do here? I already restarted my PC twice, cleared my browsing data, and rebooted

Answers

Answer:

if u r at school, then it might be blocked.

if not, get a vpn proxy.

Meaning of - <?xml version="1.0" encoding="utf-8"?

Answers

The given code is an XML declaration that defines the version of the XML document and its character encoding.


The XML declaration consists of two parts:

1. `version="1.0"`: This indicates that the XML document is using version 1.0, which is the most commonly used version of XML.
2. `encoding="utf-8"`: This specifies that the character encoding used in the XML document is UTF-8, a widely used encoding that can represent any character in the Unicode standard.

This declaration is typically placed at the beginning of an XML document, before any other content, to provide information about the document's format and encoding to the XML parser.

Learn more about XML visit:

https://brainly.com/question/30035188

#SPJ11

Project team member Kevin needs to define the use of change bars to show deleted and modified paragraphs. Under which standards does this fall?
O A.
interchange standards
OB.
identification standards
O C.
update standards
OD.
process standards
O E.

Answers

Answer: C) Update Standards

Explanation: Hope this help :D

You have copied the data highlighted in the dotted box. What would be the result if you did PASTE command at the selected cell ?

Answers

Answer:

The data would be copied over to the new box

Explanation:

True/false. Humans tend to form mental models that are __________ than reality. Therefore, the closer the __________ model comes to the ___________ model, the easier the program is to use and understand. (3 pts. )

Answers

FALSE. Humans tend to form mental models that simplify and represent reality, but these models are not necessarily "closer" to reality.

Mental models are cognitive constructs that individuals create to understand and interact with the world around them.

While mental models can help us make sense of complex systems or processes, they are subjective interpretations and abstractions rather than direct reflections of reality.

The notion that a closer model leads to easier program use and understanding is not universally true.

In the context of software or user interface design, a mental model that aligns closely with the program's functionality can indeed enhance usability and user experience.

When a program's design and functionality match users' existing mental models or expectations, it can facilitate ease of use and understanding.

For more questions on mental models

https://brainly.com/question/31039507

#SPJ8

Question:TRUE or FALSE Humans tend to form mental models that are than reality. Therefore, the closer the model, the easier the program is to use and understand.

Describe five advantages of using sensors and microprocessors to monitor the temperature in a geyser rather than using manual methods

Answers

The  five advantages of using sensors and microprocessors to monitor the temperature in a geyser rather than using manual methods are:

AutomationReal-time dataRemote monitoringAlarm and notificationData collection and analysis

What are microprocessors?

Automation: Using sensors and microprocessors to monitor the temperature in a geyser eliminates the need for manual monitoring, which can be time-consuming and prone to human error.

Real-time data: Sensors and microprocessors can provide real-time data on the temperature of the geyser, allowing for more efficient and effective adjustments to be made to the system.

Remote monitoring: Sensors and microprocessors can be connected to a network or the internet, allowing for remote monitoring and control of the geyser temperature. This can be useful for monitoring the geyser from a different location, or to monitor multiple geysers at once.

Alarm and notification: Sensors and microprocessors can be programmed to send an alarm or notification when the temperature exceeds a certain threshold. This can help prevent overheating and damage to the geyser.

Lastly, Data collection and analysis: Sensors and microprocessors can collect and store data on the temperature of the geyser over time. This data can be analyzed to identify patterns and trends, which can be used to optimize the performance of the geyser and improve energy efficiency.

Learn more about microprocessors from

https://brainly.com/question/29243062

#SPJ1

You order a computer. You can choose the base model and then select from a few component options when you place the order online. What's the order fulfillment process that the company is likely using to produce your computer? A. Make-to-order B. Assemble-to-order C. Make-to-stock D. Make-to-back order

Answers

The order fulfillment process used by the company to produce your computer is likely "Assemble-to-order."

The company's order fulfillment process is most likely "Assemble-to-order." In this process, the company offers a base model computer and allows customers to select from a few component options when placing the order online. Instead of manufacturing each computer from scratch, the company keeps pre-manufactured components in stock. When an order is received, the company assembles the computer by combining the base model with the chosen components.

This approach offers flexibility to customers by allowing them to customize their computer while maintaining a streamlined production process. The company can efficiently manage its inventory by producing and stocking the base models and components separately. Assemble-to-order minimizes production lead time since the base models are already manufactured, and assembly can be completed quickly once the customer's component choices are known. This process strikes a balance between customization and efficient production, meeting customer preferences while avoiding excessive inventory costs associated with Make-to-stock or Make-to-back order approaches.

Learn more about components here:

https://brainly.com/question/32800555

#SPJ11

The Open Systems Interconnection (OSI) Reference Model defines seven layers that are collectively referred to as a:

Answers

The Open Systems Interconnection (OSI) Reference Model defines seven layers that are collectively referred to as a protocol stack.

The OSI (Open Systems Interconnection) Reference Model is a model for the conceptual framework that defines the interaction between different communication systems with the help of seven-layer protocol stack. These layers are Application, Presentation, Session, Transport, Network, Data Link, and Physical. Each layer plays an important role in ensuring communication from one system to another, and the model is used to help ensure that different hardware and software solutions are compatible with each other.

The OSI model consists of seven different layers that provide a specific communication function. It includes seven layers, including the Physical layer, Data Link layer, Network layer, Transport layer, Session layer, Presentation layer, and Application layer. Each layer has a unique role and communicates with the other layers. The Physical layer deals with the physical connections, and the Data Link layer transmits the data between devices. The Network layer is responsible for routing data packets, and the Transport layer deals with the end-to-end transmission of data. The Session layer manages communication sessions, and the Presentation layer deals with data formatting. Lastly, the Application layer deals with user interaction.

The Open Systems Interconnection (OSI) Reference Model is a model that provides a conceptual framework to define the interaction between different communication systems. The seven layers protocol stack is a framework that comprises seven layers, including Physical, Data Link, Network, Transport, Session, Presentation, and Application. These layers work together to ensure communication from one system to another.

To know more about OSI model visit:
https://brainly.com/question/31023625
#SPJ11

Can someone please tell me the answer

Can someone please tell me the answer

Answers

We can see here that in converting sound from analogue to digital, we have:

A. The x- axis is the horizontal line while the y-axis is the vertical.

B. A is Quantization

   B is Encoding process.

   C is Decoding process.

What is sound energy?

Sound energy is a form of energy that is produced by vibrations or disturbances in matter that create waves of pressure that travel through a medium such as air, water, or solids. The energy of sound is related to the amplitude or intensity of the sound wave, which is the measure of the magnitude of the pressure fluctuations caused by the sound.

Sound energy is typically measured in units of decibels (dB), which represents the relative intensity of the sound compared to a standard reference level. Higher decibel levels correspond to higher sound energy and louder sounds.

Learn more about sound energy on https://brainly.com/question/30763236

#SPJ1

What part of the network is the point where the responsibility of the administrator ends and the telecommunications providers responsibility begins

Answers

Answer:

"PAD interface " is the correct answer.

Explanation:

PAD seems to be a concept most commonly linked with such an X.25 interface, where even the PAD splits the shared information into individual packets as well as configurations asynchronous distribution including its header information.The interface pad should be used for scrubbing polished surface areas and contour lines, in conjunction with handle abrasive particles. Use the pad GUI would also give a smoother performance. The control pad is located between some of the scrubbing disc as well as the backing pad.

A radio and communications security repairer is responsible for both radio and satellite communication systems.

True
False

Answers

i'm almost certain the answer is true

Answer:

The answer is true

Explanation:

I got it correct on the quiz

You receive a worksheet in which the rows are numbered 1, 2, 3, 5,6. This means that row 4 is _____.

Answers

People often hide cells of worksheet due to different reasons. This means that row 4 is hidden.

A worksheet is commonly know as a sheet of paper/computer sheet with which work is done or performed.

 

An individual can hide any worksheet so that it can be removed from their view. The data in hidden worksheets is not visible to the person, but it can still be referenced from other worksheets and workbooks. One can unhide hidden worksheets if need be.

Learn more from

https://brainly.com/question/17106092

Which of the following are advantages of using WYSIWYG? Check all of the boxes that apply.

You can focus on content.

You can find and debug problems in the code.

You can format text and apply styles without knowing much HTML.

You do not need much knowledge of HTML to create complex web pages.

Answers

Drag the items to the desired positions to alter the layout of a page. 3. Instead of looking for and putting content within HTML elements or utilising a complicated content management system, you can modify content (text or photos) in a WYSIWYG editor.

What are some instances of WYSIWYG?WYSIWYG, or "what you see is what you get," is a sort of editing software that enables users to view and modify information in a format that resembles how it would be presented on an interface, website, slide presentation, or printed document. For instance, a word processor uses the WYSIWYG idea when you write a document on it. When you print or send a document as a PDF, exactly the same information that you type into it will have been edited and formatted (ie. what you created on screen, you get). WYSIWYG (What-You-See-Is-What-You-Get) and manual coding are the two most popular ways to create HTML texts.

To learn more about WYSIWYG, refer to:

https://brainly.com/question/23272442

Answer: ACD-You can focus on content. You can format text and apply styles without knowing much HTML.

You do not need much knowledge of HTML to create complex web pages.

Explanation:

Advanced quantum mechanics.
In details and clear handwritting please.

Answers

Advanced quantum mechanics is a branch of physics that deals with the behavior of particles and systems at the quantum level.

It builds upon the principles of quantum mechanics and explores more complex phenomena, such as quantum entanglement, quantum field theory, and advanced mathematical techniques used to describe quantum systems.

Quantum mechanics is a fundamental theory that describes the behavior of particles at the microscopic level. It introduces concepts like wave-particle duality, superposition, and uncertainty. Advanced quantum mechanics goes beyond the basics and delves into more intricate aspects of quantum physics.

Topics covered in advanced quantum mechanics may include quantum entanglement, where two or more particles become correlated in such a way that their states cannot be described independently. This phenomenon has implications for quantum information processing and quantum computing.

Quantum field theory is another area studied in advanced quantum mechanics. It combines quantum mechanics with special relativity to describe the behavior of fields and particles interacting with those fields. This framework is used in particle physics to understand the fundamental forces and particles of nature.

Advanced mathematical techniques are employed in advanced quantum mechanics, such as Hilbert spaces, operators, and the Dirac notation, to provide a more comprehensive mathematical description of quantum systems.

Overall, advanced quantum mechanics is a complex and specialized field that explores the intricacies of quantum phenomena and provides a deeper understanding of the quantum world.

To learn more about quantum mechanics visit:

brainly.com/question/29458852

#SPJ11

Advanced quantum mechanics is a branch of quantum mechanics that encompasses more advanced concepts than those seen in undergraduate quantum mechanics courses. Quantum mechanics is the branch of physics that deals with the behavior of matter and energy at the microscopic level.

Advanced quantum mechanics courses go beyond the standard topics covered in undergraduate courses, such as the Schrödinger equation, wave-particle duality, and the Heisenberg uncertainty principle.Some of the advanced topics covered in quantum mechanics courses include the following:

Relativistic quantum mechanics - this is the study of the behavior of particles moving at high speeds, close to the speed of light.

Quantum field theory - this is the study of how particles interact with each other through fields, such as the electromagnetic field. It is used to describe phenomena such as the creation and annihilation of particles.

Quantum many-body theory - this is the study of how large systems of particles behave, and how they interact with each other.

Quantum computing - this is the study of how to build computers that use quantum mechanical principles to perform calculations. Quantum computers are still in the experimental stage, but they have the potential to revolutionize the field of computing.Advanced quantum mechanics courses are typically taken by graduate students in physics or related fields.

These courses are highly mathematical and require a strong background in calculus and linear algebra. Students are typically required to complete several problem sets and exams throughout the course, as well as a final project or paper.

To know more about phenomena visit:

https://brainly.com/question/31825772

#SPJ11

What happens if I leave any kind of device on for about a week?

Answers

Although it depends on which device you may be using, it can overheat or even catch fire in rare cases

Not the answer you were looking for? Ask me again, I would love to help you out and better understand the question at hand

Are you asking about electrical impact?

Which service provides dynamic global ipv6 addressing to end devices without using a server that keeps a record of available ipv6 addresses?.

Answers

The service that provides dynamic global ipv6 addressing to end devices without using a server that keeps a record of available ipv6 addresses is called: SLACC.

What is SLACC and why is it important?

SLAAC is an acronym that stands for Stateless Address Autoconfiguration, and the name pretty well sums up what it accomplishes. It is a method that allows each host on the network to automatically configure an IPv6 address.

SLAAC allows you to address a host based on a network prefix provided by a local network router using Router Advertisements (RA). Most IPV6 routers send RA messages by default; these messages are sent out on a regular basis by the router and contain information such as:

a single or many IPv6 prefixes (Link-local scope)Lifetime information should be prefixed.Information about the flagInformation about the default device (Default router to use and its lifetime).

Learn more about ipV6 addressing:
https://brainly.com/question/4594442
#SPJ1

Which tool can effectively increase the curl of the subject’s lips?

Answers

Blur tool can effectively increase the curl of the subject’s lips in photoshop.

What is blur tool?

You can paint a blur effect using the Blur Tool. By reducing the contrast between the pixels it affects, the Blur Tool's strokes blur the pixels' appearance.

All pertinent options for the Blur filter are displayed in the context-sensitive Options Bar, which is typically at the top of your workspace.

You can change the size and firmness of the brush using the brush option. The softness or featheriness of the brush's edges depends on how hard it is. Stronger in the center and weaker toward the edges, a soft blur brush will change pixels to varying degrees. It will create a stroke that melds well with the adjacent pixels.

Learn more about blur filters

https://brainly.com/question/20363744

#SPJ1

Find the worst case runtime (big-O notation) for the following pseudo code which returns true if an integer n is prime, false if it is not prime. Write the comparison made that the big-O bounds. For example, if 3n+1 comparisons are made, then the answer is O(n), but 3n+1 must be included in the answer.

Answers

The worst case runtime for the following pseudo code can be found by analyzing the number of iterations the for loop must perform. The for loop runs from i = 2 to i < n, and checks if n is divisible by i. The maximum number of iterations is n-2, when n is prime. Therefore, the worst case runtime is O(n).

function is_prime(n):

   if n < 2:

       return False

   for i in range(2, n):

       if n % i == 0:

           return False

   return True

The comparison made for the big-O bound is the number of iterations the for loop must perform, which is n-2.

To know more about pseudo click here:

brainly.com/question/30076572

#SPJ4

here have a good day

Answers

thank youuuu you have a really amazing day too!

assume that we have a function for an application of the form f(i, p), which gives the fraction of time that exactly i processors are usable given that a total of p processors is available. that means that

Answers

That means that -F (i,p)=1.

Processor or Microprocessor is a hardware device that becomes the brain of a computer and if the PC is without a processor, the PC cannot run. The processor is often also referred to as the central control or brain of the computer which is supported by other components. The processor is an IC that controls the entire course of a computer system and is used as the center or brain of a computer that functions to perform calculations and perform tasks. The location of a processor is in the socket provided on the motherboard; the processor can be replaced with another processor as long as the processor matches the socket on the motherboard. Many processor brands on the market include Intel, AMD, IBM, Apple, Cyrix VIA, and IDT. However, there are 2 companies that are famous in the world as processor developers for PCs, namely AMD and Intel.

You can learn more about Processor here brainly.com/question/28255343

#SPJ4

When a style is changed in an embedded stylesheet, it automatically applies the change to every page linked to that style sheet.​

a. True
b. False

Answers

The statement that 'When a style is changed in an embedded stylesheet, it automatically applies the change to every page linked to that style sheet' is true.

This is because the stylesheets are usually used in web designing to control the layout of multiple pages at the same time. Hence, when you modify a stylesheet, the change applies to every page linked to that stylesheet.Embedded stylesheetAn embedded stylesheet is a type of stylesheet that is embedded within an HTML document. It is placed in the head section of the HTML document and contains CSS styles. Embedded stylesheets apply to a single HTML page and control the styling of that page. If there are multiple pages that need to have the same styling, each page would need its embedded stylesheet. However, this may lead to repetitive coding, and that is why an external stylesheet is more suitable.PageA page refers to a single HTML document in a web application. Each page typically has its HTML document file and may also have an embedded or an external stylesheet. The content of a page is displayed in a web browser, and it can be navigated to by clicking on a hyperlink

.In conclusion, changing a style in an embedded stylesheet applies the change to every page linked to that stylesheet, and this is an efficient way to modify styles for multiple pages at the same time.

To learn more about stylesheet:

https://brainly.com/question/32226913

#SPJ11

explain with a reason one situation in which it would be appropriate to use an interpreter

Answers

Answer:

when you want an instant result

Explanation:

the intepreter converts the program line by line

Other Questions
What type of boundary creates earthquakes? What type of boundaries create volcanoes? Compare and contrast these two types of plate movements, and explain how these geologic events occur. a person's abandonment of a language in favor of a new one is called Choose the right translation according to the rules of Es and EstarWe are happy today with the arrival of our friendsA. So is felices hoy con la llegada de nuestros amigosB. Estamos felices hoy con la llegada de nuestros amigos The Canadian Pear Growers Association is concerned about increased competition from imported pears that are larger than those grown within Canadas borders. The Association wants to lobby for a trade barrier. Some members think a tariff or quota would be most beneficial. Others disagree and suggest an embargo would be best.What trade barrier do you think would be most effective? Why? (This question is worth 2 points - 1 for your answer and 1 for your explanation) Simplify 5x+3x+2y+4y halp Find the derivative of the function.h(t)=t2(4t+5)3h(t)=___ When an employee takes vacation time off, what is the impact on the accounting equation?. Private businesses have the most influence over the production of goods andservices in which economic system?A. Market economyB. Command economyC. Mixed economyD. Traditional economy Does the line y = 3x + 1 pass through the point (4,15) Use a calculator to find the sine and cosine of each value of . Then calculate the ratio sin/cos. Round answers to the nearest thousandth, if necessary.90 degrees In a system of fractional reserve banking, if the banks keep 25% of deposits as reserves ( reserves to depost (R/D) ration is 25%) and the intial monetary base or current in circulation is c+400 , Assume that all the currency is deposited in the banking system at each stage of credit creation, the money supply is There are 80 cabins on a ship. 29 of the cabins have windows. a) What fraction of the cabins have windows? Give your answer in its simplest form. b) Write your answer to part a) as a decimal. How did the ban of alchool reduce Crime rates during the Pandemic in Providing the Public Safety and how did it respond to the Criminal Justices eassy 01 Multiple ChoiceWhat is the first step when simplifying the expression I just need help with the first one During December, Alaskan Services makes a credit sale of $4.600 (before sales taxes). The state sales tax rate is 6% and the local sales tax rate is 2.5% Order the decimals from least to greatest. 1.7 -0.4 1.35 -1.55 -1.6 I DONT KNOW MATH HELP!! Please help me with this!I will give you a thanks! you are taking a bath in a 1.5 m tub during a small earthquake. the water sloshes up and down at the ends of the tub but remains still in the center. you observe that the water goes through 10 oscillations in 22 s. what is the wavelength of the surface wave in m? ators4 Support Your Claim Can you use athermometer to measure thermal energy?Support your claim with evidence.