1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
2 years ago
14

Which of the following do nylon and Kevlar fibers have in common?

Computers and Technology
1 answer:
asambeis [7]2 years ago
3 0

Answer:

Kevlar. Kevlar is similar in structure to nylon-6,6 except that instead of the amide links joining chains of carbon atoms together, they join benzene rings. The two monomers are benzene-1,4-dicarboxylic acid and 1,4-diaminobenzene.

Explanation:

You might be interested in
Technological advancements during the industrial age provided Americans with:
Tems11 [23]

Technological advancements during the industrial age provided Americans with option B) More leisure times.

<h3>What were some technological advancements during the age of industry?</h3>

The growth in productivity is one that started with a little technical devices, such as the spinning jenny, spinning mule, and others.

Note that Technological advancements during the industrial age provided Americans with option B) More leisure times as machines does the work.

Learn more about Technological advancements from

brainly.com/question/2166344
#SPJ1

7 0
2 years ago
How do you use VMware Fusion to make a Tip Calculator?
lana66690 [7]
You have to subtract the tax amount by the final amount then multiply the result by the percentage of tip that is based on the service that you received.
4 0
3 years ago
What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryp
Vesna [10]
Answer is (HMAC) Hashed Message Authentication Code

This combines authentication via a shared secret cryptography algorithm key with hashing. It involves the client and server each with a private key. The client creates a unique hash per request to the server through hashing the request with private keys.






3 0
3 years ago
Select Packet 10 in the Wireshark top pane and then answer the following questions: Did this handshake complete properly? What i
Yuki888 [10]

Answer:

Yes

32 bytes

No

40 bytes

6 0
3 years ago
Explain how abstraction is used in a GPS system?
zhenek [66]
I hope that this answer will help u to solve your problem. But u have tto take the importance clues only .

5 0
3 years ago
Other questions:
  • Para saan po yung points dito?
    15·1 answer
  • Using Task Manager, you discover an unwanted program that is launched at startup. Of the following items, which ones might lead
    7·1 answer
  • Technology offers a variety of rich opportunities available to teachers and students. According to Inan and Lowther (2010), ther
    6·1 answer
  • Give the algorithm and flowchart for following C code:
    6·1 answer
  • Td udutdiydiyfyfigciydutdutdtt
    10·2 answers
  • Does anyone know what to do when brainly won't let you answer questions? I click on answer question and then it just sits there
    15·2 answers
  • A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101
    8·1 answer
  • Is it better to try to prevent damage from natural disasters or to deal with disasters after they occur?
    10·2 answers
  • Nathan wants to use the Push transition from left to right in his presentation. After he selects the Push transition, what shoul
    13·2 answers
  • What is an advantage of using a fully integrated cloud based data analytics platform
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!