1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leona [35]
3 years ago
9

The motion of any object can be broken down into it's component (parts of) vectors. true or false

Computers and Technology
2 answers:
Zepler [3.9K]3 years ago
8 0

Answer:

The correct answer choice is true.

natta225 [31]3 years ago
7 0

It is a true fact that the motion of an object can be broken down into its components of vectors.  

True

<u>Explanation:</u>

The motion of an object is defined as the process of moving or being moved when considered under a particular frame of reference.

Any object undergoing the motion in any direction has components of vectors, one vector always acts in a direction of motion and the other vector acts perpendicular to  the direction of motion of the object.

Both the vectors are represented by sin and cos of angle.

You might be interested in
What would you NOT use a router for? *
Alla [95]

Answer:

<h2><u>A</u><u>.</u><u> </u><u>To</u><u> </u><u>run</u><u> </u><u>applications</u><u> </u><u>on</u><u> </u><u>your</u><u> </u><u>computer</u></h2>

3 0
3 years ago
John typed 545 words in 35 minutes, what is his typing speed
Katarina [22]

Answer: 545 words per 35 mins

Explanation:

4 0
2 years ago
Read 2 more answers
Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
Anettt [7]

Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

<h3>What is anonymization?</h3>

The term anonymization is known as data masking and it is the standard solution in the case of data pseudonymisation. It is generally recognised by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Data is generally identified by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Therefore, Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

Learn more about anonymization here:

brainly.com/question/4268168

#SPJ4

5 0
2 years ago
What is the title of RFC 4890 and what year was this RFC published?
Phantasy [73]

Answer:

The title of RFC 4890 is "Recommendations for Filtering ICMPv6 Messages in Firewalls" and it was published in 2007.

Explanation:

RFC 4890 is the memo that was published in 2007. This document is about the recommendations of filtering messages that are harmful and having security risk for Internet Control Message Protocol ICMP version 6.

In this document different types of risk associated ICMPv6 protocol while forwarding messages. This memo recommends filtering techniques to drop the harmful messages and make the communication secure.

4 0
3 years ago
Personal computer is the rise of what?​
gogolik [260]

Answer:

Overuse injuries of the hand.

Obesity.

Muscle and joint problems.

Eyestrain.

Behavioural problems including aggressive behaviour.

6 0
2 years ago
Other questions:
  • Calls to the tostring( ) method emphasize the use of ____.
    12·1 answer
  • Name a computer programme that designers are likely to use to create a leaflet advertising their new product
    15·1 answer
  • Differentiate between third and fourth generation of computer​
    6·1 answer
  • A complete traversal of an n node binary tree is a(n)____ "operation if visiting a node is O(1)for the iterative implementation
    5·1 answer
  • Help please brainliest
    8·1 answer
  • Is it possible to have a deadlock involving only oneprocess? Explain your answer.
    11·1 answer
  • Que se puede observar en el escritorio de windows
    8·1 answer
  • What are hard ware and software requirments in multimedia computer system
    5·1 answer
  • How do you modify WordArt? Give specific details and steps<br><br> NEED THIS ASAP
    9·1 answer
  • Which very high-speed fiber network was already in place and being used for wide area networking (wan) transmissions, before the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!