1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
4 years ago
13

The figure above shows two pith balls suspended by threads from a support. In the figure, A. the pith balls are uncharged. B. pi

th ball 1 is positively charged, and pith ball 2 is negatively charged. C. pith ball 1 is negatively charged, and pith ball 2 is positively charged. D. pith balls 1 and 2 have the same charge.
Computers and Technology
2 answers:
lord [1]4 years ago
5 0

Answer:

b,c

Explanation:

B:pitcher 1 does not have a symmetric data set

C:pitcher 2 has a symmetric data set

ON EDUNUITY

Anna35 [415]4 years ago
3 0
The answer is d I think
You might be interested in
What software can be used for remote operation of a sunsdr2 dx?.
Rasek [7]

Answer:

Install the ExpertSDR2 Remote Client software on your PC. Download the client here. You can also access your device via any web browser

8 0
2 years ago
A domain account is one that is created on a Windows server domain controller (network) using (Describe Microsoft accounts)
Korvikt [17]

Answer:

s

Explanation:

3 0
3 years ago
The color gradient is
Kipish [7]
A range of position dependent colors
8 0
3 years ago
All of the following are types of data storage devices except CD/DVD computer monitor digital cameras flash drive
horrorfan [7]

Computer Monitors are not storage devices.

3 0
3 years ago
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
3 years ago
Other questions:
  • Emma wants to create a web page for her school’s volleyball team. Which of these could she use?
    7·1 answer
  • How does the team know what to work upon during the iteration
    6·1 answer
  • What is a major plastics engineering project that is going on right now in Arizona?
    9·1 answer
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    7·1 answer
  • Who is the owner of microsoft company​
    12·1 answer
  • Write a cash register program that calculates change for a restaurant of your choice. Your program should include: Ask the user
    11·1 answer
  • If I want to add a new slide to my presentation, which option would I click on?
    5·1 answer
  • Adding Page Numbers in the Footer
    15·1 answer
  • Where is the element coded in a web page.
    13·1 answer
  • Which is government departments fund the Global Positioning System
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!