1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
10

The motion of electrons can be predicted precisely. True False

Computers and Technology
2 answers:
Aleksandr-060686 [28]3 years ago
6 0
The statement above is false; the motion of electrons can not be predicted precisely. Electrons move around the orbit shells at different energy levels in atoms. Previous research works had devised ways of measuring the angular velocity of electrons and means of tracking the movement of electrons in atoms but the movement of these electrons can not be predicted. They move in a random manner round the nucleus of an atom.<span />
krok68 [10]3 years ago
4 0

The answer you are looking for would be false :)

You might be interested in
Which of the following best explains what happens when a new device is connected to the Internet?
Radda [10]

Answer:

it will use up some of the internet and then you will have to pay for it later.

Explanation:

because it is taking up the internet so you will have to pay for it .

7 0
2 years ago
Select one of the following strategies: active listening, sandwich technique, constructive feedback. in 2-5 paragraphs, define a
Neporo4naja [7]

Answer:

Active listening is used to make things more clear when talking to other people. Whether it is on the phone or face to face active listening can reduce any unwanted barriers of communication. Getting rid of barriers can help a company save time rather than trying to explain things multiple times. This ultimately would lead to more goods or services being produced therefore making the company more efficient. There are many more reasons why this workplace tacit is useful but I personally believe this is one of the more used ways.

I really hope this works for you!

5 0
3 years ago
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
Alex_Xolod [135]

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

4 0
3 years ago
Frank wants to revise an employee policy. If he wants to inform all of the employees of the change, what type of document will h
nekit [7.7K]

Answer:idk

Explanation:

4 0
3 years ago
Every information systems (is) user has the right to a secure computing environment. this means that the
Arturiano [62]
<span>Every information systems (IS) user has the right to a secure computing environment. this means that the </span>organization should protect his/her computer and its files.
5 0
3 years ago
Other questions:
  • You can use Facebook's live feed tool to broadcast content as you post it
    8·2 answers
  • Data mining is ______? a process of finding meaningful patterns in data to improve decisions a strategy for locating security so
    7·1 answer
  • The box plot represents this data set. {16, 16, 16, 18, 18, 20, 24, 28, 30, 34} What value does the letter A represent on the bo
    8·2 answers
  • Why are advanced features helpful when businesses use spreadsheets
    5·1 answer
  • To insert a column without using commands in any tabs, a user can _____ -click and then click insert column.
    6·2 answers
  • Which of the following is NOT a fixed expense?
    6·1 answer
  • Can someone tell me? I have an assignment in C++: I have to do three codes please tell me should i do them in one project or in
    12·1 answer
  • C:\windows\system32\drivers\etc\protocol is an example of a file ________. select one:
    5·1 answer
  • Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
    15·1 answer
  • What is closeable interface in java.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!