1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
5

You rub two red balloons against a wool scarf. What do you think will happen if you place the balloons near each other. Justify

your answer.
The balloons will stick together because they have similar charges.


The balloons will repel each other because they have opposite charges.


The balloons will stick together because they have opposite charges.


The balloons will repel each other because they have similar changes.
Computers and Technology
1 answer:
timofeeve [1]3 years ago
4 0

The balloons will repel each other because they have similar changes

You might be interested in
In what way, if any, is a model different from a simulation?
madam [21]

Answer:

Models and Simulations are completely different in that they achieve diffenet results.

Explanation:

Modeling is the act of building a model. A simulation is the process of using a model to study the behavior and performance of an actual or theoretical system. In a simulation, models can be used to study existing or proposed characteristics of a system. ... Simulating is the act of using a model for a simulation.

6 0
3 years ago
What is profit maximization in Monopolistic competition market ​
anygoal [31]

Answer:

In a monopolistic market, a firm maximizes its total profit by equating marginal cost to marginal revenue and solving for the price of one product and the quantity it must produce. The monopolist's profit is found by subtracting total cost from its total revenue. In terms of calculus, the profit is maximized by taking the derivative of this function

5 0
3 years ago
Discuss the importance of the coordinated attention to the 3 broad areas of InfoSec (pillars): Computer Security, Data Security,
True [87]

Answer:

Computer security, includes network security and data security

Explanation:

It is very important to be aware of computer security, then I provide the definitions of each of the three pillars.

Computer security:

Take into account that there is no absolute security, however, risks must be minimized.

 In this section, confidentiality, integrity, availability, and authenticity are important.

It also includes physical security (hardware), software security (network) and data security.

Data Security:

It is the set of logical systems whose function is to coordinate the hardware and software (registers, packages that travel through the network, etc.).

Network Security:

The goal is the advanced detection of botnets and malware callbacks. It must be prevented from intrusions.

5 0
3 years ago
In the Business world people are often measured by their???
alisha [4.7K]

Answer:

D

Explanation:

You need skills to succeed!!

6 0
3 years ago
Read 2 more answers
Adnan adds the word "shapes” to the shape.
Tamiku [17]

Answer:

its B: select, then right-click

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • What is the mid-square method?
    6·1 answer
  • Match the instruments with their uses.
    15·2 answers
  • )what item is at the front of the list after these statements are executed?
    15·1 answer
  • In excel, a number can contain the characters__
    8·1 answer
  • What is the relationship between data, information, business intelligence, and knowledge?
    10·1 answer
  • Explain paragraph layout
    10·1 answer
  • List 2 end to end test commands. <br><br> Will mark Brainliest!!
    13·1 answer
  • In a three-tier architecture, the component that runs the program code and enforces the business processes is the:_______.
    11·1 answer
  • 12. In Justify the text is aligned both to the right and to the left margins, adding extra space between words as necessary *
    13·2 answers
  • A ____ is a software program that is designed to cause damage to a computer or perform some other malicious act.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!