1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
4 years ago
13

5 examples of a linear motion in object.

Computers and Technology
1 answer:
NNADVOKAT [17]4 years ago
3 0

An example of linear motion is an athlete running 100m along a straight track. Linear motion is the most basic of all motion. ... Neglecting the rotation and other motions of the Earth, an example of linear motion is the ball thrown straight up and falling back straight down.


You might be interested in
Which of the following is the biggest issue facing wireless communication today?
anygoal [31]

Answer:

threats to privacy

Explanation:

7 0
3 years ago
This tag is used to change the appearance of your text on your web page
zaharov [31]

Answer:

b.font tag

is used to change the appearance of your text on your web page

8 0
3 years ago
How do you set up nordvpn with spectrum?
Setler [38]

Answer:

simple

Explanation:

use nordvpn with discount code: Chonchode

7 0
3 years ago
If a document reaches you, and requires you to perform some action, you should do it immediately if ________.
ankoles [38]
<span>You should do it if C. it will take less than two minutes to complete </span>
6 0
4 years ago
Read 2 more answers
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
4 years ago
Other questions:
  • 2. Now write a program named filereader.py that reads and displays the data in friends.txt. This program should also determine a
    5·1 answer
  • In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
    6·2 answers
  • Mary from sales is asking about the plan to implement Salesforce.com's application. You explain to her that you are in the proce
    9·1 answer
  • __________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
    9·1 answer
  • What inspired john logie baird to create the television?
    11·1 answer
  • Which of the following is the most compelling
    8·2 answers
  • What integer is represented by the following 8-bit twos complement representation: 1011 0000 ? (Enter your number in decimal, an
    6·1 answer
  • I AM GIVING BRAINLEST!!!!!!!!
    14·2 answers
  • What is file management?can please help me​
    14·2 answers
  • C++
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!