1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
3 years ago
7

Using Hooke's law, F subscript s p r i n g end subscript equals k increment x, find the elastic constant of a spring that stretc

hes 2 cm when a 4 newton force is applied to it.
1/2 N/cm

2 N/cm

4 N/cm

8 N/cm
Social Studies
2 answers:
PIT_PIT [208]3 years ago
7 0
4 n/cm i think if im wrong im sorry

spin [16.1K]3 years ago
4 0

The correct answer is 2 N/cm, I just did the quiz.

You might be interested in
It is said that, "absence makes the heart grow fonder. My tsachers should really
Lapatulllka [165]
Reason


29 characters long
8 0
2 years ago
How do these ideas or achievements on archetecture of Egypt still affect our lives today?
GrogVix [38]

Answer:

It is the aura that surrounds the architecture of Egypt.

3 0
3 years ago
1. What were the major influences on Thomas Hobbes’s thinking?
nikklg [1K]
1. Hobbes’s major influence was what he experienced during the English civil wars, as, since he was a royalist, he was afraid of persecution if parliament went against the king.

2. Hobbes presented the argument that the only correct form of government is an absolute monarchy. The reason for this is so that all important decisions can be carried out/decided upon quickly by one, intelligent ruler.

3. Hobbes’s ideas of people being selfish influenced groups such as the federalists,which wanted to have the U.S. Constitution
6 0
3 years ago
"A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to"
Olegator [25]

<u>Answer:</u>

It is commonly referred to as phishing.

<u>Explanation:</u>

  • Phishing is called a social engineering technique because it involves convincing the victim through prolonged email and oral conversations to share his personal information like sensitive passwords and bank details.
  • Some highly skilled and learned yet antisocial groups of people attempt to reach out to working professionals through means like email or telephone and convince them to obey to their instructions for their own benefit.
  • These people who try to gain access to sensitive information of other individuals are often trained negotiators.
3 0
3 years ago
Read 2 more answers
In texas an initial permit to carry a concealed firearm costs about ________.
monitta
It would cost 260 dollars
4 0
3 years ago
Other questions:
  • The field of _____ is involved in the scientific study of behavior and mental processes.
    15·1 answer
  • How many "creators" did native Americans believe in?
    11·1 answer
  • I need help with this
    6·2 answers
  • Define election? why do we need elections ? how does it help us?​
    5·2 answers
  • The Himalayas are the highest and the youngest fold mountains. You may have read that they are rising higher and higher every ye
    13·1 answer
  • Why do you think that the percentage of federal spending that is mandatory has grown in recent years
    15·2 answers
  • Select all statements that are correct.
    14·1 answer
  • 10. We added wheels to our bureau to create less when we move it.​
    7·1 answer
  • What are some positive things that come from taxing citizens
    9·1 answer
  • n one to two sentences, describe how the destruction of the bison herds affected Indigenous Americans.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!