1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Talja [164]
3 years ago
5

What is the reason that friction is present in surface to surface contact?

Computers and Technology
1 answer:
Andrej [43]3 years ago
3 0
One surface is larger than the other surface
You might be interested in
PLZZZ HELP!!!!!!!
jek_recluse [69]

Answer: A is the correct choice.

5 0
3 years ago
Dinah is using an IDE to write, modify, and save code. Which tool should she use?
julsineya [31]
A source code editor, hope this helps! :)
6 0
3 years ago
Read 2 more answers
IMPORTANT!!<br><br> How can you get real answer keys for edmentum (plato) courses as a student?
dimulka [17.4K]

Answer:

Looking up the answer on google works but in my experience if you put the whole question onto brainly then look for the one with the best stars and most then the answer will be correct, thats how i have 100% on all my assingments, sorry if this isnt the answer you wanted but it helps

Explanation:

4 0
3 years ago
Identify a statement that accurately differentiates between short-term memory and working memory.
Veronika [31]

Answer:

Short term memory is in which a person may forgot very previously introduced knowledge, whereas working memory...well...works. Most people have working memory.

Explanation:

5 0
3 years ago
A popular encryption method used to protect data that travel over a wireless network is ___
ddd [48]

Answer:

The most serious threat to offshore industrial systems is external access to control systems. Unwanted access to the human/machine interface (HMI) can allow third parties full control of a system. Zybersafe provides protection of the integrity of data that traverses the Ethernet connection between a company’s headquarters and a remote system.

4 0
3 years ago
Other questions:
  • When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
    11·2 answers
  • The equipment that processes data in order to create information is called the _______.
    8·2 answers
  • Difference between change management n asset management
    11·1 answer
  • Josh's boss asked him to write a letter to their customers explaining some upcoming price increases. But Josh was in a hurry to
    8·2 answers
  • Leonardo is having difficulty accessing the course website. he should contact the for assistance. (points:1)
    13·1 answer
  • What is used to connect computers to the internet*Audio Ports
    15·2 answers
  • What is the first phone ever made?
    6·1 answer
  • You looked at the methods used to determine database requirements. Now, research and find a database requirements template. Choo
    9·1 answer
  • If u play codm pls tell me ur username
    9·2 answers
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!