1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
3 years ago
10

If E=mc2 then what does F equal?

Computers and Technology
1 answer:
Vladimir79 [104]3 years ago
4 0

Answer:

First of all,there is not theory F=ma^2!!

Its F=ma and they are definitely not the same.Here F means force and E means Energy.

a means acceleration, but c means the velocity of light. Clearly there's difference between acceleration and velocity and force and energy.

F=ma can be applied on things we normally see but E=mc^2 is applied on things that can travel nearly in light speed!which means atoms,molecules, protons,electrons etc. energy can be determined by the Einstein theory but F=ma is for determining human energy, or energy of cars,vehicles or any regular moving things

Explanation:

You might be interested in
how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
juin [17]

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
5 0
3 years ago
Create a flowchart to print numbers from 1 to 100
Mkey [24]

Answer:

brainliest plsss

Explanation:

I think so this is what you had asked!!!!!!

hope it helps

4 0
3 years ago
It's not possible to die in an alcohol-related collision if you're not in an automobile.
frutty [35]

Answer:

B. False

Explanation:

  • Consumption of alcohol is not a good practice and is generally not allowed at the time of driving an automobile and is considered to be an offense as it may be injurious to health and property.
  • As too much alcohol can create possible chances of collusions and even if the person is not in an automobile can result in a collision if tries to cross the road. Like head injuries or leg injuries can occur.
8 0
3 years ago
What is the correct order for writing the 3 dimensions for a 3D object? Here are the 3 dimensions:
Nady [450]

Answer:

Length x Width x Hight

Explanation:

3 0
3 years ago
Need help with this question please help it’s on c++
yan [13]

Answer:

b

Explanation:

if you look at the end of the code it brings c back but for it to do that it has to make a newline.

8 0
3 years ago
Other questions:
  • Text filters allow you to create a custom filter to match ________ the text in a field that you specify.
    7·1 answer
  • After reading the article, "The Impact of Technology", answer the following question.
    14·1 answer
  • Print the two strings in alphabetical order. assume the strings are lowercase. end with newline. sample output: capes rabbits
    5·2 answers
  • Which description best explains a placeholder?
    7·1 answer
  • BRAINLYEST IF CORRECT!!! What is the special feature of the View Side by Side command?
    6·2 answers
  • Which operating system is a version of Linux?​
    13·1 answer
  • Describe the following types of Cloud services:
    11·1 answer
  • List any four common hardware device​
    10·1 answer
  • Game Design!
    10·2 answers
  • class Login: def __init__(self): self.login_name = 'none' self.login_password = 'none' # TODO: Define class method - check_crede
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!