1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
3 years ago
14

Which force is responsible for these orbiting motions

Computers and Technology
2 answers:
natita [175]3 years ago
8 0
Gravity i quess it is the awnser
pentagon [3]3 years ago
6 0
I may be wrong but i believe it might be gravity.

You might be interested in
What is a different paragph formatting tools
soldi70 [24.7K]
You can have paragraph alignment which is left, right, and center
5 0
3 years ago
Which part of project management involves determining possible risks?
stira [4]
Resources :) You’re welcome
7 0
3 years ago
Read 2 more answers
Describe a sub routine​
Maksim231197 [3]

Explanation:

A routine or subroutine, also referred to as a function procedure and sub program is code called and executed anywhere in a program. FOr example a routine may be used to save a file or display the time.

4 0
3 years ago
Can someone taught me? How to use this brainy apps la?​
Anna11 [10]
Okeh, So it basically helps you find answers for you homework and stuff and you can also answer people questions too and get points. You can get brainliest answer too. You can answer fake questions too but then you can be reported and the will delete your account
6 0
3 years ago
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
solong [7]

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

4 0
3 years ago
Other questions:
  • "Server Manager will allow you to manage all roles and features installed on any server, and view the status of all your servers
    7·1 answer
  • If one department chair—a professor—can chair only one department, and one department can have only one department chair. The en
    13·1 answer
  • Your boss wants you to configure his laptop so that he can access the company network when he is on the road. You suggest a VPN
    11·1 answer
  • Write a program that asks the user to enter two integer numbers X and Y. The program halves each number between X and Y then pri
    15·1 answer
  • Where or what website can I download anime's? For free ​
    6·1 answer
  • 5. A Disk defragmenter tool does what to a computer HDD?
    6·1 answer
  • Importance of computer education​
    9·1 answer
  • Write a python statement that print the number 1000
    6·1 answer
  • Explain why this scenario could put an organization in jeopardy of losing some of its workforce.
    12·1 answer
  • Who Is faster sonic or flash well it all depends on which version of sonic your talking about like for example video game sonic,
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!