1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
4 years ago
6

Text effects can only be applied to numbers. True False

Computers and Technology
1 answer:
QveST [7]4 years ago
7 0

Its false.

<h2><u><em>Hope it helped ❤</em></u></h2>
You might be interested in
Suppose the work required to stretch a spring from 1.1m beyond its natural length to a meters beyond its natural length is 5 J,
Nadya [2.5K]

Answer:

Explanation:

The formula for the work done on a spring is:

W = \frac{1}{2}kx^{2}

where k is the spring constant and x is the change in length of the string

For the first statement,

x = (a-1.1), W = 5

=> 5 = \frac{1}{2}k(a-1.1)^{2}

Now making k the subject of formula, we have:

k = \frac{10}{(a-1.1)^2}  ---------------- (A)

For the second statement,

x = (a-4.8), W = 9

=> 9 = \frac{1}{2}k(a-4.8)^{2}

Now making k the subject of formula, we have:

k = \frac{18}{(a-4.8)^{2} } ------------------------- (B)

Equating A and B since k is constant, we have:

\frac{10}{(a-1.1)^{2} } = \frac{18}{(a-4.8)^{2} }

solving for the value of a

8a^{2} +56.4a-208.62=0

solving for a, we get:

a = 2.6801 or -9.7301

but since length cannot be negative, a = 2.68m

substituting the value of a in equation B, we have:

k=\frac{18}{(2.68-4.8)^{2} }

k = 4.005

6 0
4 years ago
You should reach across something to lift a load is this true or false
Grace [21]

Answer:

False. Never reach across a load when you're trying to lift it.

3 0
3 years ago
C source files natively compiled on a Linux system using an ARM processor produce an executable file only runnable on ARM machin
Bumek [7]

Answer:

b. False.

Explanation:

Linux system is an operating system just like windows. Android is powered by Linux which is one of the most popular operating systems in Smart phones. Linux operating system was released in 1991, but it gained significance in 20th century. ARM processor can produce executable file on ARM machine with Linux system using x86 chipset.

3 0
3 years ago
Who are the founders of the video-sharing site Blip?
rewona [7]

the Founders would be Justin Day


3 0
4 years ago
Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and
nikitadnepr [17]

Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs.Alex been offered

A.Security administrator

Explanation:

  • A security systems administrator handles all aspects of information security and protects the virtual data resources of a company.
  • They are responsible for desktop, mobile, and network security, and are also responsible for installing, administering and troubleshooting an organization's security solutions.
  • A security administrator is the point person for a cybersecurity team.
  • A Security Administrator installs, administers, and troubleshoots an organization's security solutions.
  • The Security Administrator will ensure the network's security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems

3 0
4 years ago
Other questions:
  • Which of the following is not a thing needed to make a network?
    6·2 answers
  • Once i have internet connection do i need anything else to surf the web
    6·1 answer
  • If a user has one column in a table and would like to make it into two columns which command should be used?
    8·2 answers
  • Student aid is based on either financial need or _____ need.
    12·2 answers
  • Assignment 1 is to write a program that will write the lyrics to "X number of beers on the wall". Use only the main method. Prom
    11·1 answer
  • What does a codec do? Choose all that apply.
    5·2 answers
  • What do you think is the biggest threat to the security of your personal information?
    5·2 answers
  • Which of the following is one of the first two levels of formatting in a Word document?
    5·1 answer
  • Which validation method would you use for first name on a data form
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly. Which language should you use to add functionality to web pages?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!