1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
2 years ago
6

What is the length of the x-component of the vector shown below? у 6 28°

Physics
1 answer:
galina1969 [7]2 years ago
4 0

Answer:

Explanation:

6cos28

=5.3 N

You might be interested in
There is no air in space astronauts in space cannot hear sounds from outside their spacesuits explain this
Semmy [17]
<span> In </span>space<span>, where there is no air, sound has no way to travel.</span>
7 0
2 years ago
If you were thinking about a washing machine as a system which of the following represents the inputs?
Lostsunrise [7]

Answer:

The answer is a, the dirty cloths, water and detergent.

Explanation:

The answer is the above selected because the inputs basically represent the data that are passed through the system to generate the output.

In this case, the inputs are the aforementioned in the answer while the possible output would literally be the clean cloths.

4 0
3 years ago
Which is the main purpose of an experimental conclusion?
Reptile [31]

Answer:

the Answer is B

because the purpose of experimental conclusion it is to prove rather is a right or wrong is a hypothesis is right or wrong

8 0
3 years ago
On Ella's fifth birthday, her parents told her she had to stop whining or no one would want to play with her. She tried very har
Kisachek [45]
I think the answer to this problem I believe would probably be B. learned optimism. I think it's the closest answer...I THINK
3 0
2 years ago
Read 2 more answers
It is vital to keep in mind that breaches are entirely concerned with data. No matter what physical damage a device incurs, data
Ierofanga [76]

Answer:

TRUE

Explanation:

We currently live in the digital age, where almost everything is digitized, including strategic information. Thus, each individual and especially corporations that have sensitive data must use protection mechanisms against cyber attacks. One of the measures most recommended by experts is encryption, which consists of a set of rules that aims to encode data information so that only the sender and the receiver can decipher it.

5 0
2 years ago
Other questions:
  • a cylinder has a radius of 2.1cm and a length of 8.8cm .total charge 6.1 x 10^-7C is distributed uniformly throughout. the volum
    14·1 answer
  • What is number 6 and 7 need help ASAP!!
    8·2 answers
  • 4. Two scientists are experimenting with pure samples of isotope X, a highly radioactive substance. The first scientist has a sa
    13·1 answer
  • How are types of energy in the electromagnetic spectrum defined?
    12·2 answers
  • A truck is speeding up as it travels on an interstate. The truck's momentum (in kg · m/s) is proportional to the truck's speed (
    8·1 answer
  • After the driver first notices the obstacle, the car moves uniformly for a time interval t1−t0=t before the brakes are applied.
    12·1 answer
  • There is a form of light that is very energetic and can cause damage to living cells and tissues. The Sun emits this type of lig
    9·2 answers
  • A stone is thrown horizontally with an initial speed of 10 m/s from the edge of a cliff. A stopwatch measures the stone's trajec
    11·1 answer
  • What is the kinetic energy of a bike with a mass of 24 kg traveling at 3 m/s?
    15·1 answer
  • Which is required for
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!