1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juliette [100K]
2 years ago
13

Which of the following uses mechanical energy to function?

Chemistry
2 answers:
elena55 [62]2 years ago
5 0
C is the answer i believe
Tcecarenko [31]2 years ago
4 0
D the rest uses some sort of radiation
You might be interested in
Why must humans find substitutes for many minerals found on Earth? (A) form at an extremely slow rate (B) controlled by other co
DochEvi [55]

The correct answer is C, too deep in the Earth to collect. Hope this helps!

3 0
3 years ago
The Kelvin scale is based on the concept of absolute zero.explain the concept
allsm [11]

Answer:Absolute zero is the lowest possible temperature where nothing could be colder and no heat energy remains in a substance. ... By international agreement, absolute zero is defined as precisely; 0 K on the Kelvin scale, which is a thermodynamic (absolute) temperature scale; and –273.15 degrees Celsius on the Celsius scale.

Explanation:

6 0
3 years ago
Under which conditions are gases most soluble in water?
Volgvan

Hi,

Gases are most soluble in water under high pressure and low pressure.

6 0
3 years ago
Blackmail threat of informational disclosure is an example of which threat category?
Rashid [163]

Answer:

Information Extortion.

Explanation:

Computer oriented crime also known as cyber crime that intentionally harm the victims. The complete data of the company or net banking information can be hacked easily by the cyber crime.

Different category of the threats are included in the cyber crime. The information extortion threat is the crime in which the hackers hack complete information and control the data of the victim. The criminal an black mail the victim regarding the hacked data.

Thus, the correct answer is information extortion.

6 0
3 years ago
Drawing a conclusion derived from knowledge of an established principle is called deductive reasoning.
allsm [11]

Answer:

the answer would be true

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is 7.09x10 to the 5 minus 6.10xto the 4 in scientific notation
    6·1 answer
  • A group of scientists are studying the effects of different fertilizers on the growth of pea plants. They began their study with
    11·2 answers
  • How does the carbon chain length affect the polarity of an alcohol? What effect does this have on the solubility of the alcohol
    5·1 answer
  • Consider the following reaction:
    6·1 answer
  • Which of the following is an example of an environmental problem caused by chemicals?
    15·1 answer
  • If a person burns 2171 Cal each day, how much energy (kJ) does she burn in 2 days?
    11·1 answer
  • Humans are most abundant during which geological era?
    9·1 answer
  • Choose the three chemical properties of a penny
    12·1 answer
  • HURYY!! Karst topography can cause drinking water to become:
    7·1 answer
  • A gas occupies 3.8 L at -18° C and 975. torr. What volume would this gas occupy at STP?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!