1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
2 years ago
10

Describe how position, direction, and speed of an object changes when acted on by unbalanced forces.

Chemistry
2 answers:
k0ka [10]2 years ago
7 0

Answer:

Explanation:

Okay...

so lets say an object is moving in one direction, that means it is an unbalanced force. If a object has aceleration

Dmitrij [34]2 years ago
6 0
If a object is moving at a steady speed/ acceleration and it comes in contact with an unbalanced force the speed/acceleration/position of the object is going to move.
You might be interested in
How many atoms is 100.0g of aluminum?
34kurt

Answer:

How many moles are present in 100.0 g of Al? What is the mass of 0.552 mol of Ag metal? Answer a: 3.706 mol

8 0
3 years ago
11. If there are 8.24 x 1022 molecules of NaCl in a salt shaker, what is the mass of the salt?
vlada-n [284]

Answer: 8.12 g NaCl

Explanation: Use Avogadro's number to find the number of m

moles of NaCl:

8.24x10²² molecules NaCl / 1 mole NaCl/ 6.022x10²³ molecules NaCl

= 0.14 mole NaCl

Next convert moles to grams NaCl using its molar mass;

0.14 mole NaCl x 58g NaCl / 1 mole NaCl

= 8.12 g NaCl

6 0
3 years ago
Burning fossil fuels creates the ___________ gas carbon dioxide which increases global temperatures.
Flauer [41]
Greenhouse gas is your answer it is causing the greenhouse effect of trapping heat in the earth
3 0
2 years ago
Read 2 more answers
Sibling rivalry may occur when:
sweet [91]

Answer:

Explanation: true

7 0
3 years ago
Trojans are _____.
liubo4ka [24]

Answer:

d. asteroids affected by Jupiter's gravity

Explanation:

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

8 0
2 years ago
Read 2 more answers
Other questions:
  • a search team is hoping to recover cargo from a sunken ship.which section of the ocean floor would be the hardest to recover the
    12·1 answer
  • Write a mechanism for the bromination of acetanilide with bromine in acetic acid. Be as complete as possible and include all rel
    6·1 answer
  • How many moles of co are contained in a 5.00 l tank at 155°c and 2.80 atm?
    9·1 answer
  • If 1 gram of calcium chloride is dissolved in 100 mL of pure water, what temperature change will be observed
    12·1 answer
  • What influences the movement of ions and molecules?
    13·2 answers
  • Scientific law describes what nature does under certain conditions
    14·1 answer
  • Sound waves? like what they do.
    7·1 answer
  • gBe sure to answer all parts. Nicotine can be made when the following ammonium salt is treated with Na2CO3. Determine a stepwise
    10·1 answer
  • What's the correct answer?
    10·1 answer
  • Under normal conditions, NaOH completely ionizes as: NaOH ->
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!