An example of linear motion is an athlete running 100m along a straight track. Linear motion is the most basic of all motion. ... Neglecting the rotation and other motions of the Earth, an example of linear motion is the ball thrown straight up and falling back straight down.
Answer:
A, B, C, D, E, F, G pls mark me brainliest see explanation below
Explanation:
those are the letters if you search up letters for music you can find them way easier than me explaining and you will also learn faster. please mark me brainliest
Answer:
import java.util.Scanner;
public class num8 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter the mass");
double mass = in.nextDouble();
double weight = calWeight(mass);
System.out.println("The weigth is "+weight);
}
static double calWeight(double mass){
double weight = mass*9.80665; // assume a = accelation due to gravity = 9.80665N
if(weight>500){
System.out.println("Too Heavy");
}
else if(weight<100){
System.out.println("Too Light");
}
return weight;
}
}
Explanation:
- Using Java programming language
- The main method is created to request and store a variable, mass in kilogram. The main method call calWeight() and passes the value for mass
- A method calWeight() is created that calculates the weight in newtons (mass * 9.8).
- The method checks if the weight is greater than 500 (prints too heavy) if less than 100(prints to light)
- Returns the weight
Answer:
All of the given options apply and are correct.
Explanation:
a) The first option is correct because the intruder can use denial-of-service attack and by flooding the site with traffic to get the voter server unavailable. Then he can direct the voters to a fraud vote server.
b) The second options correctly applies too because the thief also buys the pass codes from the people who want to sell their right to vote and this way the thief can purchase multiple pass code and cast multiple votes.
c) The hackers can set up fake vote servers and then direct the voters to these servers or websites in order to collect pass codes of voters. These pass codes can then be misused by the thief to cast multiple votes in an online election.
d) Social engineering techniques can also be used to get pass codes from certain voters. By manipulating the targeted voters psychologically they can get their pass codes to cast multiple votes illegally.