1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arsen [322]
2 years ago
9

How can the absolute age of a rock be determined ?

Computers and Technology
1 answer:
deff fn [24]2 years ago
5 0

Radiometric dating, which examines the percentage of two distinct isotopes in a sample, is used to establish the age of rocks.

Radioactive isotopes degrade with time, allowing geologists to use equipment like this thermal ionization mass spectrometer to calculate the age of a sample.

Radiometric dating, radioactive dating, or radioisotope dating is a technique used to date things such as rocks or carbon that included trace radioactive contaminants when they were produced. The method compares the abundance of a naturally occurring radioactive isotope within the material to the abundance of its decay products, which form at a constant rate of decay known to the researcher.

To know more about Radiometric dating, visit;

brainly.com/question/16905383

#SPJ4

You might be interested in
Nhiệt độ chiết rót của máy chiết rót có van trượt là bao nhiêu
Delvig [45]

Answer:

please translate

Thank you✌️

6 0
3 years ago
When you create a linked object using the object dialog box, you must click the?
grin007 [14]
Link to the object using the object dialog box then you can click the link
4 0
3 years ago
What type of malicious software masquerades as legitimate software to entice the user to run it?
Vlada [557]

Answer:

Trojan horse

Explanation:

A Trojan horse is malicious software that masquerades as a legitimate computer program such as a video game, image file, utility program, or even an antivirus so as to entice the user to run it, thereby allowing an attackers (the developer of the malicious program) to gain access to the data on the computer in an illegal manner.

4 0
3 years ago
Consider the code block below. What is the value of amount when this method is called twice, the first time using cookieJar(7) a
RUDIKE [14]

Answer:

C. 22

Explanation:

Given that the argument is being passed by value, there is no memory to consider.  So cookieJar(7) returns 7 and cookieJar(22) returns 22.

If the argument parameter was passed by reference or pointer, then perhaps the value from cookieJar(7) would be considered with cookieJar(22).

Note, this code block really isn't doing anything other than returning the value passed into it.  The "amount" variable is immediately set to 0, and then the value passed in is added to amount (which is 0), and returns.  The following code could replace this function:

public static int cookieJar(int addCookies){

return addCookies;

}

The above code will return an equivalent output to the given code.

Notice, the function is not dependent on any previous call, so the value for each is unique to the call itself, i.e., cookieJar(22) returns 22 and cookieJar(7) returns 7.

So, C. 22 would be correct.

3 0
3 years ago
Write a program that asks the user for his or her name, then asks the user to enter a sentence that describes himself or herself
emmainna [20.7K]

cheatercheatercheatercheatercheatercheatercheatercheatercheatercheatercheatercheater

7 0
3 years ago
Other questions:
  • What was a lesson that the Enlightenment taught people?
    11·1 answer
  • When you want to print a page from the World Wide Web, select the print command in the _____.
    8·2 answers
  • What is the best overall approach to education and career development for IT professionals?
    14·1 answer
  • The development team recently moved a new application into production for the accounting department. After this occurred, the Ch
    7·1 answer
  • Assume passwords are selected from four character combinations of 26 lower case alphabetic characters. Assume an adversary is ab
    9·1 answer
  • the following names are considered valid names for variable except for a. ST_Name b. ST name c. STName​
    9·1 answer
  • What are some real-life situations where multi-dimensional arrays might be useful?
    8·1 answer
  • How to install specific version of create-react-app so.
    10·1 answer
  • 1. A cell is identified by its ........
    8·1 answer
  • What method does a gsm network use to separate data on a channel?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!