1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BabaBlast [244]
4 years ago
14

Siltstone is made mostly of _____. A : silt B : sand C : shells D : gravel

Computers and Technology
2 answers:
Amanda [17]4 years ago
8 0

Siltstone is mostly made of A) Silt.

frez [133]4 years ago
6 0
The best and most correct answer among the choices provided by the question is the second choice. <span>Siltstone is made mostly of silt. </span>I hope my answer has come to your help. God bless and have a nice day ahead!
You might be interested in
What would be the results of the following code? final int SIZE = 25; int[] array1 = new int[SIZE]; … // Code that will put valu
xz_007 [3.2K]
The code is first declaring array1 as a new array of integers with length 25. Then the comment tells us that somewhere in the middle of the code, values are given to each element of array1.

Lastly, we are iterating through the array using a for loop. We start at index 0, and continue until the index value (a) is one less than the length of the array. So array1[a] will give us the value that was assigned to the element at index a.

In the for loop, we are adding the value of array[a] to the integer "value" which was initialized as 0. Therefore, the result will be the sum of all the integers in array1.
7 0
3 years ago
Connie decided that her paper should be organized in the order in which the events happened. What type of organizational method
maw [93]
<span>The correct answer is Chronological order. Chronology or Chronogical Order is considered to be the order wherein events are organized according to the sequence of their occurences in which time is considered to be a main factor.</span>
4 0
3 years ago
Please help i will give you brainelst answer part B thank you!!!!!!!!!!!!!1
kifflom [539]

Answer:

Well he could be sued for one also the teacher might fail him

6 0
3 years ago
What does network administration normally include? Check all of the boxes that apply.
Paul [167]

Answer: design of the network

security for the network

documentation

identifying and fixing issues

Explanation: I just took the test

8 0
4 years ago
Create the logic for a game that simulates rolling two dice by generating two random numbers between 1 and 6 inclusive. The play
guajiro [1.7K]

Answer:

The solution code is written in Python 3.

  1. import random  
  2. count = 0
  3. flag = False
  4. guess = int(input("Input your guess (2-12): "))
  5. while(count <=3):
  6.    dice1 = random.randint(1, 7)
  7.    dice2 = random.randint(1, 7)
  8.    if((dice1 + dice2) == guess):
  9.        flag = True
  10.    count += 1
  11.    
  12. if(flag):
  13.    print("User wins!")
  14. else:
  15.    print("Computer wins!")

Explanation:

A Random generator is needed for this question and therefore we start by importing Python random class (Line 1)

Next, create one counter variable,<em> count</em>, to ensure there will be only three rolling of the dices (Line 3).  We need another variable, <em>flag</em>, to track the status if the two dices equal to the <em>guess</em> number chosen by user (Line 4).

Next, prompt use to input a guess number (Line 5).

Within the while loop, we can use random class method <em>randint() to </em>generate random integer. The arguments 1 and 7 will give one random number ranged from 1 to 6 for <em>dice1</em> and<em> dice2</em>, respectively (Line 8 - 9).

If the total of<em> dice1 + dice2</em> equal to user <em>guess</em>, we turn the<em> flag </em>to <em>True</em>. If not, the <em>flag </em>will remain <em>False</em> after completing entire while loop.

If the <em>flag </em>turned to <em>True</em>, print the message "User Wins!" else print the message ("Computer wins!")

8 0
4 years ago
Other questions:
  • A user is claiming a host can be reached via the IP address but not through the name. What should a technician do first to resol
    13·1 answer
  • Select the correct answer from each drop-down menu.
    10·1 answer
  • In 3–5 sentences, describe how technology helps business professionals to be more efficient.
    7·2 answers
  • When executing System.out.println(a2), the toString() method in the Object class is invoked. The program cannot be compiled, bec
    11·1 answer
  • Write a Java Program that can compute the mean, median, the highest, and the lowest of the students’ scores in a class. First, t
    6·1 answer
  • Which flowchart symbol indicates the start or the end of a process?
    8·1 answer
  • PLEASE HELP!!!
    12·1 answer
  • What do you think is the biggest threat to the security of your personal information?
    5·2 answers
  • What’s your tiktok? if u have one
    10·2 answers
  • Write a program that stores the maximum of three values. The values are stored in $s0, $s1, and $s2. Store the result in $s3. No
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!