1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BabaBlast [244]
4 years ago
14

Siltstone is made mostly of _____. A : silt B : sand C : shells D : gravel

Computers and Technology
2 answers:
Amanda [17]4 years ago
8 0

Siltstone is mostly made of A) Silt.

frez [133]4 years ago
6 0
The best and most correct answer among the choices provided by the question is the second choice. <span>Siltstone is made mostly of silt. </span>I hope my answer has come to your help. God bless and have a nice day ahead!
You might be interested in
Which feature of virtualisation helps increase the IT productivity of a business
PIT_PIT [208]

Answer:

Add, remove, organize and reorder commands on the Quick Access Toolbar. ... The Quick Access Toolbar is a customizable toolbar that contains a set of ... The only way to increase the size of the buttons is to lower the screen resolution you use. ... However, you can Customize the ribbon in Office to personalize the ribbon ...

Explanation:

because

8 0
4 years ago
Which of the following is NOT an argument used to determine how a shot is fired from an A. object the shot itself being instanti
Firdavs [7]
C. The color of the shot...
7 0
3 years ago
When I try to make an account, it always says that they are not able to complete the registration at this time. And I didn't alr
Anastasy [175]
Maybe just wait a day and try again
7 0
3 years ago
Explain test-driven development and provide an example of how it can be used in your
dalvyx [7]

Answer:

 The test- driven development is basically use in the programming language for the designing various type of test cases in the computer system. The main goal of the test driven development is that it uses to make the system bug free and simple.

It basically use in the organization to avoid various duplication in the code and make the function more efficient.

The basic approach of the test driven development is that the test are develop so that it specify the function for the code to perform.

8 0
4 years ago
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of atta
NISA [10]

Answer:

Eve is employing a <u>chosen-ciphertext attack.</u>

Explanation:

Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.

The Ciphertext is a term used to explain data encrypted in the form of text.

When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.

3 0
3 years ago
Other questions:
  • What term refers to a piece of software that interfaces with the hardware on your computer?
    10·2 answers
  • I need help please <br> just plug in the words with their definitions.......
    10·2 answers
  • What is quantum computing
    12·2 answers
  • Write a function MaxMagnitude with two input parameters, that returns the largest-magnitude value. If the inputs are 5 7, the fu
    14·1 answer
  • A Variable can only hold numbers<br><br> True<br><br> False
    15·2 answers
  • Type (dog, cat, budgie, lizard, horse, etc.) Create a class that keeps track of the attributes above for pet records at the anim
    7·1 answer
  • Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be u
    13·1 answer
  • Plz help me to solve all of this question answer.(of question no 7,8,9)​
    12·1 answer
  • What is the current situation in farming​
    13·2 answers
  • Which of these lists correctly counts from 1 to 5 In binary
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!