1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
11

Which type of mountain is formed due to the collision of two different kinds of plates?

Computers and Technology
2 answers:
Lyrx [107]3 years ago
6 0
D) Andean mountains are formed due to the collision of two different kinds of plates.
liraira [26]3 years ago
4 0

Answer:

D. Andean

Explanation:

The Andean mountain is formed when two different lithospheric plates converge. The continental plates and the oceanic plates collides to from this kind of mountains.

The oceanic plates is more denser and less thicker than the continental plates . The rock morphology contributes to the heavy density of the oceanic plates as it contain more heavier rocks like the Mafic rocks which are mainly basaltic. As the two plates collides the more denser plates (oceanic plates) subduct due to it limited ability to gain active buoyancy.

The molten magma rises from the subduction zone through the continental crust . The magma becomes more solidified on the continental crust and become more active .Regional metamorphism occurs within this active zone. An uplift may likely occur due to the mobility of the continental crust to form mountain belts and hills like the Andean mountains.  

You might be interested in
What command is used to add a reflection or an outline to text
WARRIOR [948]

text effects, and typography.

6 0
3 years ago
The U.S. is a major player in the global media domain. However, other nations play a role in creating a dominant ideology, as ev
poizon [28]

Answer:

The answer is "Authorization for mobile wiretaps on American citizens."

Explanation:

  • The term media includes advertising, documentaries, painting, and graphic, which allows you to use a blog's domain name, and it can also provide you to create a fake profile.
  • In certain countries, a prevailing philosophy is performed, as demonstrated by the prevalence of telecommunications wiretaps approved in Sweden by US residents.
6 0
2 years ago
The following method is intended to remove all values from the ArrayList a that have the same value as val; however, this method
Alona [7]

Answer:

ArrayList a contains [2, 3, 3, 3, 4, 5, 3, 2, 1]

Explanation:

Given

The removeValue method

Required

The content of ArrayList a, after the method is called

From the question, we understand that arraylist a is:

a= [2, 3, 4, 3, 3, 4, 4, 5, 4, 3, 2, 1]

val =4

The function fails when the value to be removed appear consecutively in the list.

4 appears in index 5 and 6 of the list. Only one of the 4's will be removed

So, the updated list will be: [2, 3, 3, 3, 4, 5, 3, 2, 1]

6 0
3 years ago
True or False<br> humans shed skin in their sleep (pwease fweinds onwy answer)
eimsori [14]

Answer:

Not all people but sometimes it happens

4 0
3 years ago
On which side of the keyboard is the numeric keypad usually located
Rina8888 [55]

Numeric keypad. Alternatively referred to as the 10-key, number pad, numeric keyboard, numpad, or ten key, the numeric keypad is a 17-key keypad usually found on the far right side of a standard PC keyboard

6 0
3 years ago
Read 2 more answers
Other questions:
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the
    6·1 answer
  • A firewall is either software or dedicated hardware that exists between the __________ being protected.
    13·1 answer
  • .All of the following are true with the respect to implicitinvocation except:
    8·1 answer
  • A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus s
    12·1 answer
  • Suppose company A wants to develop a program that duplicates the functionality of a programm by company B. Describe how company
    8·1 answer
  • Is downloading like installing?
    13·1 answer
  • A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his fir
    10·1 answer
  • Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters.
    7·1 answer
  • What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usag
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!