1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
13

The soft-tissue lining of oysters and clams creates pearls. Is a pearl a mineral?

Computers and Technology
2 answers:
Kisachek [45]3 years ago
3 0
<span>A pearl is not a mineral because it is created artificially. It is a gemstone, not a mineral because it is a composite of mineral Aragonite and a protein compound which is called conchiolin. Pearls are formed by organic and living organisms which is preserved to become a gemstone.</span>
8_murik_8 [283]3 years ago
3 0

No. Pearl is an organic substance

Pearl is an organic gemstone. It is a reaction to an irritant within a living pearl-producing mollusk. Mollusks have a soft body often protected by a shell such as calm, mussel, and oyster. Pearls are actually formed when the mollusk produce thousands of nacre. Pearls are commonly used in the jewellery industry.


You might be interested in
Assume we perform a known-plaintext attack against DES with one pair of plaintext and ciphertext. How many keys do we have to te
nasty-shy [4]

Answer:

2^{55} keys in a worst case scenario

Explanation:

So, Average will be : 2^{56} /2

2^{55}(Answer)

5 0
3 years ago
How do spear phishing attacks differ from standard phishing attacks?
mina [271]

Answer:

Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".

Hope this help please give the brainliest award.

5 0
3 years ago
What feature does google docs have to allow users to work in a document?​
Pavel [41]

Answer:

Share.

Explanation:

Go to the Share button in the top right corner of the doc, and click it. Then type the email adress of who you want to work on it. (make sure the symbol to the right of the email is a little pencil Icon)

6 0
3 years ago
Which of the following can you not code in a subclass? Select one: a. a method with the same signature as a method in the superc
Ray Of Light [21]
<h2>Option D: a call to a private method of the superclass</h2>

Explanation:

Option a: a method with the "same signature" is allowed in the subclass. There will not be any confusion because the object which is trying to call the method will decide whether to call the sub class or super class.

Option b: a call to a super class constructor is possible because, when you create an object of sub class automatically the super class constructor will be called. Even the sub class constructor can call the super class constructor explicitly.

Option c: A subclass can create method that's not defined by the super class

Option D: a private method is private inside the class and hence even the object of that class cannot access.

8 0
3 years ago
What is 8 hours, 5 minutes, 22 seconds minus (-) 7 hours, 24 minutes, 37 seconds?
olga_2 [115]

Answer:

Enter time 1 HH:MM:SS8:5:22                                                                                                    

Enter time 2 HH:MM:SS7:24:37                                                                                                  

0:40:45

Explanation:

The program for above in Python is:

from datetime import datetime

s1 = input("Enter time 1 HH:MM:SS")

s2 = input("Enter time 2 HH:MM:SS")

Format1 = '%H:%M:%S'

tdiff = datetime.strptime(s1, Format1) - datetime.strptime(s2, Format1)

print(tdiff)

We are using the datetime class in datetime module for using strptime to find the difference between the two times.

3 0
4 years ago
Other questions:
  • g The reciprocal Fibonacci constant ψ is defined by the infinite sum: ψ=∑n=1 [infinity] 1 Fn Where Fn are the Fibonacci numbers
    7·1 answer
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • Difference between switch case and if else statement.​
    11·1 answer
  • How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    13·1 answer
  • Each new term in the Fibonacci sequence is generated by adding the previous two terms. By starting with 1 and 2, the first 10 te
    13·1 answer
  • Given a dataset where the dataset is not linearly-separable, and each of the fea- tures have continuous values, which of the fol
    7·1 answer
  • HELP AASAP BRAINLIEST JUST HELP
    13·1 answer
  • Test unit 8 edhesive answers ​
    15·1 answer
  • Device driver issues can come up if you . If this happens, .
    11·1 answer
  • Hand tools are generally classified based on :​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!