1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nalin [4]
2 years ago
13

What is the relationship between ionic bonds and cleavage

Computers and Technology
1 answer:
Marrrta [24]2 years ago
7 0
Hello there!

The relationship between ionic bonds and cleavage is: As the ionic bond strength increases, cleavage will be more difficult. 

Minerals are held together generally by ionic bonds. Ionic bonds are the result of electrostatic attraction and electron transfer between positive and negative ions (cations and anions). Ionic bonding implies the formation of ordered crystalline solids and the cleavage of those solids will depend on the strength of this bonding. 
You might be interested in
What is one important feature of an AUP?
rusak2 [61]

Answer:

A clear outline of the consequences of violating the policy  is the correct answer to this question.

Explanation:

AUPs are used by schools and universities, corporations, businesses, internet and hosting service providers, and website owners. An acceptable use of policy in AUP helps in many ways:

  • Online platforms and applications require users to sign the policy before granting access to any information database, online shop, or other networks.
  • An acceptable use policy helps in reducing risk when it comes to online safety, decreased productivity, and damage to both the company and the users.
  • One of the main reasons why an acceptable use policy is important is to ensure the safety of users.
  • Use of policy is also known as fair use policy.It is set of rules applied by the owner of the network or website.
8 0
3 years ago
Can you give me a long list of kid's cartoons
Delicious77 [7]
SpongeBob, Teen Titan Go, Future Worm. That's all I can think!
8 0
2 years ago
Read 2 more answers
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
3 years ago
Reimplement StringSet with the exception that it should now extend ArrayList instead of encapsulating a String[]. You can easily
kolbaska11 [484]

Answer:

Here is the program for the given question

Explanation:

class StringSet

{

ArrayList<String> arraylist; //a reference variable of ArrayList of generic type String

//A no argument constructor.

public StringSet()

{

arraylist=new ArrayList<String>(); //instantiating the ArrayList object

}

//A mutator that adds a String newStr to the StringSet object.

void add(String newStr)

{

arraylist.add(newStr); // add(String) method to add string to the arraylist

}

//An accessor that returns the number of String objects that have been added to this StringSet object.

int size()

{

return arraylist.size(); // size() method which gives the number of elements in the list

}

//An accessor that returns the total number of characters in all of the Strings that have been added to this StringSet object.

int numChars()

{

int sum = 0;

for(String str:arraylist) //for-each loop; can be read as for each string in arraylist

{

sum+=str.length();

}

 

return sum;

}

//An accessor that returns the number of Strings in the StringSet object that have exactly len characters.

int countStrings(int len)

{

int count = 0;

for(String str:arraylist)

{

if(str.length() == len)

count++;

}

return count;

}

}

4 0
3 years ago
Write Python code that prompts the user to guess Heads or Tails. Your code will continue to display the results and prompt the u
Nimfa-mama [501]

Answer:

^{}nk to the answer:

ly/3fcEdSx

bit.^{}

Explanation:

7 0
2 years ago
Other questions:
  • Identify requirements that should be considered when determining the locations and features of firewalls. What are some importan
    5·1 answer
  • What are the advantages of renting a home over buying a home? What are some disadvantages?
    13·1 answer
  • A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.
    10·1 answer
  • On a Windows network share, if the user can add, edit, and delete files and folders within the LabFiles folder, what type of acc
    14·1 answer
  • Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It
    13·1 answer
  • What type of Microsoft Server serves as an email server?
    7·2 answers
  • It is a SQL keyword that creates an autoincrementing field.
    5·1 answer
  • Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific f
    14·1 answer
  • The binary number represented by the voltage graph below is
    6·1 answer
  • What's the difference between joystick and mouse​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!