1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nalin [4]
3 years ago
13

What is the relationship between ionic bonds and cleavage

Computers and Technology
1 answer:
Marrrta [24]3 years ago
7 0
Hello there!

The relationship between ionic bonds and cleavage is: As the ionic bond strength increases, cleavage will be more difficult. 

Minerals are held together generally by ionic bonds. Ionic bonds are the result of electrostatic attraction and electron transfer between positive and negative ions (cations and anions). Ionic bonding implies the formation of ordered crystalline solids and the cleavage of those solids will depend on the strength of this bonding. 
You might be interested in
A. experiment by purposely misconfiguring the gateway address on pc-a to 10.0.0.1. what happens when you try and ping from pc-b
MrRa [10]
Yes you will mate, hope this helps!
7 0
3 years ago
B. Some of Company X's new practices and systems are unethical. Business ethics is a set of codes
Artemon [7]

Answer:

They are changing schedules without proper notice, cutting workers without proper notice and falsely advertising.

Explanation:

8 0
3 years ago
Definition of powerpoint animation
saul85 [17]

Answer:

An powerpoint animation is an animation that uses powerpoint or another similar app like google slides to create a video, game, or movie.

but...

If you mean just in Microsoft Office it's a visual or sound effect that you can add to slides to make them more interesting.

Explanation:

3 0
3 years ago
What is the most efficient<br> form of transportation we<br> have?
alisha [4.7K]

Answer:

The bicycle is a tremendously efficient means of transportation. In fact cycling is more efficient than any other method of travel--including walking! The one billion bicycles in the world are a testament to its effectiveness

Explanation:

6 0
3 years ago
Read 2 more answers
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
Other questions:
  • CRM systems provide an organization with an important element: all employees of the company who directly or indirectly serve a c
    9·1 answer
  • Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
    14·1 answer
  • Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
    14·1 answer
  • What does it mean to search an index or the web? (DONT TAKE ANSWERS FROM THE INTERNET!)
    9·2 answers
  • True or False: When you share something on a friend’s Timeline, only that friend can see it.
    5·2 answers
  • All 24-point fonts take up the same amount of space on a slide. True False
    7·2 answers
  • The amount of blank space between each line of text line spacing
    5·1 answer
  • Whats yall favv scary movie
    11·1 answer
  • Given the following statement, what is the value of myExample?
    13·1 answer
  • Explain how you think robotics plays a part in the subway driver's job.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!