1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
3 years ago
15

What determines how large the crystals in an igneous rock will be?

Computers and Technology
2 answers:
loris [4]3 years ago
6 0
I would say A or D im leaning towards A more though.
professor190 [17]3 years ago
3 0

The answer is A. How fast the rock cooled. APEX!!!

You might be interested in
Technology question.
Gnoma [55]

You should select the text by clicking and holding the mouse at the beginning of the text and then dragging it to the end of the area you want to change. You can also use the arrow keys and hold shift, but this takes longer typically.

5 0
3 years ago
A company creates a ______by using a wireless access point (WAP) and an Internet connection. Select the two correct answers, the
lesya [120]

t should be noted that by using a wireless access point (WAP) and an Internet connection a company can  creates;

  • wireless LAN
  • wifi.

<h3>What are wireless access point (WAP) ?</h3>

This is a computer system that allows the connection without a cable, it uses wireless connection.

wireless LAN and wifi serves as a medium for connection among computers without any cables.

Learn more about wireles at;

brainly.com/question/15665656

7 0
2 years ago
Which part(s) of CAIN is realized through the use of message digest functions and hashes?
KonstantinChe [14]

Answer:

Integrity

Explanation:

In CAIN, integrity is realized through the use of message digest functions and hashes.

Integrity in CAIN simply means securing a message on transit without it being tampered. To accomplish and achieve integrity, hash functions are used. These hash functions receive arbitrary length message and bring out a fixed sized message digest.

The message digest and hash function maps input data of arbitrary length to an output fixed data length. Hashing is used to guarantee integrity.

5 0
4 years ago
Write a code block to decode strings from secret encodings back to readable messages. To do so: Initialize a variable called dec
gayaneshka [121]

Answer:

The answer is provided in the attached document.

Explanation:

The explanation is provided in the attached document.

7 0
3 years ago
The chemical symbol H represents which of the following elements?
scZoUnD [109]
The answer is D. Hydrogen
helium is He (just for extra knowledge)
4 0
3 years ago
Read 2 more answers
Other questions:
  • To save a new copy of an existing database, a user can open the original database and select ________ from the file tab.
    8·1 answer
  • If you want to wrap text so that it fits a particular cell size, which formatting section would you use?
    9·2 answers
  • You are most likely to automatically encode information about
    11·1 answer
  • What is the definition of delimited text?
    14·2 answers
  • Write a statement that defines an ifstream object named inputFile and opens a file named "Friends.txt".
    13·1 answer
  • Your company has decided to replace several hundred hard drives. It would like to donate the old hard drives to a local school s
    11·1 answer
  • Write a grammar for the language consisting of strings that have n copies of the letter a followed by the same number of copies
    11·1 answer
  • What is the speed of Android operating system?
    6·1 answer
  • Please help with coding assignment.
    11·1 answer
  • Mightier than the waves of the sea is his love for you
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!