1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
3 years ago
14

Sedimentary rock formation occurs when igneous, metamorphic, or other sedimentary rocks are exposed to the unyielding forces of

nature found on the Earth's surface. The formation of sedimentary rock occurs by several processes over millions of years.
Rock sediments are carried to other places by the wind, running water, and gravity. As these forces lose energy settling takes place. The sediments settle out of the air or water in rock particles graded by size with heavier pieces settle out first. Which term of describes this process of sedimentary rock formation?
A) Deposition
B) Lithification
C) Physical weathering
D) Chemical weathering
Computers and Technology
2 answers:
PSYCHO15rus [73]3 years ago
6 0

Answer:

A

Explanation:

Deposition is the processes where particles of rock are laid down in sections with heavier sediments building up first.

Natalija [7]3 years ago
3 0
Deposition is the answer
You might be interested in
Enzo formed a study group for an upcoming geography test. To start off each session, they go over past notes and look at maps. T
lesya692 [45]

<u>Answer:</u>

My suggestions are given below:

<em>Method 1:</em> Can create series of questions from book-inside and take an open-book test. Open-book test method is one of the best way to learn

<em>Method 2:</em> Written test is always necessary to really understand how much they remember the concept

<em>Method 3:</em> Participate in online quiz related to the learning outcome given in the question

<em>Method 4: </em>Answer questions from the reference books

<em>Method 5:</em> Go to library or review online books for further study.

8 0
3 years ago
Which option is most likely used to create many-to-many relationships in Access?
Nastasia [14]

Answer:

Junction table.

Explanation:

Junction table is most likely used to create many-to-many relationships in Access.

A many-to-many relationship comes into existence when one (1) or more items in a table has a relationship with one (1) or more items in another table. An example is the products in a customer order.

Many-to-many relationships provides users with critical and crucial information, they're the most commonly used table relationships in Access.

In order to represent a many-to-many relationship in Access, a third table should be created by the user, this is often referred to as the junction or linking table, which further disintegrate the many-to-many relationship into a two (2) one-to-many relationships.

7 0
3 years ago
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
notka56 [123]

Answer:

The answer is "compromise"

Explanation:

In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.

  • In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
  • This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.

4 0
3 years ago
Read 2 more answers
A ________ is a virus that is triggered on a certain date.
marysya [2.9K]
A time bomb virus is a virus that is triggered on a certain date. It is a malicious program that is designed to release virus unto a system. Once the time has arrived, it will automatically start working what it is programmed to do since any virus could do anything depending on what it is designed to do.
8 0
3 years ago
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
3 years ago
Other questions:
  • Which of the following is an example of a problem that could be attributed to poor ergonomics?
    10·1 answer
  • What does the "configure dhcp options for proxy dhcp" option do?
    13·1 answer
  • What will happen with communication methods in five years?
    8·1 answer
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    13·1 answer
  • Create a class named Lease with fields that hold an apartment tenant’s name, apartment number, monthly rent amount, and term of
    13·1 answer
  • Who found the first computer bug in 1947, and invented the concept of a compiler in 1952
    6·1 answer
  • What dose a company’s code of ethics cover
    9·2 answers
  • Is there a way of how to delete this if so pleas tell me
    11·1 answer
  • Bryan's company is new and has limited funds to work with. He has been tasked with finding a telecommunications technology that
    7·1 answer
  • What are some other possible causes of an overheating laptop
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!