1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
3 years ago
14

Sedimentary rock formation occurs when igneous, metamorphic, or other sedimentary rocks are exposed to the unyielding forces of

nature found on the Earth's surface. The formation of sedimentary rock occurs by several processes over millions of years.
Rock sediments are carried to other places by the wind, running water, and gravity. As these forces lose energy settling takes place. The sediments settle out of the air or water in rock particles graded by size with heavier pieces settle out first. Which term of describes this process of sedimentary rock formation?
A) Deposition
B) Lithification
C) Physical weathering
D) Chemical weathering
Computers and Technology
2 answers:
PSYCHO15rus [73]3 years ago
6 0

Answer:

A

Explanation:

Deposition is the processes where particles of rock are laid down in sections with heavier sediments building up first.

Natalija [7]3 years ago
3 0
Deposition is the answer
You might be interested in
Various types of mouse pointer<br>​
g100num [7]

Answer:

Text Pointer

Busy Pointer

Link Pointer

Precision Pointer

Standard Pointer

Help Pointer

Background Busy Pointer

4 0
2 years ago
Which type of user profile is stored in the C:\Users folder and is automatically created when a user logs on to the computer for
Sladkaya [172]

Answer:

a. Local user profile.

Explanation:

Local user profile is a type of user profile which is stored in the C:\Users folder and is automatically created when a user logs on to the computer for the first time and it is being stored on the local hard disk of the computer.

Generally, in Microsoft windows any change made to the local user profile is peculiar to the user and the host computer on which the change is made.

Hence, local user profiles avails several users the opportunity of sharing a single computer with their respective user settings and data.

3 0
3 years ago
Create union integer with members char c, short s, int i and long b. Write a program that inputs the values of type char, short,
Tom [10]

Answer:

The updated program in C is as follows:

#include <stdio.h>

union myUnion{ char c; short s; int i; long l; };

int main(){

   union myUnion inputs;

   printf("Character: ");    scanf("%c", &inputs.c);

   printf("Output: %c", inputs.c);

   printf("\nShort: ");    scanf("%hd", &inputs.s);

   printf("Short: %hd", inputs.s);

   printf("\nInteger: ");    scanf("%d", &inputs.i);

   printf("Output: %d", inputs.i);

   printf("\nLong: ");    scanf("%ld", &inputs.l);

   printf("Long: %ld", inputs.l);

   return 0;

   }

The pseudocode is as follows:

Function union myUnion {

character; short; int; long

}

main() {

myUnion inputs;

Input inputs.c;  Print inputs.c

Input inputs.s; Print inputs.s

Input inputs.i; Print inputs.i;

Input inputs.l; Print inputs.l

}

Explanation:

This defines the union function

<em>union myUnion{ char c; short s; int i; long l; };</em>

The main begins here

int main(){

This calls the union function to main

   union myUnion inputs;

This prompts and gets input for character variable

   printf("Character: ");    scanf("%c", &inputs.c);

This prints the character input

   printf("Output: %c", inputs.c);

This prompts and gets input for short variable

   printf("\nShort: ");    scanf("%hd", &inputs.s);

This prints the short input

   printf("Short: %hd", inputs.s);

This prompts and gets input for integer variable

   printf("\nInteger: ");    scanf("%d", &inputs.i);

This prints the integer input

   printf("Output: %d", inputs.i);

This prompts and gets input for long variable

   printf("\nLong: ");    scanf("%ld", &inputs.l);

This prints the long input

   printf("Long: %ld", inputs.l);

   return 0;

   }

5 0
3 years ago
What feature should you enable to prevent the sidhistory attribute from being used to falsely gain administrative privileges in
Katarina [22]

SID filtering enables to control of the sid history attribute from being utilized to falsely gain administrative privileges in a trusting forest.

<h3>What is  SID filtering?</h3>

SID filtering renders the domain controllers (DCs) in a trusting domain to remove all SIDs that aren't members of the trusted domain. In other words, if a user in a trusted domain exists as a member of groups in other domains in the forest, the trusting domain will withdraw those groups' SIDs from the user's access token.

For a newly set up trust between two domains or two forests, the SID Filtering exists activated by default. The filter extracts all foreign SIDs from the user's Access Token while accessing a resource through trust in a trusting domain.

SID filtering enables to control of the sidhistory attribute from being utilized to falsely gain administrative privileges in a trusting forest.

To learn more about SID filtering refer to:

brainly.com/question/23814085

#SPJ4

3 0
2 years ago
The body of a while(...) { ... } loop will always executes atleast once, no matter what test condition is stated.
gulaghasi [49]

Answer:

The correct answer for the given question is false.

Explanation:

In the while loop if the condition is true then it executes the loop otherwise not so it is entry control loop.

syntax:

while(condition)

{

// statement

// increment and decrement

}

For example

int i=1;

while(i<=5)

{

cout<<"hello";

i++;

}

In this example variable i is initialized by 1   1<=5  which is true it execute the statement and print hello after that  increment the value of  i =i+1 so i=2 i<=5 which is again true and print hello this will continue untill the condition in while loop is false when condition is false it terminate the loop.

6 0
3 years ago
Other questions:
  • What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that m
    7·1 answer
  • Write a program that reads from user (i) an hour between 1 to 12 and (ii) number of hours ahead. The program should print the ti
    15·1 answer
  • (Please select 2)
    14·1 answer
  • Which of the following is considered technology?
    12·1 answer
  • Write a function named "list_concat" that takes a list of strings as a parameter and returns the concatenation of all the values
    13·1 answer
  • What command would Emile use in his word processing software to insert a bar chart that will automatically adjust to changes mad
    6·2 answers
  • What alternative to leased lines is used by VPNs? As an alternative to leased lines, VPNs use ______ connections.
    11·1 answer
  • Difference between server and a client computer
    7·1 answer
  • Assume three jobs arrive at approximately the same time (arrival time are all 0), but Job A arrives slightly before Job B, and J
    13·1 answer
  • How are most databases organized?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!