1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
3 years ago
10

Which of the following events would most likely produce an earthquake

Computers and Technology
1 answer:
sveticcg [70]3 years ago
8 0

Earthquakes are usually caused when rock underground suddenly breaks along a fault. This sudden release of energy causes the seismic waves that make the ground shake. When two blocks of rock or two plates are rubbing against each other, they stick a little. ... When the rocks break, the earthquake occurs.

You might be interested in
Which formula is used to measure accuracy?
Westkost [7]

Answer:You can only find REaccuracy if you know the actual “true” measurement… something that's difficult to do unless you're measuring against the atomic clock. The formula is: REaccuracy = (Absolute error / “True” value) * 100%.

Explanation:

7 0
2 years ago
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
ehidna [41]

Answer:

The correct answer to the following question will be "Secure".

Explanation:

This file includes information about the rights of verification and authorization.

  • It will be used primarily for monitoring the use of authorization schemes.
  • It holds all communications related to safety like faults in encryption.
  • This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.

So, it's the right answer.

3 0
2 years ago
Write a loop that sets new scores to old scores shifted once left, with element 0 copied to the end. ex: if old scores = {10, 20
Inga [223]

#include <iostream>
using namespace std;

int main() {
   const int SCORES_SIZE = 4;
   int oldScores[SCORES_SIZE];
   int newScores[SCORES_SIZE];
   int i = 0;

   oldScores[0] = 10;
   oldScores[1] = 20;
   oldScores[2] = 30;
   oldScores[3] = 40;

   /* Your solution goes here */

   for (i = 0; i < SCORES_SIZE; ++i) {
      cout << newScores[i] <<" ";
   }
   cout << endl;

   return 0;
}

3 0
2 years ago
Read 2 more answers
How do you create speaker note changes that show the slides, related notes and company logo on each page
attashe74 [19]

Answer:

The Notes Master contains two placeholders one for your text and the other for the slide. We can move or change the size of either of these objects and we can change the format of the text in the notes placeholder, we can also add or change elements that we want to appear on each handout and also notice the convenient placement of the header, footer, date and page numbers.

3 0
2 years ago
PRACTICAL RESEARCH
Aliun [14]

Answer:

Do u use Instag*ram then follow me and text me .my I'd is dashing Deepak

5 0
2 years ago
Other questions:
  • Find a, b, and c<br> A a=4 square root of 6 b= 8 square root of 2 ; c= 4 square root of 2
    12·1 answer
  • Samantha has to create a video for her science project on the blossoming of a flower from a bud to one with fully opened petals.
    5·2 answers
  • ___ are controls through which a user can enter input data in a gui application. answer
    10·1 answer
  • Averigua las diferentes intensidades, la potencia total y el gasto en € (de un mes de 30 días con el equipo conectado todo el ti
    12·1 answer
  • Shawn thought that the screen of the block-based program he was using was
    15·1 answer
  • NoSQL is a programming language used to create mobile apps.<br> a) True<br> b) False
    13·2 answers
  • Five examples of technology in community​
    7·2 answers
  • LaShawn would like to post photos in a social media app, but the program needs to be modified in order to display a greater vari
    12·2 answers
  • How does the dns solve the problem of translating domain names like example.com into ip addresses?
    10·1 answer
  • Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!