Answer:
There are no answers but here is how you classify one with these characteristics so if its not on here probably that one hope this helps :)!
Explanation:
Igneous rocks are formed when melted lava or magma cools and crystallizes, and their unique traits are based on this process. They are strong because their mineral grains grow together tightly as they cool, and their minerals are usually black, white, or gray. They have a texture similar to something baked in an oven, like black bread or peanut brittle. Some of the main minerals in igneous rocks are feldspar, quartz, olivine and mica. The size of the minerals depends on the depth of the magma that formed the rock. Deeper magma cools more slowly and forms larger crystals. Rocks that cool over a few months have microscopic mineral grains and are called extrusive. Rocks that cool over thousands of years have small to medium grains and are called intrusive. Rocks that cool over millions of years have large pebble sized grains and are called plutonic. Granite and basalt make up the majority of igneous rocks. Basalt is dark and fine-grained with minerals rich in magnesium and iron. It is either extrusive or intrusive and is the primary rock on the ocean floor. Granite is light and coarse-grained and rich in feldspar and quartz. It is plutonic and less dense than basalt. Granite is found nearly everywhere beneath the continents. The word "igneous" comes from the Latin word "fire" and is related to the melting process that forms these rocks.
Answer: You sort table data with commands that are displayed when you click a header arrow button. Hope it help's :D
Answer:
Using a one time password OTP and using a three factor authentication.
Explanation:
Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.
Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.
One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.
Answer:
A.O(1)
Explanation:
In the implementation of queue by using linked chain the performance of the enqueue operation is O(1).We have to maintain two pointers one head and the other tailand for enqueue operation we have to insert element to the next of the tail and then make that element tail.Which takes O(1) time.
That should be the replace function which performs word replacements in documents.