1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
3 years ago
15

The Mohs scale is used to express which mineral property?

Computers and Technology
1 answer:
olchik [2.2K]3 years ago
5 0
Its answer is c. hardness

You might be interested in
can someone help me write a 5 paragraph essay on microsoft word and why we need and how we use it? if you can please make it sou
DaniilM [7]
Here are some important points:
- we use it to do essays for school
- we can use it to do flyers for recreational events
- we can use it to do pamphlets to inform people
- it is versatile, so you can create many different types of documents
- you can create charts

This can be your opening statement

Today, there is a lot asked of a child in school. From charts to essay to projects, the average kid has at least 10 different programs they use just for one project. But there is one program that came along and changed everything, and that program is called Microsoft word. Microsoft word is valuable because it is versatile (what I wrote earlier about it being able to do many different tasks), it simplifies your experience (what i said about it being able to combine different programs into one), and it is free (you can write about how some programs charge to use their high-grade programs but microsoft is free and avaialabe on every windows
computer.)

GOOD LUCK !
4 0
3 years ago
This unit is used to print the picture on a paper
NeTakaya

Answer:a printer

Explanation:

It prints things

7 0
3 years ago
What type of software repairs or improves a larger application that is already installed on a system?
earnstyle [38]

Answer:

<h2>Mapping</h2>

Explanation:

<h2>Hope it helps you</h2>
7 0
3 years ago
Read 2 more answers
A relational database is different from a simple database because it has more than one _____. record ID number table field
Ulleksa [173]

Answer:Table

Explanation:A relational database has structures and thus have more than one table. The tables consist of row (for entry) and column (for data). As a result, data are organized in a simple manner and are normally consistent.

6 0
3 years ago
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
solmaris [256]

Answer:

disable SSID broadcast and change the network name

Explanation:

Based on my experience with information technology and wireless networks my recommendation would be to disable SSID broadcast and change the network name. Disabling SSID will prevent the network name from appearing on devices that are searching for a network to connect to, and by changing the name it will also prevent anyone who knows the previous name from connecting unless they know the new name. Both of which will drastically increase security.

8 0
3 years ago
Other questions:
  • Which keyboard feature is a form feed character?
    15·1 answer
  • A professor is working with five teams in his marketing research class. He decides to experiment with path-goal theory in helpin
    11·1 answer
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • What is a single-user computer?
    8·1 answer
  • It is important to know the terms of use of any website because why
    12·2 answers
  • Write a program that has the user input how many classes they are taking this semester and then output how many hours they will
    8·2 answers
  • Draw a flowchart to find the average grade in 3 subjects
    7·1 answer
  • Which of the following items can you locate in a document using the navigation pane? Choose the answer.
    10·1 answer
  • An end-user license agreement protects _____.
    11·1 answer
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!