1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
3 years ago
10

What is the main type of energy used to help convert metamorphic rocks into igneous rocks in the rock cycle ?

Computers and Technology
1 answer:
mafiozo [28]3 years ago
7 0

C. heat energy

/////apex//////

also called Thermal energy

You might be interested in
Mối quan hệ giữa đối tượng và lớp
Andreas93 [3]

Answer:

please write in english i cannot understand

Explanation:

8 0
3 years ago
How can you add contrast between text and headlines in a document? increase the font size of the headline make the headline long
Pavlova-9 [17]
Increase the font size and make the headline bold
8 0
3 years ago
In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
fenix001 [56]

Answer:

 Network administrator use the open system interconnection model to isolate the network problem as, the network administrator can easily find the problem in the system.

Network administrator regularly depicts issues by the layer number and in many cases the network problem required the network administrator to isolate the issue in which layer the maximum number of issue occurred.

By using the OSI layer, we can easily add protocols to its higher to lower layers without any type of interruption.

3 0
3 years ago
What is meant by authorization? The decision to allow or deny a subject access to an object. The ability of a subject and an obj
USPshnik [31]

Answer: <em>The ability of a subject and an object to interact.</em>

Explanation:

Authorization is known as or referred to as a security mechanism that is used in order to determine the client/user access or privileges levels that are related to the system resources these mostly tend to include computer services, programs, files, data and other application. Authorization is also referred to as something that is preceded by authentication i.e for individuals identity verification.

6 0
3 years ago
When BranchCache is being utilized in an office and a client computer makes a subsequent request for a file, what will indicate
FinnZ [79.3K]

Answer: Information content

Explanation:

5 0
4 years ago
Other questions:
  • Which option is NOT in the Link to portion of the Insert Hyperlink dialog box?
    5·2 answers
  • Why do some people put salt on sidewalks when it snows?
    14·1 answer
  • Andrew has data in cell E14 and the cell should be blank. Andrew should _____.
    15·2 answers
  • In a geographic file arranged by state and then city, you would file a letter from a company that does not have an individual or
    6·1 answer
  • Owners of individual domains get to decide what content is published on their websites. Why might this autonomy be important to
    12·1 answer
  • Choose the correct option that completes the sentence.
    13·1 answer
  • Computer identity theft differs from theft in the real world in what major way?
    11·2 answers
  • Capstone Project part 11 quiz
    6·1 answer
  • True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P
    6·1 answer
  • A _____ is a grid that displays fields as columns and records as rows.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!