1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Iteru [2.4K]
2 years ago
15

Choose all the answers that apply.

Computers and Technology
1 answer:
const2013 [10]2 years ago
3 0

It's all three- Metamorphic rock can turn into setimentary rock or change into a different kind of metamorphic rock and if temperatures get hot enough it can change into magma

You might be interested in
virtue by which you need to secure information by limiting computer access to authorized personnel only
Natalka [10]
I don't get what you are trying to ask...
Please explain
6 0
3 years ago
Which type of software is created and updated by a worldwide community of programmers and is available for​ free?
Ede4ka [16]
Open source is created and updated by a worldwide community of programmers and is available for​ free. Many students are in luck, as they can easily study publicly accessible codes and have a possibility to make better software. It also has lots of advantages, such as getting <span>high-quality results when the source code is passed around, tested and fixed.The most important thing - it<span> is a valuable learning opportunity for programmers and opportunity to improve their skills.</span></span>
5 0
3 years ago
The valence electron configurations of several atoms are shown. how many bonds can each atom make without hybridization? 2s^2 2p
Pie
Answer: This element needs 3 electrons to complete its octet state

Why?:
since the electrons in 2s2 are already paired they cannot form a bond pair with electrons from other elements without hybridisation however the 3 electrons in 2p3 are unpaired so can form bond pairs with electrons from other elements without hybridisation.

Hope this helps!
3 0
3 years ago
Suppose a group consists of 5 students. Three students are selected at random to do a presentation. How many different sets of p
Klio2033 [76]

Answer:

The number of presentation groups of 3 students that can be selected from a group of 5 students equals 10.

Explanation:

The number of different presenters equals the no of possible combinations of 3 students from a pool of 5 students.

Thus the number of possible combinations equals

\binom{5}{3}=\frac{5!}{(5-3)!\times 3!}=10

6 0
3 years ago
Preventive Maintenance will will reduce potential hardware and Software Problems. Select two factors based on which Preventive m
zimovet [89]

Answer:

Computer location or environment

Computer Use

Explanation:

Preventive maintenance are maintenance done, on a routine or regular basis, to prevent the occurrence of downtime which are not planned due to the failure of equipment in the system, and to ensure continual functionality of the system

In a computer system, therefore, preventive maintenance should focus on conditions that are on the maximum limits of the specification of the system

Therefore, the preventive maintenance of the system of the computer system is based on;

1) The computer location, such as the presence of dust in the environment, that can clog the circuit board of the system, or exposure to liquid that require ensuring protective covering of parts, or the high temperatures, that may require extra cooling through the use of fans

2) The computer usage; Including how the computer is used, either continuously, or once in a while, the traffic the computer is experiencing, the presence of temporary files, and malicious programs, that require removal.

5 0
3 years ago
Other questions:
  • Under the Home tab, where can a user find options to change the bullet style of an outline?
    8·1 answer
  • def getCharacterForward(char, key): """ Given a character char, and an integer key, the function shifts char forward `key` steps
    9·1 answer
  • The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
    11·1 answer
  • What should be the extension to execute files?
    6·1 answer
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • Http://www.alegrium.com/sgi/2/eibder
    5·1 answer
  • Where is the best place to self learn c++ or c# that is free?
    6·2 answers
  • QUESTIONS Which of the following use cases are suitable for compute-optimized cloud offering? ОА. None of the listed O B. Highly
    12·1 answer
  • How much would it cost to get the screen replaced on a Moto G7?
    10·1 answer
  • Pls help I don’t know the answers
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!