1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
4 years ago
7

Metamorphic rock can form from _____.

Computers and Technology
2 answers:
AlekseyPX4 years ago
6 0

Answer:

The correct options are: sedimentary rock, metamorphic rock and igneous rock

Explanation:

Metamorphic rocks are the rocks that are formed from the existing <u>metamorphic rocks, sedimentary rocks, or the igneous rocks</u>.

These metamorphic rocks are formed when the existing metamorphic rocks, sedimentary rocks, or the igneous rocks, are <u>subjected to high temperature and high pressure conditions, which brings about a physical or chemical change in the rocks.</u>

Alex Ar [27]4 years ago
3 0
Sedimentary rock; under intense heat and pressure.
You might be interested in
The computer mouse is used to
Alexandra [31]
Is there options to this question?
7 0
3 years ago
Which complaints was stated by some Strategic Defense Initiative Organization (SDIO) board members about the software of the Str
MakcuM [25]

Answer:

they complained that it threatened the Mutually assured destruction (MAD) approach.

Explanation:

For example, the Strategic Defense Initiative (SDI) allowed for a swift response if the United Nations came under attack, by deploying ballistic strategic nuclear weapons.

However, the Mutually assured destruction (MAD) approach demanded that there should be restraint in using nuclear weapons, especially when there is a threat of another Nation.

8 0
3 years ago
Which among the following is a fraudulent or deceptive act designed to trick individuals into spending time or money for little
ivanzaharov [21]

Answer:

A. Internet scams.

Explanation:

Internet scams is a fraudulent or deceptive act designed to trick individuals into spending time or money for little or no return through the use of a cloud service or the internet. Some examples of an internet scam are phishing scams, email spams, credit card scam, etc. It is simply centred around the provision of false information or misrepresentation of another party for the sole purpose of theft.

Hence, an internet scam is an illegal means of obtaining things from people and such is a cyber crime that is punishable by law.

6 0
3 years ago
An administrator deploys a basic network intrusion detection (NID) device to block common patterns of attacks. What detection me
shusha [124]

The type of detection method that this basic network intrusion detection (NID) device use is Signature-based.

<h3>What is signature-based detection?</h3>

A Signature-based detection is known to be a term that is often referenced to cybersecurity.

Note that it involves the use of footprints to recognize any form of malware. It is known that have programs, apps, software, etc., often consist of a digital footprint and as such the use of this detection can be able to identify the attack.

Learn more about  network intrusion from

brainly.com/question/26199042

8 0
2 years ago
Dharma opens one window, does a little work, closes the window and then opens a new one. Instead of opening windows, what can Dh
seraphim [82]

Answer:

Make a goal

Explanation:

She could make a goal achieve it and reward herself. Do this multiple times and she will be done

5 0
3 years ago
Other questions:
  • Open Source software is:
    6·1 answer
  • 3. You are a network administrator responsible for all network platforms and services. The Teta Company currently has only one b
    13·2 answers
  • In Microsoft Word, when you highlight existing text you want to replace, you are in
    13·1 answer
  • What is the Explicit Dependencies Principle? Explain why explicit dependencies are better than implicit dependencies.
    6·1 answer
  • What do you think is the most important factor affecting the collection of digital data and what impact do you think that this f
    13·1 answer
  • FOR ALL PLATO USERS:
    10·2 answers
  • Write a javascript program that reads three integers named start, end, and divisor from three textfields. your program must outp
    6·2 answers
  • In what ways can you sort data by using the sort procedure? Check all that apply.
    6·1 answer
  • What skill would be easiest to learn from a simulation video game?
    8·2 answers
  • Civil engineering structures are also called _________.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!