1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
4 years ago
7

Metamorphic rock can form from _____.

Computers and Technology
2 answers:
AlekseyPX4 years ago
6 0

Answer:

The correct options are: sedimentary rock, metamorphic rock and igneous rock

Explanation:

Metamorphic rocks are the rocks that are formed from the existing <u>metamorphic rocks, sedimentary rocks, or the igneous rocks</u>.

These metamorphic rocks are formed when the existing metamorphic rocks, sedimentary rocks, or the igneous rocks, are <u>subjected to high temperature and high pressure conditions, which brings about a physical or chemical change in the rocks.</u>

Alex Ar [27]4 years ago
3 0
Sedimentary rock; under intense heat and pressure.
You might be interested in
A network technician cannot get a host to connect to the internet. running the ping command shows the apipa ip address. what is
Lunna [17]
The router will not connect to th network. This will keep it from connecting to the NEXUS
6 0
3 years ago
Which of the following is a database concept that allows for storage and analysis for a dozen to billions of data points?
nydimaria [60]

Answer:

C) Storage

Explanation:

I am sure of it.

5 0
3 years ago
Which one cost more Broken bones or a Broken Computer? Explian ur answer
vladimir1956 [14]
Broken bones cost more, because hospital bills are a lot more than to get a computer fixed.
4 0
4 years ago
Read 2 more answers
What is the best computer for college?
scoundrel [369]
Acer Chromebook is a great computer made by Google!

4 0
4 years ago
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
4 years ago
Other questions:
  • ____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messag
    5·2 answers
  • Which of the following is NOT one of the most important elements when designing a website?
    8·2 answers
  • When using the wait and signal operations, ____ sets the process's process control block to the blocked state and links it to th
    12·1 answer
  • The final element of an e-mail message should be
    15·1 answer
  • Linux is: Select one: a. primarily concerned with the tasks of end users. b. designed for specific machines and specific micropr
    10·1 answer
  • Connect 5 LEDs with any random colors. Iteratively, turn ON 1 to 5 LED(s) that will take 5 iterations in total, and in every ite
    6·1 answer
  • Scenario
    7·1 answer
  • ¿ cuales son las características de revolución industrial?
    11·1 answer
  • Pls help now the question is very hard someone help me pls​
    6·1 answer
  • What power points feature will you use to apply motion effects to different objects of a slide
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!