1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
15

What is an example of technology that helps support the idea of continental drift.

Computers and Technology
1 answer:
docker41 [41]3 years ago
8 0

I don't know technology, but using Satellite images, we are able to see that the continents once fitted into one 'jigsaw'. This shows that the continents must have drifted to its original place. Furthermore, Geothermal stations have pointed out convection currents in the Earth's mantle has caused the movement of crusts.
You might be interested in
Which of the following is NOT one of the three main ways to control a program when writing code?
Karo-lina-s [1.5K]
B. Derivative (Sorry If It’s Wrong)
5 0
3 years ago
Read 2 more answers
Complete the sentence.<br> A ___ number is composed of only zeros and ones.
Naya [18.7K]

Answer:

Binary

Explanation:

4 0
2 years ago
In C++ write a program that prints out PI as a type double and a type float EXACTLY as shown below. Your program should have ONE
victus00 [196]

Answer:

#include<iostream>

#include<iomanip>

using namespace std;

int main()

{

double PI_D = 3.14159256359;

float PI_F = 3.14159256359;

cout<<"i"<<"\t\t"<<"Float"<<"\t\t"<<"Double"<<endl;

for(int i = 1; i<=10;i++)

{

 cout<<i<<"-\t\t"<<PI_F<<setprecision(i)<<"-\t\t"<<PI_D<<setprecision(i)<<endl;

}

 return 0;

}

Explanation:

See Attachment where I used comments for explanation

Download cpp
3 0
3 years ago
What department is cyber security
Paul [167]

Answer:

United States Department of Homeland Security

The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.

<em>Give</em><em> </em><em>me</em><em> </em><em>brainliest</em><em> </em>

8 0
3 years ago
Read 2 more answers
Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that
Dmitriy789 [7]

The cube root is a number multiplied by itself three times to get another number

The code to use is y = x**(1/3)

<h3>How to determine the code to use</h3>

Assume the variable is x, and the cube root of x is y.

So, we have the following equation

y = x^\frac13

In Python, the code to use is y = x**(1/3)

Hence, the code that Rachelle can use in her calculation is x**(1/3)

Read more about cube roots at:

brainly.com/question/365670

3 0
2 years ago
Read 2 more answers
Other questions:
  • Fill in the blanks:(a)Every Java program must have at least one ______________.(b)The Java program is executed from _________ me
    12·1 answer
  • True or false over the course of ecological succession,species diversity increases over time?
    12·2 answers
  • Computer communications describes a process in which two or more computers or devices transfer ____.
    10·1 answer
  • Can you plug a usb 2.0 into a 3.0 port on your computer
    12·1 answer
  • Why might a government entity choose to offer some information and services online as in e-government
    8·2 answers
  • how to answer the questions on brainly? I've typed my answer in the box but there's no submit button or whatever, and the only t
    14·2 answers
  • Write a new program indent.cpp that enhances the program from the previous task. As it reads the input line by line, it should a
    10·1 answer
  • If cell G7 contains the function ________, it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7
    6·1 answer
  • The most important preinstalled software is the ______ software that allows you to use the computer the first time you turn it o
    7·1 answer
  • Suppose we used an internet addressing protocol that used 4 bits to encode a single address. How many devices would be supported
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!