1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
3 years ago
12

Match the ocean floor feature with its characteristic.

Computers and Technology
2 answers:
Ymorist [56]3 years ago
5 0

The characteristics and definitions for each concept are stated below:

Rift zone

  • Definition: a characteristic of shield-type volcanoes where linear cracks appear in near their premises
  • Characteristic: near the continental margin

Abyssal plain

  • Definition: a flat area found under the ocean, found in depths ranging from 3,000 metres and 6,000 metres
  • Characteristic: very flat part of ocean floor

Ocean trench

  • Definition: a very long ditch in the ocean floor
  • Characteristic: site of seafloor spreading

Seamount

  • Definition: a mountain located on the ocean floor
  • Characteristic: underwater volcano

o-na [289]3 years ago
3 0

Rift zone- Site of seafloor spreading

Abyssal plain- very flat part of ocean floor

Ocean Trench- Near the continental margin

Seamount- Underwater Volcano

You might be interested in
What is the protocol that is used between a web browser and web server at the transportation layer?
guapka [62]
TCP/IP (Transmission Control Protocol / Internet Protocol)
3 0
4 years ago
Csc105 final graded project
Tatiana [17]
What is this supposed to be?
5 0
4 years ago
What is the encryption cipher that was the precursor to des??
Elanso [62]
DES works by using the same key to encrypt and decrypt a message, so both the sender and the receiver must know and use the same private key. Once the go-to, symmetric-key algorithm for the encryption of electronic data, DES has been superseded by the more secure Advanced Encryption Standard (AES) algorithm.
8 0
3 years ago
Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invo
vova2212 [387]

Answer:

The procedure in SQL is created as follows

Explanation:

--creating the procedure

CREATE OR REPLACE PROCEDURE prc_inv_amounts (W_IN IN NUMBER)

AS

--defining variables

W_CK NUMBER := 0;

W_SUBT NUMBER := 0;

W_TAX NUMBER := 0;

BEGIN

--Authentication process of the invoice

SELECT COUNT(*) INTO W_CK FROM INVOICE WHERE INV_NUMBER := W_IN;

--Transaction confirmation

IF W_CK = 1 THEN

SELECT SUM(LINE_TOTAL) INTO W_SUBT FROM LINE

WHERE

--checking the invoice for the desired invoice number

LINE.INV_NUMBER = W_IN;

W_TAX :=W_SUBT * 0.08;

--updating the invoice

UPDATE INVOICE

--setting the new values

SET INV_SUBTOTAL = W_SUBT,

INV_TAX = W_TAX,

INV_TOTAL =W_SUBT + W_TAX

WHERE INV_NUMBER = W_IN;

--ending the if statement

END IF;

--ending the procedure

END;

7 0
3 years ago
The Healthy Nutrition Counseling Center and the Simple Solutions Software Company have recently joined forces to produce a meal
labwork [276]

Answer: (B) Strategic alliance.

Explanation:

The strategic alliance is one of the type of the agreement that help the organization for developing the effective processes. The strategic alliance basically allow associations, people or different substances to move in the direction of normal or connecting objectives.

The main advantage of the strategic alliance is that in terms of economical condition it reduces the overall, risks in the process and also reduced the costs. This technique basically include new technologies and diversifying services and the products.  

Therefore, Option (B) is correct.

5 0
3 years ago
Other questions:
  • Which of the following is NOT an ethical way of getting to the top of a web search?
    5·1 answer
  • Suppose that we can improve the floating point instruction performance of machine by a factor of 15 (the same floating point ins
    13·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • Nate wants to copy the style of his contact address to the normal template. Complete the paragraph to describe how he can access
    6·1 answer
  • How can an Excel table be added to a Word document? Check all that apply.
    15·1 answer
  • Cynthia realized that she used a wrong term throughout her paper. Which option can help her quickly correct her mistake?
    5·1 answer
  • To check spelling errors in a document, the Word application uses the _____ to determine appropriate spelling.
    7·2 answers
  • An ____ is an object that produces each element of a container, such as a linked list, one element at a time.
    13·2 answers
  • When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet
    9·1 answer
  • You have been asked to replace a cracked screen on a laptop. The replacement screen was delivered today, but it did not include
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!