1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frutty [35]
3 years ago
4

Which instruments do volcanologists use to predict volcanic eruptions?

Computers and Technology
1 answer:
k0ka [10]3 years ago
3 0

Answer:

A.) Seismograph

Explanation:

Scientists use seismographs to predict ground movement, which can cause earthquakes and volcanic eruptions

<em>Hope this helps! Good luck!</em>

You might be interested in
The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables ca
frutty [35]

Answer:

False

Explanation:

Relational Database are only two dimensional (not three dimensional).

Note: Relations are two dimensional tables in relations databases.

8 0
3 years ago
How is Office 365 different from Windows Live Office?
Scilla [17]
<span>Office 2016 is the traditional Microsoft Office product that is sold for a single time fee up front. One pays to purchase it and can install it on one single PC or Mac to use for as long as they would like, it has no expiration date. Office 365 has no hefty up front fee, instead one is charged a monthly or annual fee to get access to the most up to date version of the product. Therefore, the answer is B.</span>
6 0
3 years ago
Describe accessibility in Windows 7 ​
satela [25.4K]

Answer:

Accessibility is the epitome of usability and was a key tenet throughout the engineering of Windows 7. ... Windows 7 includes accessibility options and programs that make it easier to see, hear, and use your computer including ways to personalize your computers and use keyboard shortcuts.

7 0
3 years ago
Write down the step to search information internet​
Novosadov [1.4K]

Answer:

Here u go... hope it helps u.... have a great day ahead

5 0
3 years ago
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and s
Akimi4 [234]

Answer: (a) Target had security software, but the notification alerts from the software were  ignored.

Explanation:

The security software was there in target but its notification alerts being ignored was something which was not thought to have been occurred during the Target security breach, as anyone could be alerted with the notification alert.

6 0
3 years ago
Other questions:
  • Describe a situation where it would be appropriate to use each of the six leadership styles described by Daniel Goleman
    7·1 answer
  • ___________is a security strategy that applies multiple layers of defense because there is an assumption that any single protect
    12·1 answer
  • What computer device works like a central nervous system?
    11·1 answer
  • Given the following characteristics for a magnetic disk pack with 10 platters yielding 18 recordable surfaces (not using the top
    14·1 answer
  • Angle parking spaces are generally entered at an angle about __________ from the curb.
    8·2 answers
  • What phobia is a fear of computers or working on a computer?
    6·1 answer
  • Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific f
    14·1 answer
  • SmartArt is especially useful for which types of objects? Check all that apply.
    10·2 answers
  • A _is a short descriptive label that you assign to webpages, photos,
    10·1 answer
  • The ____ statement can be used to eliminate the use of certain (flag) variables.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!