1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brut [27]
3 years ago
12

Which property describes if a mineral breaks down into flatpieces​

Computers and Technology
1 answer:
marta [7]3 years ago
3 0

Answer: Cleavage

Explanation:

You might be interested in
Jnhj hjibfnufnbfjbnkfv fj v
kirill [66]

Answer: baller.

Explanation:

6 0
3 years ago
A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you b
umka2103 [35]

Answer: Application layer

Explanation:

Application layer of OSI(Open system interconnection) that is responsible for interfacing the communication with the user by displaying information or message. It maintains the transmission of file and assessment, emailing faculty, using network services etc.

  • According to the question,if any Skype user has complain regarding video call drop while conferencing then application is responsible to solve the issue.
  • This layer will be the starting point of troubleshoot by approaching to network resources.As call drop can occur due to network service, congestion or resource issue.
4 0
3 years ago
What are radio waves and what kinds of Information do they transmit ​
loris [4]

Answer:

Explanation:

Radio waves are a part of electromagnetic waves. They are high wavelength and low frequency waves that are classified as non-ionizing radiation. These waves are mostly used for communication purposes.

Radio waves carry are interpreted by devices that converts them to mechanical energy that can be interpreted and easily discerned. These waves carry a broad range of information.

These waves carry time-varying electrical signals that can easily be transmitted and they are produced by accelerated electrical charges.

4 0
4 years ago
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
A user is trying to delete a file located on an ntfs volume on his windows 8 computer but is unable to do so. Why is this.
dezoksy [38]

It happened because the window files on that users pc are corrupted and deleted so the user needs to reinstall the windows and then after he should be able to remove that file from his PC.

If the above thing didn't work, follow the following steps.

- Click the start button ,type in cmd then it will show you a command prompt program icon, right click on that and open it by using the administrator rights. Once the program opened then type in chkdsk /f and hit Enter to automatically scan your computer for any corrupted files/ folders upon the restart of the computer.

This will be definitely helpful for you.

4 0
3 years ago
Other questions:
  • Why is the wizard able to install the printer when an actual print device is not connected to the computer??
    11·1 answer
  • Co to jest podprogram (procedura lub funkcja)? Zaznacz poprawną odpowiedź. a) Wielokrotne powtarzanie tych samych poleceń. b) Wy
    8·1 answer
  • Derived Classes Warrior Stores the warrior's allegiance as a string. The warrior does not attack warriors that have the same all
    14·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • What are some areas to fill out in the New Formatting Rule dialog box? Check all that apply. rule type function name condition c
    7·2 answers
  • Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time.
    6·1 answer
  • Which of the following are used to classify plutons
    14·1 answer
  • What is web <br>searching engine ?​
    9·1 answer
  • A form of segmentation that is based on user usage rate, user status, purchase occasion, and benefits sought is _________.
    13·1 answer
  • Write a pseudocode for the logic of a program that accepts five numbers from a user and displays one of the following messages:-
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!