1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
3

Use the drop-down menus to complete the sentences describing the important ideas in Hess's theory. Hess expanded on Wegener's th

eory of continental drift . Hess proposed the idea that are places where crust is created.
Computers and Technology
2 answers:
ELEN [110]3 years ago
8 0

Answer:

Following are the solution to the given question:

Explanation:

The hypothesis of continental drift from Wegener; Stein suggested that crust was formed within mid-ocean crises.

The first one is mainland drift, and the second is mid-ocean ridges. You have taken the test Use the dropdown menu to type out the phrase that describes Hess's theory as true major ideas.

Wegener's hypothesis of plate tectonics was expanded by Hess. Hess suggested that crust is produced in the mid-ocean ridges.

Hitman42 [59]3 years ago
8 0

Answer:

Continental drift

mid-ocean ridges

Explanation:

You might be interested in
Systems management involves allocation of computer resources to keep all processes operating smoothly and at maximum efficiency.
olchik [2.2K]

Answer:operating system (OS), program that manages a computer's resources, especially the allocation of those resources among other programs. Typical resources include the central processing unit (CPU), computer memory, file storage, input/output (I/O) devices, and network connections.

Explanation:

8 0
3 years ago
Write three guidelines to help you keep track of your behavior as you use different apps with
Gala2k [10]

Answer:

A basic guideline plan to help me track my behavior consist of the following:

How much time do I use each element?

Have I experienced anxiety after using them?

Have I experienced anxiety while using them?

Have I changed my day to day routine by using them?

Explanation:

The reasons to back my answer are the following. First of all, dependency can be measured in time spent and anxiety developed after the use of the element. Thus, we need to explore if the source of media has originated anxiety while using it or after using t to spot if we are suffering an addictive pattern. Also, generally addictive elements create anxiety while using it and it increases after stop using them. Therefore, if we find that we have experienced both types of anxiety we are in an addictive cycle.

4 0
3 years ago
The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
Bogdan [553]

Answer:

Change default username and password.

Explanation:

The corporation under which Derek works has assigned him an assignment of establishing and safeguarding a SOHO router. He intends to ensure that maybe the wireless connection is protected and no further unauthorized person would connect the device to the router. So, the first task is to simply change the username and password that the wifi routers will be secured.

So, the following answer is correct about the given scenario.

6 0
4 years ago
8. Which of the following is an output device
Fynjy0 [20]
<h2>Hey there!</h2>

<h3>Printer is an output device. </h3>

<h2>Explanation:</h2>

<h3>CD - We insert CD,so it is an input device.</h3>

<h3>Hard Drive - It is responsible for the memory of the computer, so it also an input device. </h3>

<h3>Joystick - It is used to play games on a computer, it inputs instructions through which a game/games can be played. So,it an input device.</h3>

<h3>Printer - It is used to print out the hard copies from a computer,like pages etc..</h3>

<h2>Hence, the correct option will be </h2>

<h3>D. printer </h3>

<h2>Hope it helps </h2>

7 0
2 years ago
Which form of cryptanalysis focuses on weaknesses in software, the protocol, or the encryption algorithm?
Mrrafil [7]

The form of cryptanalysis that would focus on the weakness of software as well as the protocol as well as the encryption algorithm would be the Statistical attack. Hope this is the right answer and would then be of help.

7 0
4 years ago
Other questions:
  • Photo editing can transform any image into a great photograph.
    9·1 answer
  • An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
    5·1 answer
  • Write a program that sorts an array of 20 random numbersin the range from 0 through 1000.
    6·1 answer
  • What is the role of consumers in determining what is produced in a market economy
    15·2 answers
  • Which of the following is true for an API?
    6·1 answer
  • A_____ handles all the instructions that it received from hardware and software which are available on the computer ​
    10·1 answer
  • When you get a new sim card do it come with a new number or do you have a activate the phone and get a new number in store ?
    9·1 answer
  • Which of the following programming languag
    13·1 answer
  • Body positioning is an example of what type of communication?
    6·1 answer
  • Choose 2 statements that correctly describe the time complexity of data structures with N data.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!