1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
3 years ago
11

Supplies/material used in iron​

Computers and Technology
1 answer:
Novay_Z [31]3 years ago
3 0
The raw materials used to produce pig iron in a blast furnace are iron ore, coke, sinter, and limestone. Iron ores are mainly iron oxides and include magnetite, hematite, limonite, and many other rocks. The iron content of these ores ranges from 70% down to 20% or less.
You might be interested in
In cell K10, create a formula using the SUM function that calculated the total of the range F17:F20 subtracts it from the value
bogdanovich [222]

Answer:

Cell K10

=SUM(F17:F20 - J10 + G17:G20 - 160)

3 0
3 years ago
Why is it saying I don’t have a subscription when I paid for it and it shows deducted from my account? I can’t find any phone #
Step2247 [10]

Answer:

email customer service and yell at them

Explanation:

8 0
3 years ago
A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
Damm [24]

Answer: white hat hacker

Explanation:

Like other forms of hacker, white hat hackers also have wide range of knowledge of breaking into systems, overriding firewalls, bypassing security protocols and can also do all other things hackers do. But what differentiates white hat hackers is the motive behind what they do, in that they carry out all this test not for their personal gain but for the benefit of the owners and also with the approval of the owners. Because after carrying out tests on the ways of exploiting the loop holes in the system they reveal it to the manufacturer or system owners for correction.

4 0
4 years ago
If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’
Nadusha1986 [10]

Answer:

hacker can steal your data in many ways.

Explanation:

if you allow cookie site for fake websites. It can absolutely be possible.

5 0
4 years ago
Rachel uses a word processor to write short stories. However, most of her time is spent toying with the keys, rather than in wri
andreev551 [17]
She should first plan out in her head what she will type
8 0
3 years ago
Read 2 more answers
Other questions:
  • The chief architect now needs to design a memory with an addressability of 32 bits. Suppose the architect can only use the same
    6·1 answer
  • Ben works at a top accounting firm in Salt Lake City and his responsibilities include developing individual and departmental goa
    9·1 answer
  • Plzzzzz help right answer gets Brainly
    10·1 answer
  • You open a link in a new tab by holding the _______ button while clicking the link
    8·1 answer
  • What should you do before using a website to store student information ? A. Read and understand the website’s privacy contract
    11·2 answers
  • Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer
    10·1 answer
  • What is an example of an attribute for a screen object
    14·1 answer
  • How is an operating system like a translator?
    12·1 answer
  • Check your knowledge
    9·1 answer
  • Treating others with respect, even when they're impolite, is considered
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!