1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
3 years ago
15

Rocks created from compaction and cementation of sediments are called:

Computers and Technology
1 answer:
Effectus [21]3 years ago
4 0

Answer:

Sedimentary Rocks

Explanation:

Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.

You might be interested in
Which folders are commonly used in the navigation pane of outlook
sineoko [7]
Mail, Calendar, Contacts, Tasks, and Notes
5 0
3 years ago
Answer for 3 and 4 please
Nata [24]

Answer:

3. D: px

4. B: web page

Explanation:

All font sizes are measured in px unless specified otherwise (in em's for example).

The correct answer is a web page because itself is a unique file that displays multimedia components.

3 0
3 years ago
Read 2 more answers
What is a sequence of graphic illustrations which represent the planned scenes for a video or animation?
Alona [7]

Answer:

D. Storyboard

that is the answer

4 0
3 years ago
Read 2 more answers
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
3 years ago
In a contract, what is consideration
Mrac [35]
Do you wan the definition ?
3 0
3 years ago
Other questions:
  • Can someone show me a image of this completed I will mark brainliest!!! It's typing.com
    11·1 answer
  • Recursive Power Function Write a function that uses recursion to raise a number to a power. The function should accept two argum
    15·1 answer
  • How do you choose the amount of points you give a person here on this brainless app...??.
    11·2 answers
  • Match the tool to the task it helps to accomplish. Thesaurus allows the user to find the synonyms and antonyms of a word Smart L
    8·1 answer
  • which of the following uses technical and artistic skills to create visual products that communicate information to an audience?
    14·1 answer
  • Can someone help me?
    14·1 answer
  • Busco....................... Novio
    8·2 answers
  • Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
    7·1 answer
  • How do you delete questions you asked?
    7·2 answers
  • Importance of software in computer​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!