Hawaii and japan are examples of islands made by? You have to write it.

Answers

Answer 1

Answer:

Volcanic activity


Related Questions

What is an example of a composite key in a database table?

InvoiceID
CustomerID
ProductID
OrderID + ProductID

Answers

Answer:

b

Explanation:

OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.

What is composite key?

A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.

In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.

Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.

However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.

Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.

Thus, the correct option is 4.

For more details regarding composite key, visit:

https://brainly.com/question/10167757

#SPJ3

Which of the following is not an example of a source of information that contributes to the accumulation of big data

Answers

Answer:

Law enforcement officials request the driver's license history for a suspect they recently apprehended.

Explanation:

The option that doesn't cause accumulation of big data is that Law enforcement officials request the driver's license history for a suspect they recently apprehended.

What causes accumulation of data?

Data is an information that is processed by a computer and can be stored in the computer for future use or reference purposes.

The quantity of data processed by a computer depends on the volume of the raw data that is collected and prepared before processing takes place.

From the given options;

Law enforcement officials request the driver's license history for a suspect they recently apprehended. This is just the data of a single individual which can not cause big data accumulation.

Receivers in cell phones request position information from nearby cell phone towers, and this location information is communicated to cell phone companies. This involves more that one cell phone company therefore can cause accumulation of big data.

Search engine providers store all search terms entered by users. This can cause accumulation of data.

Hundreds of satellites stationed above the earth capture images of the earth’s surface. This can cause accumulation of data.

Therefore data from a single source cannot cause accumulation of big data.

Learn more about data processing here:

https://brainly.com/question/26642156

HURRY GUYS I GOT 3 QUESTIONS LEFT
IM TIMED!!!!!

Which element should be used only when the content simply references the element
a. nav
b. figure
c. hgroup
d. article

Answers

the answer is b i believe

The element that should be used only when the content simply references the element is figure. The correct option is B.

What is element of referencing?

The four components of the author, date, source, and title are all included in reference list entries.

There are four referencing conventions that are frequently used. They go by the names of the Modern Languages Association (MLA), American Psychological Association (APA), Harvard, and Modern Humanities Research Association (MHRA) systems.

In computer programming, a reference is a value that allows a program to access a particular piece of data indirectly, such as the value of a variable or a record, in the computer's memory or in another storage location.

As a result, accessing the data is referred to as dereferencing the reference, and the data is referred to as the reference's referent.

Thus, the correct option is B.

For more details regarding elements of referencing, visit:

https://brainly.com/question/28270502

#SPJ2

Explain what Fahd did wrong in the scenario below. Fahd is running ten programs at once on his laptop when it suddenly freezes up. To fix this problem, Fahd buys a new battery for his laptop.

Answers

Answer:

Well first off. if the laptop froze that doesn't mean the battery is dead to the point where a simple rest of the laptop wouldn't work out.

What does input allow a computer to do

Answers

In computer science, the general meaning of input is to provide or give something to the computer, in other words, when a computer or device is receiving a command or signal from outer sources, the event is referred to as input to the device.

How does a filmmaker decide which events to include in a documentary?

Answers

Answer:

A documentary is a film based on facts in which the maker tries to portray an aspect of reality, such as politics, science, society or history, nature or the personal perception of the documentary maker.

Documentaries are informative in nature. Sometimes documentaries attempt to provide an objective picture of a subject. There is a lot of debate about what is objective, because the documentary maker chooses his images from reality, which is in itself a subjective act. In a creative author's documentary, the emphasis is on the subjective vision of the filmmaker.

Therefore, the documentary maker will select the events to include in the documentary according to the approach he or she wants to give to it, be it objective or subjective.

Ellie is conducting formal research for a new design project and wants to find demographic information. What source is considered most credible to use for her research?

Wikipedia articles

competitor websites

government data

magazine opinion pieces

Answers

may be wikipedia i’m sorry if it’s wrong ☹️

Answer:

Its governmental data

Explanation:

nadine is the systems administrator for a network with a single subnet. The subnet uses 192.168.1.0 with a mask of 255.255.255.0. The network has 10 servers running Windows Server. Srv1 currently provides both DHCP and DNS services. Nadine wants to increase the fault tolerance for her DHCP servers. She installs a new server, Srv11, and configures it for DHCP. She configures a scope on Srv11 to match the scope on Srv1 and then excludes half of the addresses in the scope on Srv1 and the other half of the addresses on the Srv11. Nadine decides to test her solution and shuts down Srv1. As a test, she forces a workstation to release its IP address and request a new one. She finds that the workstation has the IP address 169.254.0.15 with a mask of 255.255.0.0. What should Nadine do to fix the problem?

Answers

Answer:

Authorize Srv11

Explanation:

In order to fix this problem, Nadine should Authorize Srv11. The problem is most likely being caused due to failure of authorization of the server. This would prevent this server from being on the same scope as Srv1 and therefore, it is why the IPaddress being given is different. DHCP is an automatic protocol and would not be able to provide an IP address in the same scope if the server is not Authorized to do so.

Other Questions
Madeline has 2 times the number of games as Paulo. Paulo has 4 more games than Tyler. If Tyler has 9 games, how many games are there among the 3 friends? If you were put in charge of reducing obesity in the world, what would you suggest doing to reduce the rates of obesity? Why would you suggest these actions?please answer The Vietnam war was so unpopular, Lyndon Johnson:A. Chose to withdraw all American forces from the country.B. Focused on his domestic policy instead.C. Chose not to run for reelection.D. Lost the 1968 election. PLEASE HELP 25 POINTSThe topographic map shows the location of a park ranger at Point X when a message is received that an injured hiker needs help at Point Z. Which answer correctly identifies the elevations of both points on the map?Point X= 1500m, Point Z= 2000mPoint X= 1550m, Point Z= 1600mPoint X= 1600m, Point Z= 2050mPoint X= 2050m, Point Z= 1600m If you didn't understand the lingo used in a book, what don't you understand? What was Lincoln's political experiencebefore thePresidential electionof 1860? Can one of you guys help me What were the assumptions underlying the National Security Council's recommendations in NSC-68? Were those assumptions justified? in olden days,parents were regaeded as educators,and educators as parents. Write a recursive method called permut that accepts two integers n and r as parameters and returns the number of unique permutations of r items from a group of n items. For given values of n and r, this value P(n, r) can be computed as follows: n!/(n - r)!For example , permut (7, 4) should return 840. ILL GIVE BRAINLYIST TO WHOEVER ANSWERS THIS RIGHTTT PLEASE HELP What was Don Trine doing on his walks?Question 4 options:enjoying the solitudeburying treasuredigging holes The teachers at Eastside High School were asked the number of years they have been teaching. The results are as follows.3, 4, 9, 12, 7, 5, 4, 12, 3, 9, 11, 4, 14, 9, 2, 10, 3, 10, 9, 7Use the data to fill in the box-and-whisker plot below. (5g2+6g-10)-(6b2+2g+9) To win any tort case, the plaintiff must prove that the defendantO A. acted with maliceB. breached a dutyc. knew that the action would cause injuryD. was guilty beyond a reasonable doubt pls help nowWhat does William Wordsworth compare the daffodils to in the following lines? (5 points)When all at once I saw a crowd,A host, of golden daffodils; a)a large group of people b)a small collection of rocks c)a group of dangerous animals 6th grade science Major grade plz help ASAP Fill in the blank in the following sentence with the appropriate imperfect form of the verb mettre below. Quand j'tais petite, je ___ toujours des chaussures rouges.A. mettaientB. mettaisC. mettaitD. mets 4) What is the perimeter of a square that has an area of 262.44 feet? plz answercorrectly it is worth a lot of points