Which mineral is commonly found in igneous rocks?

Answers

Answer 1
Answer:

Answer:

I would say Quartz.

Explanation:

Answer 2
Answer:

Answer:

felspar

Explanation:


Related Questions

Which of the following is another term for a subfolder?parent foldersubdirectoryroot foldertree folder
Using a movie or documentary (fictional or real), explain what the production phase of the motion picture might look like. What events might take place? What might the different people on the production team do? Make sure to include information about all major team members as well as actors/actresses. Your response should be detailed and should integrate the information from the entire lesson.
"The shape of the Earth can be most accurately described as Earth shaped." Justify the statement. No spamming, right answer will be marked as Brainliest. A) True. B) False. C) Unclear. D) Inaccurate.
What essential part of the operating system communicates with the BIOS, device drivers, resource managers, and APIs to coordinate operating system functions?
At which minimum height off the floor should a new oven be installed

WordArt styles allow you to add ____.

Answers

As for this problem, the most probable and the most likely answer to this would be it depends on the person or the user of it since there aren't any options presented with the problem.

WordArt is there to be of use during presentations, during discussions, and other things. On the other hand, as the technological advancement takes leaps and bounds going forward, this utility seems to be underused and isn't expected to give a more impact to the reader or to the recipient of such document that contains it. This is typically used for people that aren't too familiar yet, as to how to utilize other programs to enhance their documents and files.

What is the function of the keyboard shortcut Ctrl+Shift+E in a word processor? Select one of the options below as your answer: A.. It turns on the Reviewing toolbar. B. It inserts a comment..

Answers

I guess the rest of options are missing. As I know ctrl+shift+e turns change tracking on or off. So the closest answer is A.. It turns on the Reviewing toolbar.

a new feature in windows 10, which enables you to organize the applications running on your computer is

Answers

Answer:

task view because all the applications in recent use and the pinned ones can be displayed if wanted by the user.

The ____ package contains frequently used classes and is implicitly imported into java programs.

Answers

Java.lang is the answer you're looking for

Write a program with source file name IsPrime.cpp that asks the user to enter a ""positive whole number in the range 2 through 1000"" and determines whether the entered number is prime.

Answers

Answer:

#include <iostream>

bool isPrime(int number) {

   if (number <= 1) {

       return false;

   }

   for (int i = 2; i * i <= number; i++) {

       if (number % i == 0) {

           return false;

       }

   }

   return true;

}

int main() {

   int number;

   std::cout << "Enter a positive whole number in the range 2 through 1000: ";

   std::cin >> number;

   

   if (isPrime(number)) {

       std::cout << number << " is a prime number.\n";

   } else {

       std::cout << number << " is not a prime number.\n";

   }

   

   return 0;

}

Explanation:

Your organization employs a group of traveling salespeople who need to access the corporate home network through the internet while they are on the road. You want to funnel remote access to the internal network through a single server, which of the following solution would be best to implement?

Answers

Answer:

VPN concentrator

Explanation:

A VPN concentrator (Virtual Private Network Concentrator) is a sort of communication system that ensures stable VPN connections are established and  messages are transmitted across VPN nodes.

It is a form of networking device designed primarily for VPN  communication network development and management.

It mainly enhances a VPN router's features by  incorporating specialized communications data and network security.