What is a mineral used in making fertilizer?

silica
tin
silver
gypsum

Answers

Answer 1
The answer is Gypsum. It's also used in a variety of other everyday things.
Answer 2

Answer:

D. Gypsum

....


Related Questions

The Bradley effect occurs when people
A) say they will vote for a candidate based on the candidate's name.
B) say they will vote against a candidate because of the candidate's race.
C) say they will vote for a candidate but then vote against him or her.
D) say they will vote in the next election but instead stay home.

Answers

Answer: B) say they will vote against a candidate because of the candidate's race.

Explanation: Bradley effect is the effect that causes lack in compatibility of the election results and the opinion poll of voters in accordance with the white candidates whose standing against the minor or non-white candidate .This is also known as Wilder effect which arises due to the race of candidate.

Other option are incorrect because name, gender or staying at home are not the parameters that are considered in the theory of the Bradley effect .Thus, the correct option is option(B).

Over the years of middle childhood, children who recognize prejudice and react by affirming _____ in their gender and background are likely to develop healthy self-esteem.

Answers

The answer is Pride.
It is important for the children to learn that their gender should not be a hindrance for their achievement in the future from the early age.
With this, children will learn logically about the strength and weakness of each of their gender and utilize it to their own benefit, which will lead to the high-self value of themselves.
Hey Karli

The correct answer is "Pride"

Which formation is the result of wind erosion?
1.mud slide
2.glacial erratics
3.unusually shaped rocks
4.


U-shaped valleys


Answers

Answer:

i hope this helps =}

Explanation:

Jordan's parents place few demands on her behavior. they are not warm or responsive to her needs. jordan's parents would be classified as

Answers

Final answer:

Jordan's parents are practicing an uninvolved style of parenting, recognizable by their lack of demands and responsiveness, leading to potential emotional and academic difficulties for the child.

Explanation:

Jordan's parents would be classified as employing an uninvolved style of parenting. This approach is characterized by a lack of responsiveness to the child's needs and a minimal amount of demands placed on them. The uninvolved style can be a result of several factors like severe depression, substance abuse, or an extreme focus on work that cause the parents to be indifferent. Children raised by uninvolved parents typically demonstrate emotional withdrawal, fearfulness, anxiety, and they are at an increased risk of poor academic performance and substance abuse.

Life safety must be of paramount concern in almost all settings (except perhaps a few national security areas). what guidelines are needed when life safety is not the paramount physical security concern?

Answers

Final answer:

There are some scenarios such as national security situations, high-risk work situations and social policies where other priorities might supersede direct life safety concerns. However, this does not mean safety is ignored and guidelines must be put in place to minimize potential harm.

Explanation:

While life safety is of paramount concern for most settings, there are a few select areas where other priorities may supersede direct life safety concerns. These usually pertain to national security scenarios, certain workplace safety environments, or other unique circumstances.

Firstly, national security environments may prioritize information protection or mission success. For instance, in a military operation, the completion of the mission may take higher precedence over individual safety. However, this does not mean compromising on safety; rather, it means putting in place stringent rules and guidelines to balance between accomplishing the mission and safeguarding personnel.

In certain workplace environments, particularly those involving high-risk tasks, there could be an acceptance of elevated risk levels, assuming all safety protocols are followed. Such situations demand meticulous regulations and practices to ensure worker's safety.

Other special contexts might include areas of social policy where rights and liberties, like gun ownership or immigration come into play. Ensuring public safety might clash with individual rights and liberties. Here, lawmakers must draft policies considering both aspects.

Regardless of the context, even when life safety is not the paramount concern, protocols must always be designed to minimize the potential for harm and catastrophic events.

Learn more about Physical Security Concerns here:

https://brainly.com/question/33947796

#SPJ12

When life safety is not the paramount physical security concern, guidelines should focus on the protection of assets, information, and property while still considering the safety of individuals to a reasonable extent.

These guidelines may include:

1. Access Control: Implement strict access control measures to ensure only authorized personnel can enter sensitive areas. This may involve biometric systems, keycard access, or security checkpoints.

2. Surveillance: Use comprehensive surveillance systems to monitor activities and detect unauthorized access or suspicious behaviour. This includes cameras, motion detectors, and alarm systems.

3. Asset Protection: Prioritize the protection of critical assets through measures such as safes, secure storage facilities, and tamper-detection devices.

4. Information Security: Ensure that all sensitive information is protected through encryption, secure data storage solutions, and controlled access to information systems.

5. Property Security: Use barriers, fencing, and locking mechanisms to protect the physical property from unauthorized access or damage.

6. Risk Assessment: Conduct regular risk assessments to identify potential vulnerabilities and implement appropriate countermeasures.

7. Incident Response Planning: Develop and maintain an incident response plan to quickly and effectively address security breaches or other emergencies.

8. Legal and Regulatory Compliance: Adhere to all relevant laws and regulations that pertain to the protection of assets and information, even when they do not directly relate to life safety.

9. Training and Awareness: Provide ongoing training for personnel to ensure they understand security protocols and the importance of asset and information protection.

10. Balance: While life safety may not be the primary concern, it is still essential to maintain a balance and ensure that security measures do not unnecessarily endanger human life.

These guidelines are designed to protect assets and information without completely disregarding human safety, recognizing that life safety is still an important consideration in any security strategy.

Single women without children appear to be equally likely as all men to complete a science and engineering graduate degree.

Answers

The correct answer is 'True'.

The statement that “Single women without children appear to be equally likely as all men to complete a science and engineering graduate degree” is TRUE.

These two situations are equally likely to be true as the number of single women without children is on par as the number of men completing science and engineering graduate degrees.

Which concept is stressed by structural functionalists?*

A. There is competition in every interaction.

B. Manifest functions occur more often than latent functions.

C. The world is full of meaning.

D. Society is disrupted when one aspect has problems.

*This question is from the "sociology" course on apexvs.com.

Answers

The concept that society is disrupted when one aspect has problems is stressed by structural functionalists. Structural functionalism is a theory in sociology that explains how the society would be affected based on the changes of the relationships of various institutions that make up the society. One problem in one of these institutions may bring disruption in the society according to this theory.

Which agency is charged with enforcing affirmative action programs?

Answers

the answer to this question is EEOC.
EEOC stands for Equal Employment Opportunity Commission. This agency was established in 1965 with the purpose of enforcing civil rights in the case of workplace discrimination that often experienced by specific gender/racial minorities at that time.
Final answer:

The agency charged with enforcing affirmative action programs is the Equal Employment Opportunity Commission (EEOC).

Explanation:

The agency charged with enforcing affirmative action programs is the Equal Employment Opportunity Commission (EEOC). The EEOC is a government organization created by the 1964 Civil Rights Act to investigate employment discrimination and protect workers who file complaints against employers. It enforces affirmative action policies for federal contractors who have lost a discrimination lawsuit.

Learn more about Enforcement of Affirmative Action here:

https://brainly.com/question/37187393

#SPJ11

what year did the Egyptian empire began to weaken

Answers

Wars at the end of the Egyptian empire. While the devastating civil war significantly influenced the health of the Egyptian state, other military conflicts further weakened the empire and eventually led to its total collapse. In approximately 671 BC the nearby Assyrians invaded Egypt and reigned until about 627 BC.
1785 BC. (When the Pharaohs' power weakened in the Known World) It died in 30 BC.

In 1868, the Georgia General Assembly ratified the Fourteenth Amendment, allowing re-admittance into the Union. Though this amendment granted citizenship to blacks, the House of Representatives and Senate of Georgia soon removed the black members from the Assembly. On what grounds did the state lawmakers claim to remove these members?

Answers

The answer is The state constitution did not recognize blacks' rights to hold public office

Answer:

The answer is The state constitution did not recognize blacks' rights to hold public office

Tides _____. have very short wave periods only happen when the Sun and moon are aligned are caused by Earth's rotation and wind circulation are caused by the gravitational pull of the moon and Sun

Answers

Tide Spring. Have very short wave periods only happen 
Tides are caused by the gravitational pull of the sun and the moon. The moon's pull produces two high tides on the opposite sides of the earth. Some places have a high tidal range. Twice a day the level of the sea will rise or come in and twice a day the level falls or it goes out. The difference in level between high and low water is known as the amplitude of the tide. Winds and the earth's rotation cause regular ocean waves.

Why "passwd," "chsh," "su," and "sudo" commands need to be set-uid programs?

Answers

Final answer:

The commands passwd, chsh, su, and sudo need to be set-uid programs in Linux to execute with superuser privileges, as their functions change system settings and require access to files that regular users typically do not have permission to edit.

Explanation:

The commands passwd, chsh, su, and sudo need to be set-uid programs because they require higher privileges than those usually granted to regular users. In Linux, the User ID (UID) is assigned to every user, and the set-uid is a permission bit that allows the users to exec commands with the permissions of the file owner.

Therefore, they need to be set-uid so that they can execute with superuser privileges, regardless of who invokes these commands.

For example, the passwd command changes the user's password, which requires writing to the system files that are normally only editable by the root. Similarly, the chsh command changes the default shell of a user, su command is used for switching to another user account, and the sudo command allows users to run programs with the security privileges of another user (usually the superuser).

All of these operations would fail without the set-uid bit because they require higher permissions than regular users are granted in Linux.

Learn more about set-uid programs here:

https://brainly.com/question/6437006

#SPJ12

The passwd, chsh, su, and sudo commands must be Set-UID programs to perform their respective functions with the necessary root privileges. Without Set-UID, users would be unable to change passwords, modify login shells, or execute commands with elevated permissions, impairing system and user management.

Understanding Set-UID for System Commands

The passwd, chsh, su, and sudo commands need to be Set-UID programs to perform their intended functions with the necessary permissions. Here’s why:

1. passwd

This command allows a user to change their password. It needs to write to the system's password file, which is typically owned by the root user. If passwd is not a Set-UID program, regular users would not have the permissions to modify their passwords, as they cannot write to the password file directly.

2. chsh

This command allows users to change their login shell. Similar to passwd, this requires modifications to system files that a normal user cannot directly access. Set-UID enables the command to execute with root privileges, ensuring the changes can be applied system-wide.

3. su

The su command is used to switch users, often to the superuser (root). To change the active user’s privileges, it must be able to authenticate and assume another user's identity, which necessitates higher privileges.

4. sudo

The sudo command allows permitted users to execute a command as the superuser or another user, as specified by the security policy. Without Set-UID, sudo would not be able to grant the necessary elevated permissions required for such operations.If these commands were not Set-UID programs, users would be unable to change their own passwords, modify their login shells, or execute commands with higher privileges, leading to significant limitations in managing their system and user accounts.

Full Question:
1. Figure out why "passwd," "chsh," "su," and "sudo" commands need to be Set-UID programs. What will happen if they are not? If you are not familiar with these commands, you should first learn about them by reading their manuals (For example man su, man chsh, etc.).

​selena weeds her garden while thinking about what she will wear to her daughter's graduation ceremony. what brain network is engaged while selena daydreams?

Answers

The answer is the default network. It is the brain network responsible of engaging Selena’s daydream in which made her think about her daughter of what will her daughter wear for graduation as she weeds her garden in their home.

Answer:

WOW WOW WOW ME DID NOT KNOW THAT!!!!!!!!

Explanation:

ME DID NOT KNOW THAT!

lol :(

Which check on power is detailed in this excerpt of the U.S. Constitution? 1 Power to negotiate treaties 2 Power to impeach the President 3 Power to override presidential vetoes 4 Power to declare laws unconstitutional

Answers

I think it would be 2 power to impeach the president
Final answer:

The check on power given in the provided excerpt of the U.S. Constitution revolves around the power to impeach the President, which is a responsibility held by the House of Representatives. This power is an integral part of the system of checks and balances defined by the U.S. Constitution to diffuse power and prevent its misuse.

Explanation:

The check on power described in the given excerpt is related to the power to impeach the President. In the U.S. Constitution, this power is granted to the House of Representatives, which can impeach or formally accuse federal officials, including the President, of wrongdoing. While this is the first step, the second step, namely the trial and removal from office, happens in the U.S. Senate. This process is designed to ensure a balance of powers and prevent misuse of authority.

Under the system of checks and balances in the U.S. Constitution, different branches of government have powers to check and limit each other. As per the excerpt, some of the key powers Congress has as checks over the executive branch include the power to introduce legislation, Senate's ultimate decision on Presidential nominations and treaties, and the ability of the House to impeach the President.

Thus, the check on power detailed here is effectively a way to balance the Executive Branch's power and ensure that there is no concentration of unchecked power in the hands of a single individual or entity.

Learn more about Power to Impeach the President here:

https://brainly.com/question/34184021

#SPJ3

__________ have a weakness of being difficult to follow when multiple paths exist, but __________ are more helpful in the hands-on task of managing the 1project.

Answers

the answer to this question is Gantt charts, networks
The gnantt cahrts is one of the most common method in arranging group schedules within a certain organization.
These charts usually includes several elements such as date of the project, budget flow, and persons that are in-charge for each projects

Oger is fascinated with learning the meanings of words. roger has a keen interest in

Answers

the answer to this question is semantics
semantics refers to a branch of linguistic process that focused on finding the literal meaning of certain words.
Learning semantics could influence a person in their interpretation of the words that most people do not even notice in their every day life.

Which reason best explains why the British took control of New Amsterdam?

A. They wanted the wealth that came from trade.
B. They feared conflict with the Dutch over trade routes.
C. They wanted to expand their religious influence in America.
D. They wanted Peter Stuyvesant to remain as governor.

Answers

They wanted the wealth that came from trade.
Final answer:

The British seized control of New Amsterdam to exploit the wealth generated from its strategic trading position at the mouth of the Hudson River.

Explanation:

The British took control of New Amsterdam primarily because of reason A. They wanted the wealth that came from trade. New Amsterdam was a prosperous trading port, strategically located at the mouth of the Hudson River. This position provided access to fur trade from the interior regions and beneficial connections to the Atlantic sea routes. The British, realizing the potential wealth, decided to take over the Dutch colony to exploit these advantages for their own benefit. None of the other reasons listed would justify the significant effort required for such an action: no major conflict with the Dutch was imminent, the British state and religion were already significantly established in the Americas, and Peter Stuyvesant was indeed removed as governor upon British takeover.

Learn more about British takeover of New Amsterdam here:

https://brainly.com/question/29216247

#SPJ3

_____ refers to the personal relevance toward, or interest in, a particular product.
a. attentiveness

Answers

the answer to this question is Product Involvement
Product Involvement Will definitely determine how committed a certain consumer is toward a certain brain.
This loyalty tend to make consumers become bias in their product analysis and will naturally assume that every product with that certain brand will always the best compared to other brands

What can be said about the Babylonian’s attitude towards the value of human life ?

Answers

They think mortal flesh is just upon this earth and the after life is where everyone would go when they died so.. They didn't care for life

Answer: Gods above us, all thanks to Hammurabi.

Explanation: We should remember/know that Hammurabi bringed with him a polyteist system of religion. Which means that there were several of Gods in the Babylonian empire. All of them were considered ruthless, evil, cruel. Centuries in the past there were religions that cast th existence of one single God, on solo. And their lifestyle were very radical in terms of religion. Now just try to imagine the human value that Babylonians had on their own...

The trophic structure of a community concerns the ________ relationships among the various species making up the community.

Answers

Trophic Structure - The feeding relationships among various species of a community. ... The variety ofspecies that make up a community; concerns both species ...

Social behavior between animals where the actor benefits at the expense of the recipient is called ________.

Answers

This is called, selfishness

all of the following issues and events challenged george washington and the new nation during his presidency except..
a. creating a written plan for the new government
b. putting the nations finances in order
c. the creation of an independent judiciary
d. providing for individual liberties

Answers

The answer is "creating a written plan for the new government".

Because on November 15, 1777, the Congress took the Articles of Confederation as the first constitution of the United States and that is the reason why this was not considered much of a challenge for George Washington and the new nation during his presidency 

George Washington faced many challenges during his presidency, but creating a written plan for the new government was not one of them as the Constitution had already been established. His major challenges included setting the nation's finances, establishing an independent judiciary, and ensuring individual liberties through the Bill of Rights.

All of the following issues and events challenged George Washington and the new nation during his presidency except creating a written plan for the new government. When George Washington took office, the Constitution had already been written and ratified, which served as the written plan for the new government. His presidency focused on challenges like:

Putting the nation's finances in order, where Alexander Hamilton played a significant role as the first Secretary of the Treasury.

The creation of an independent judiciary, which was established under the Judiciary Act of 1789.

Providing for individual liberties, which was addressed with the adoption of the Bill of Rights.

Therefore, the correct answer to the question is option (a) creating a written plan for the new government.

Businessmen who committed exploitative acts were labeled _____ by
e.
a. ross in sin and society.

Answers

Businessmen who committed exploitative acts were labeled "economic sinners" by Ross in "Sin and Society."

In his book "Sin and Society," Ross identified certain unethical or exploitative behaviors in business as "economic sins," akin to moral transgressions in a religious context. By labeling businessmen who engaged in exploitative acts as "economic sinners," Ross aimed to highlight the moral dimensions of economic behavior and underscore the importance of ethical conduct in business practices. This classification served to emphasize the negative societal implications of such behaviors and encouraged individuals and institutions to uphold moral standards in their economic activities. Overall, Ross's characterization aimed to provoke reflection and promote accountability among businessmen, urging them to consider the ethical implications of their actions within the broader framework of societal values and norms.

The failed telnet connection produces more matches to the explicit deny ace than a successful one. why do you think this happens?

Answers

Final answer:

The failed telnet connection produces more matches to the explicit deny ace than a successful one because it is typically evaluated before the other rules in the access-control list (ACL). This happens because the explicit deny ace is closer to the top of the ACL.

Explanation:

The failed telnet connection produces more matches to the explicit deny ace than a successful one because the explicit deny ace is typically closer to the top of the access-control list (ACL), therefore evaluated first. An ACL is a set of rules that determine whether a network packet should be allowed or denied. When a telnet connection fails, it is likely because it violates one of the rules in the ACL, triggering the explicit deny ace.

For example, let's say the explicit deny ace in the ACL specifies that telnet connections from a certain IP address range should be denied. When a telnet connection is attempted from one of those IP addresses, it will match the explicit deny ace and be denied immediately, without further evaluation of the remaining rules. In contrast, a successful telnet connection will not match any explicit deny ace, allowing it to proceed to the next rule in the ACL, which may be an explicit permit ace that allows the connection.

When psychologists conduct a study, the group of participants chosen for the study is referred to as the?

Answers

test subject or subject

When psychologists conduct a study, the group of participants chosen for the study is referred to as the subject. The subject could be a group of people or a single individual.  

 

EXPLANATION:  

When doing or conducting research, psychologist usually includes a group of participants of a single individual as the subject of the study or research. Psychologists usually make a list of requirements about the subject needed for the research. For example, if a psychologist wants to analyze the behavior of student age 17-19, a group of participants age 17-19 is chosen. Yet, if a psychologist wants to conduct research about adult behavior in the workplace, a group of workers will be chosen.  

Psychologists also make research designs based on the study that they want to conduct. For example:

• Retrospective cohort study: where subjects are chosen first, then data are collected.

• Prospective cohort study: where subjects are recruited before the proposed effects are occurred or administrated.  

• Cross-sectional study: where the subjects are taken from a population or sample on all proposed measures in time.  

• Longitudinal study: subjects are chosen and studied at multiple time.  

Psychologists also choose whether they want to conduct a qualitative or quantitative study. If they want to conduct a qualitative study, the results or findings are presented in sentences, not statistical or other mathematical methods. Yet, if they want to conduct a quantitative study, the findings or results will be in the form of mathematical modelling and statistical inference or statistical estimation.  

LEARN MORE:  

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

1. The _____ approach to psychology views the mind as an active and aware problem-solving system. this view contrasts with the _____ approach to psychology, which focuses on an organism's visible interactions with the environment https://brainly.com/question/8215522  

2. Neuroscience studies are based on the _____ approaches to psychology https://brainly.com/question/4741214  

KEYWORDS: subject in psychology, a group of participants, subject,  

Subject: Social Studies

Class: College  

Sub-chapter: Psychology research  

A survey is ________ if it produces identical results when repeated. a survey is ________ if it measures what it's intended to measure. select one:
a. reliable; utile
b. valid; reliable v. valid; intentional
d. reliable; valid

Answers

A survey would be reliable if it had the same results, because then it would have been proven time and time again that it is credible. It is valid when it measures to what it intends to measure, because if it didn't, how would it be valid? In order for it to be valid, it has to make sense and measure what it intends to measure. The answer is D: reliable; valid. 

Why did Alexander Hamilton, as Washington's first secretary of treasury, advocate the creation of a permanent national debt and a national bank?

Answers

He wanted to create a National Bank in order to have a safe place for federal funds in order to reduce national debt. Hope this helps!

What caused the West African kingdom of Ghana to grow powerful, wealthy, and to incorporate Islamic values and ideas in its society and government?

Answers

control of the gold-salt trade routes- i believe so not sure for sure but i put this answer.
gold salt and trade route!!!

What is social structure? what are two of the building blocks that help make up social structure?

Answers

Social structure refers to the idea of how society and the inherent interactions are established and develop, and includes all components of social institutions and others. Two foremost building blocks of social structure include that of social roles, and status.

Amanda sees herself as a member of the "purple team" and describes herself as family-oriented, attributes she perceives to be shared with other members of the "purple team" and as simultaneously differentiating the purple team from the rival "gold team," whom she sees as more competitive. this example illustrates the

Answers

This example illustrates a social identity level. A social identity occurs when an individual defined who or what he or she is on a specific group that he or she is in or belongs to; it could be seen in the scenario above as Amanda differentiates the two teams.

Other Questions
please help i have a exam tomorrow............. Identify supporting evidence that supports the theme that a mother/daughter relationship can be difficult.The narrator feels her mother forgets about her, and that is why she is often late.Her mother embarrasses the narrator, so she lies to the piano teacher about her.The narrator feels her sister gets the majority of their mothers attention.The narrator feels her mother always attacks her without reason. one way in which the code of hammurabi, the twelve tables, and the Justinian code are similar is that each who is nancy hart i dont get who she id According to Mexican law, immigrants had to meet all of the following requirements except ? Cindy has 26 nickels. She is getting rolls of nickels from the bank. She has enough money to get up to 10 rolls of nickels and each roll contains 40 nickels. The bank will not give partial rolls. The function that models the number of nickels Cindy will have after leaving the bank is f(r)=40r+26, where r is the number of rolls of nickels she gets.What is the practical domain of the function?all real numbersr>1all integers from 1 to 10, inclusive{66,106,146,186,226,266,306,346,386,426} Zwingli preached in:A Zurich, SwitzerlandB Athens, GreeceC Rome, ItalyD London, England __________ contracts are called __________ because no formalities are required in making them How does the bolded figurative language add meaning to the scene that Mark Antony is describing?And bowed like bondmen1, kissing Caesars feeta)The figurative language creates a visual image of the betrayal of the conspirators: they feigned respect for Caesar only to stab him to death.b)The figurative language uses a fact-based definition of the relationship between Caesar and the conspirators: they were his slaves and servants in his household.c)The figurative language shows the audience the conflict between Brutus and Cassius.d)The figurative language explains the conflict between Mark Antony and Caesar What does a negative projected ending inventory value mean? scm? Which of these triangle pairs can be mapped to each other using a single reflection? 2. What does the upper number of a time signature indicate? (1 point) Andre and Sally are playing a number game. Andre tells Sally, "I'm thinking of a number between 1 and 20. If I take the number and add 5, and then subtract 3, I get 19." What number is Andre thinking of? In ________ reinforcement, the person or animal is not reinforced every time a desired behavior is performed. Large families may suffer from _______________________ when resources are spread too thin A washer and a dryer cost $1013 combined. the washer costs $63 more than the dryer. what is the cost of the dryer? The federal agency that tracks information on occupational titles for public health and other industries has which initials? Assume f(x) = g(x). Which of the following two functions may be used to represent the function 3x = x 4? *1 pointA) f(x) = 3x, g(x) = x 4B) f(x) = x 7, g(x) = x 4/3C) f(x) = 3x, g(x) = 3xD) f(x) = 7, g(x) = 3x For which purpose would you use the SEE method?A. to help you evaluate your final draftB. to extend and elaborate upon your essay topicC. to help classmates rate the quality of your essayD. to help you generate a topic Which femoral structure is located at the distal end of the medial supracondylar ridge? At the doctor's office a device is placed on Dawn's stomach and she can hear her unborn child's heartbeat at five weeks gestation. Dawn's unborn child is in the ________ stage of prenatal development. Steam Workshop Downloader