any help on this??
not sure but simple question just never been good at these

Any Help On This?? Not Sure But Simple Question Just Never Been Good At These

Answers

Answer 1

Answer:

159.5mm³

Explanation:

What is area?

Area is the total space taken up by a flat (2-D) surface or shape. The area is always measured in square units.

To solve this, we can split the shape into two separate shapes. We can do this by thinking of the shape as a square with a triangle attached.

The squares dimensions are 11m and 9m.

An expression you can use to solve for the area of a rectangle and the area of a triangle is:

(Length × width) = area of a rectangle.(Length × width) ÷ 2 = area of a triangle.

To solve for the triangle's width, we can take the total width and subtract that by 9.

20 - 9 = 11

So, the triangles dimensions are 11m by 11m.

The equation we can use to solve for the total area is:

(Area of rectangle + area of triangle)(11 × 9) + [(11 × 11)\(\frac{1}{2}\)](11 × 9) + (121 × \(\frac{1}{2}\))(11 × 9) + 60.599 + 60.5159.5

Therefore, the area of the figure is 159.5m³.


Related Questions

How does a computer program use pixels to display an image?

Answers

Every image on your computer's screen is made up of pixels. A pixel is a tiny dot of color. ( proper ans: When the pixels are small enough, your brain merges them together into a single image.)

Answer:

Every image on your computer's screen is made up of pixels. A pixel is a tiny dot of color. When the pixels are small enough, your brain merges them together into a single image.

for more information please visit http://coredogs.com/lesson/how-computers-show-images.html#:~:text=Every%20image%20on%20your%20computer's,together%20into%20a%20single%20image.

which action taken by a teacher best illustrates a benefit digital learning

Answers

Cooperative learning, behaviour management, inquiry based instructions

Question # 4
Multiple Choice
is the notion of repurposing a common operation.
O polyhedron
O polytheism
O polyorientation
O polymorphism

Answers

Answer: polymorphism

polymorphism or D

Explanation:

trust I did it

Polymorphism is the notion of repurposing a common operation. The correct option is d.

What is polymorphism?

Malware that is polymorphic has the potential to evade detection mechanisms that could harm the system. These detection methods might enable antivirus software.

In the context of genomics, polymorphism refers to the occurrence of two or more variant variants of a certain DNA sequence in various individuals or populations. A single nucleotide can vary in polymorphism, which is the most prevalent kind.

Polymorphism refers to the existence of various forms. Polymorphism can be simply defined as a message's capacity to be presented in multiple forms. An individual who can exhibit multiple traits at once is a real-world example of polymorphism.

Therefore, the correct option is d, polymorphism.

To learn more about polymorphism, refer to the link:

https://brainly.com/question/1238842

#SPJ5

which of the following cannot be coprighted (1 point)

A.books
B.inventions
C.videos
D.music

Answers

I believe the answer is B.) Inventions because it doesn’t really fit in with the other options available.

your company sells hundreds of large storage disk arrays every year that can be configured locally using a dedicated laptop. you travel between many customer sites providing maintenance and support to these laptops. it is your responsibility to ensure you have the necessary frus as you travel from site to site. at the very least, what type of frus will you keep on-hand?

Answers

As a technician traveling between multiple customer sites, it is your responsibility to ensure that you have the necessary Field Replaceable Units (FRUs) to provide maintenance and support to the laptops that are used for configuring large storage disk arrays.

The type of Field Replaceable Units

The minimum types of FRUs that you should keep on-hand are as follows:

Power adapters

Batteries

Hard drives

RAM cards

NIC cards

USB cables

AC power cords

Video adapters.

Some additional types of FRUs that you may consider keeping on-hand include the following:

Keyboard and mouseExternal drivesExternal chargersAdapters for different countries

While traveling between customer sites, it is essential to keep a well-stocked toolkit of spare parts and tools, so you are not caught without the necessary components to perform the required maintenance and support operations. Also, the tools used to install these components should be specialized tools that are necessary to maintain the configuration of large storage disk arrays.

Learn more about FRUs at

https://brainly.com/question/30628957

#SPJ11

A cat who climbed the tree, looks down at a dog at a 28 degree angle of depression if the dog is 34 meters from the base of the tree how high up in the tree is the cat

Answers

To determine the height of the cat in the tree, we can use trigonometry and the concept of angle of depression.

Angle of depression = 28 degreesDistance from the dog to the base of the tree = 34 metersWe can visualize a right triangle where the height of the tree is the opposite side, and the distance from the dog to the base of the tree is the adjacent side. The tangent function can be used to relate these sides:(angle) = opposite/adjacentIn this case, we have:tan(28 degrees) = height/34 metersTo solve for the height, we can rearrange the equation:height = tan(28 degrees) * 34 metersCalculating the height using this equation, we find:height ≈ 18.27 metersTherefore, the cat is approximately 18.27 meters high up in the tree.

learn more about determine here :

https://brainly.com/question/29898039

#SPJ11

a systems administrator is trying to harden an external facing dns server and wants to disable every port except for dns. which port should they leave open?

Answers

Since the systems administrator is trying to harden an external facing DNS server and wants to disable every port except for dns. the port should they leave open is 802.1X

What DNS server do you use?

A server known as the Domain Name System (DNS) Server is used primarily for mapping hostnames for websites, such as example.com, to their corresponding Internet Protocol or IP addresses.

With 802.1x, you can gain secure access to almost any network port (wired or wireless). Actually, the 802.1x protocol isn't even a wireless protocol. It describes a method for port authentication that can be applied to nearly any network connection, whether wired or wireless.

Learn more about systems administrator from

https://brainly.com/question/27129590
#SPJ1

The clock sets the pace for all operations within the CPU.
Group of answer choices
True
False

Answers

Answer:false

Explanation:

your client has hired you to troubleshoot a network error. on inspection, it can be seen that the client has a static ip address, subnet mask, and default gateway all configured correctly. you open a browser to check the connection, and you can't get to a web page. you open a powershell window, ping the gateway, and ping 's public dns server, and everything is working. but you still can't navigate to websites. what kind of problem are you most likely to be experiencing?

Answers

Answer: Incorrect DNS

Explanation:

13. the purpose of specifying a postcondition is to a. specify the types of objects the method accepts. b. explain the method's end result, whether it is a return value or change in an object's state d. set the method's expectations before the method is executed with respect to the parameters or c. state the ret

Answers

The purpose of specifying a postcondition is to: b. Explain the method's end result, whether it is a return value or change in an object's state.

Postconditions are used to describe the end state of a method, and what the method will return or change in the object's state. It is important to specify a postcondition as it allows for a clear understanding of the end result of the method and can be used as a reference for other developers when using the same method. Furthermore, postconditions can be used to verify that the code is working correctly and producing the expected results.

The Importance of Establishing Postconditions for Methods

When developing software, methods are integral components for building efficient and effective code. Methods are used to carry out specific tasks, and each task should be carefully designed with clear postconditions in order to ensure the desired result. Postconditions are used to describe the end state of a method, and what the method will return or change in the object's state. Establishing postconditions for methods is essential for providing a clear understanding of the end result, as well as for verifying that the code is working correctly and producing the expected results.

Learn more about Postconditions for Methods :

https://brainly.com/question/14350790

#SPJ4

Two popular feedback formulas are?____________________ and ____________________

Answers

Answer:

negative and positive

Explanation:

You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.

Answers

Answer:

Nevermind, I didn't get that this was for a computer.

Explanation:

To unhide the worksheets in a workbook. Choose View > Unhide from the Ribbon. The PERSONAL XLSB workbook and the book are hidden. After selecting the worksheet to reveal it, click OK.

What is a worksheet?

Created in Excel, a workbook is a spreadsheet programme file. One or more worksheets can be found in a workbook. Cells in a worksheet (sometimes referred to as a spreadsheet) can be used to enter and compute data. Columns and rows have been used to arrange the cells.

Choose the worksheets you want to conceal. How to choose a worksheet.Click Format > under Visibility > Hide & Unhide > Hide Sheet on the Home tab.The same procedures must be followed, except choose Unhide to reveal worksheets.

Therefore, steps are written above for unhiding a workbook.

To learn more about the worksheet, refer to the link:

https://brainly.com/question/15843801

#SPJ2

to see if data is performing above or below the website average, which report visualization should you choose? pivot view comparison view table view pie view

Answers

A Comparison view is the best visualization to determine if data is performing above or below the website average.

A Comparison view is the best visualization to determine if data is performing above or below the website average. This view allows you to compare different values side-by-side, providing an easy-to-understand visual representation of how the data is performing relative to the website average. The comparison view also gives you the ability to see any outliers or trends, which can help you identify areas of success or areas that need improvement.

Therefore, the correct answer is option B.

Learn more about the website average here:

https://brainly.com/question/21120350.

#SPJ4

"Your question is incomplete, probably the complete question/missing part is:"

To see if data is performing above or below the website average, which report visualization should you choose?

A) Pivot view

B) Comparison view

C) Table view

D) Pie view

News sources occasionally have to issue retractions, which are statements saying that they have made an error in their reporting. Does this eliminate
then as reliable news sources?
A. Yes, reliable sources always get it right the first time.
B. No, by correcting mistakes they are striving for accuracy.
C. Yes, it is better to hope that no one notices your mistakes.
D. No, making mistakes is a standard part of reporting the news.

Answers

The response to if this eliminate then as reliable news sources is option B: B. No, by correcting mistakes they are striving for accuracy.

What characteristics make a news source dependable?

Transparency: Reputable news sources explicitly label opinion pieces as such, identify conflicts of interest, state where and how information was gathered for stories, and include links to relevant sources.

Therefore, one need to publishes factually correct content, verifies information, and fixes any inaccuracies. Employs trustworthy sources (people, evidence) and validates those sources and Present headlines that accurately summarize the content of the article; headlines should not exploit readers' emotions.

Learn more about reliable news sources from

https://brainly.com/question/24308310
#SPJ1

in a database, columns in a table are called rows records fields primary keys T/F?

Answers

The statement that in a database, columns in a table are called rows records fields primary keys is false.

What is the correct naming?

In a database, another way to refer to columns is fields while rows are referred to as records.

Rows or records hold the complete information about an observation while columns have several pieces of information about observed data. So, another name for columns is fields while rows are called records.

Learn more about columns and rows here:

https://brainly.com/question/30039670

#SPJ1

An electric spreadsheet can perform all of the following tasks, except
A. Display information visually
B. Calculate data accurately
C. Plan worksheet objectives
D. Recalculate updated information

Answers

Answer:

C. Plan worksheet objectives

Explanation:

One of the advantages of communicating using social media is that you can use it to

a create a fake website
b promote and share your ideas
c push someone to do something he or she doesn't want to do
dshare your personal information

Answers

Answer:

b is correct because you can promote your ides others

Case 3: Mia earns a generous salary as a professor of veterinary medicine. She is usually busy and spends very little time at home. Due to a recent grant opportunity, she will move to a larger university that is located several hours away, but her grant is only guaranteed for two years at that university.

Answers

This is a financial decision problem. Mia should Lease. Buying a home is a long-term investment, and a two-year commitment is not enough time to see a return on the investment.

What is the justification for the above response?

Since Mia's grant is only guaranteed for two years, it would not be wise for her to purchase a home.

Buying a home is a long-term investment that requires more than a two-year commitment to see a return on the investment. Additionally, buying a home comes with additional expenses such as property taxes, maintenance costs, and closing fees.

Leasing a home or apartment would provide Mia with a more flexible and cost-effective solution since she may have to move again after the two-year grant period.

Learn more about Financial Decisions at:

https://brainly.com/question/28500235

#SPJ1

Full Question:

Mia earns a generous salary as a professor of veterinary medicine. She is usually busy and spends very little time at home. Due to a recent grant opportunity, she will move to a larger university that is located several hours away, but her grant is only guaranteed for two years at that university. Should she buy or lease a home?

studying the discipline of information technology may lead to a job in which field?

o. Web development
o. Computer support
o. Machine learning
o. Hardware design​

Answers

Answer:computer support

Explanation:


What is the default view in a Word document? (5 points)
Copy View
Editing View
Paste View
Reading View

Answers

Answer:

EDITING VIEW

Explanation:

Although Microsoft word has several different ways you can view or edit your documents.
The Default View is Editing View.

1. Ubuntu comes with a wide range of software programs,
including Firefox and ______, which contains a word processor,
spreadsheet, and presentation functions.
2. This question relates to Ubuntu: The

Answers

1.Ubuntu comes with a wide range of software programs, including Firefox and LibreOffice, which contains a word processor, spreadsheet, and presentation functions.

2. The dock which shows your file explorer, your favorite programs, as well as those currently running, is located on the taskbar of the desktop.

Ubuntu is a Debian-based Linux distribution that consists mostly of free and open-source software. The three official editions of Ubuntu are Desktop Gadgets, Server Gadgets, Core for Robotics, and Internet of Things.

Each edition can be used on a single computer or in a virtual machine. With OpenStack support, Ubuntu is a popular cloud computing operating system.

To learn more on Ubuntu, here:

https://brainly.com/question/28477629

#SPJ4

Your question is incomplete, but most probably the complete question was,

1. Ubuntu comes with a wide range of software programs, including Firefox and ______, which contains a word processor, spreadsheet, and presentation functions.

2. This question relates to Ubuntu: The dock which shows your file explorer, your favorite programs, as well as those currently running, is located on the ____ of the desktop.

one important result of using an abc system is more accurate product costing. what is another important result of using an abc system?

Answers

ABC System stands for Activity-Based Costing System. It is used to allocate costs to products and services based on their usage. Apart from accurate product costing, another important result of using an ABC system is improved cost control.

What is an Activity-Based Costing System?

Activity-Based Costing System (ABC System) is a costing system that assigns overheads to products and services based on their usage.

The activity-based costing system is used in contrast to the traditional costing system. It recognizes that the production of some products requires more activities than others, hence, it will assign more overheads to that product. This method is also called the 'cost driver.'

What is Cost Control?

Cost control is the method that is used to manage the expenses that are incurred during a business operation. The primary aim of cost control is to minimize the expenses that are incurred by a business to increase profitability.

By using an ABC system, a business can easily identify the areas of the company that have excessive costs and may cut back on them.

In conclusion, an important result of using an ABC system is more accurate product costing and improved cost control.

Read more about the ABC system at https://brainly.com/question/31064932

#SPJ11

The US government appropriates less than one million dollars in funding each year to STEM education programs. True False

Answers

Answer:

False.

Explanation:

A STEM course typically comprises of science, technology, engineering and mathematics.

The US government appropriates more than one million dollars in funding each year to STEM education programs. The government of the United States of America create scholarship opportunities for its citizens in order to assist students develop a career in STEM-related field.

Educate to Innovate campaign is an example of STEM education programs developed and established by the US government to fund STEM education programs.

Answer: False

Explanation:

I have this assignment

I will be thankful I’d you help

I will be thankful Id you help

Answers

The information used to explain the graph is known as chart title.  Hence option B is correct.

What are statistical graphs?

Statistical graphs are defined as a graphic representation of applied mathematical knowledge. To make it simpler to understand and interpret statistical data, a set of data is represented by statistical graphs.

A table chart is just another type of information presentation. In boxes or columns of the table, there are words, numbers, or a mix of the two. It depicts a group of facts and how they relate to one another.

Thus, the information used to explain the graph is known as statistical graphs.

To learn more about statistical graphs, refer to the link below:

https://brainly.com/question/28790913

#SPJ1

The internet of things is made up of a growing number of devices that collect and transfer data over the internet without human involvement. True or false?.

Answers

In the use of the Internet of Things, is a device whose job is to collect and transfer data over the internet without the involvement of humans. The statement is True.

What is Internet of Things?

Internet of Things (IoT) is a system of interconnected computing devices, mechanical and digital machines, objects, animals, or people, each equipped with a unique identifier (UID) and capable of transmitting data. We need people-to-people connections, interpersonal, or between humans and computers.

Internet of Things has humans with implanted heart monitors, farm animals with biochip transponders, cars with built-in sensors that alert drivers when tire pressure is low, or whatever, natural or man-made. An object that can be assigned an Internet Protocol (IP) address and that can send data over a network.

Learn more about What is the Internet of Things all about here https://brainly.ph/question/1145028

#SPJ4

Nonces can be used in ________. all applications client/server applications time-insensitive applications persistent applications

Answers

Nonces, or "numbers used once," can be used in all applications, including client/server applications, time-insensitive applications, and persistent applications.

Nonces are unique values that are generated for each execution of a protocol and are typically used to protect against replay attacks. In client/server applications, nonces can prevent an unauthorized replay of a request. In time-insensitive applications, they provide security irrespective of time factors. In persistent applications, nonces help maintain data integrity over long durations. Despite their type, nonces are often used in cryptographic protocols, where they ensure that old communications cannot be reused in replay attacks. They're also used in authentication protocols to ensure the freshness of each session and to prevent repetition in the encryption process.

Learn more about nonces here:

https://brainly.com/question/32730017

#SPJ11

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

Click the above image
Ask the user to enter two numbers. The first number is for the multiplication table. The second number is the number of rows to display.

Use a for loop to print the table.

Click the above imageAsk the user to enter two numbers. The first number is for the multiplication table.

Answers

Answer:

Follows are the cdo0de to this question:

import java.util.*;//package  

public class Table //defining class Table

{

   public static void main(String[] asx)//main method  

   {

       int x,y,i;//defining integer variables

       Scanner bg=new Scanner(System.in);//creating Scanner class object

       System.out.print("Enter first number: ");//print message  

       x=bg.nextInt();//input value

       System.out.print("Enter Second number: ");//print message

       y=bg.nextInt();//input value

       for(i = 1; i <= y; i++)//defining for loop for print Table

       {

           System.out.printf("%d * %d = %d \n", x, i, x * i);//calculate and print table

       }

   }

}

Output:

Enter first number: 5

Enter Second number: 3

5 * 1 = 5  

5 * 2 = 10  

5 * 3 = 15

Explanation:

In the above code, three integer variable "x,y, and i" is declared, in which "x,y" variable is used to input value from the user end, and after input, the value the for loop is used, in which the second variable "y" count the rows, and "i, x" variable is used for calculates the multiplication of the table.  

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

When logging into a website that uses a directory service, what command authenticates your username and password?.

Answers

Answer: Bind

Explanation: When you log into a website that uses a directory service, the website will use LDAP to check if that user account is in the user directories and that the password is valid.

Other Questions
Order from least to greatest. 7 2/6, 7 7/11, 3 10/13 Exposure compensation of EV +1 means the image will be:1 stop darker1/3 stop darker1/3 stop brighter1 stop brighter based on the balance sheets above for three different banks, which of the following is true, if the reserve requirement is 10 percent? (a) bank a has no excess reserves. (b) bank b has no excess reserves. (c) bank b can increase its loans by $500. (d) bank b can increase its loans by $40. (e) bank c has excess reserves. Please helpppp with my chemistry homework what force acts between earth and the moon To the nearest tenth, find the area of a circle with d = 15km. Use 3.14 for . Remember: you must find the radius before you use the formula Write the equation of the line with x-intercept -2 and y-intercept -1 in slope-intercept form Antonym for eliminate? The brutal policy of ethnic cleansing was most widely used against a. Bosnian Serbs. b. Croatia's Serbian minority. c. Slovenes. d. Bosnian Muslims. Breonna creates 4 diagrams to show the relationship among triangles. Which diagram best organizes triangles by their properties? Assuming two hikers begin at a trail start, which scenarios must be true based on the table? Check all that apply. Melissa and Corey started on different trails. Melissa hiked up the trail for a longer period of time than Corey. Melissa and Corey crossed paths between 60 and 90 minutes. Corey began his descent before Melissa. As Melissas time increased from 0 to 60 minutes, her elevation decreased. write a paragraph about What qualities make someone a good friend? The average of six numbers is 7. If two of the six numbers are removed, the average of the remaining numbers is 8. What is the sum of the two numbers which were removed? salaries and wages payable is credited for the gross earnings of the companys employees. true false intermediate sanctions are a viable solution to prison overcrowding. who are the most likely candidates for intermediate sanctions? the base of a right prism has an area of 10 square feet. the height of the prism is 6 feet. what is its volume? (a) (4, -4) (i) Find polar coordinates (r, ) of the point, where r> 0 and se < 21. (r, 0) = (ii) Find polar coordinates (r, o) of the point, where r < 0 and 0 se < 2t. (r, 0) = (b) (-1, 3) (0) Find po QUESTION 3 The 1H signal NMR corresponding to the hydrogen atoms on position d are more downfield than the 1H NMR signal that corresponds to the hydrogen atoms on position c. (1 pt) True False What is an example of a Jim Crow law passed in the South?A. White women could not work in hospitals that treated black patients.B. Whites could not marry nonwhites.C. A black person could not cut a white woman's hair.D. All of the above Which limitations on women in the late nineteenth and early twentieth centuries do you consider to be unfair? Check any of the boxes that apply. no voting rights no property ownership rights no access to formal and/or higher education no choice in fashion (e.g., forced to wear corsets; not allowed to wear pants) no career choices other than wife and mother