Answer:
159.5mm³
Explanation:
What is area?Area is the total space taken up by a flat (2-D) surface or shape. The area is always measured in square units.
To solve this, we can split the shape into two separate shapes. We can do this by thinking of the shape as a square with a triangle attached.
The squares dimensions are 11m and 9m.
An expression you can use to solve for the area of a rectangle and the area of a triangle is:
(Length × width) = area of a rectangle.(Length × width) ÷ 2 = area of a triangle.To solve for the triangle's width, we can take the total width and subtract that by 9.
20 - 9 = 11So, the triangles dimensions are 11m by 11m.
The equation we can use to solve for the total area is:
(Area of rectangle + area of triangle)(11 × 9) + [(11 × 11)\(\frac{1}{2}\)](11 × 9) + (121 × \(\frac{1}{2}\))(11 × 9) + 60.599 + 60.5159.5Therefore, the area of the figure is 159.5m³.
How does a computer program use pixels to display an image?
Every image on your computer's screen is made up of pixels. A pixel is a tiny dot of color. ( proper ans: When the pixels are small enough, your brain merges them together into a single image.)
Answer:
Every image on your computer's screen is made up of pixels. A pixel is a tiny dot of color. When the pixels are small enough, your brain merges them together into a single image.
for more information please visit http://coredogs.com/lesson/how-computers-show-images.html#:~:text=Every%20image%20on%20your%20computer's,together%20into%20a%20single%20image.
which action taken by a teacher best illustrates a benefit digital learning
Cooperative learning, behaviour management, inquiry based instructions
Question # 4
Multiple Choice
is the notion of repurposing a common operation.
O polyhedron
O polytheism
O polyorientation
O polymorphism
Answer: polymorphism
polymorphism or D
Explanation:
trust I did it
Polymorphism is the notion of repurposing a common operation. The correct option is d.
What is polymorphism?Malware that is polymorphic has the potential to evade detection mechanisms that could harm the system. These detection methods might enable antivirus software.
In the context of genomics, polymorphism refers to the occurrence of two or more variant variants of a certain DNA sequence in various individuals or populations. A single nucleotide can vary in polymorphism, which is the most prevalent kind.
Polymorphism refers to the existence of various forms. Polymorphism can be simply defined as a message's capacity to be presented in multiple forms. An individual who can exhibit multiple traits at once is a real-world example of polymorphism.
Therefore, the correct option is d, polymorphism.
To learn more about polymorphism, refer to the link:
https://brainly.com/question/1238842
#SPJ5
which of the following cannot be coprighted (1 point)
A.books
B.inventions
C.videos
D.music
your company sells hundreds of large storage disk arrays every year that can be configured locally using a dedicated laptop. you travel between many customer sites providing maintenance and support to these laptops. it is your responsibility to ensure you have the necessary frus as you travel from site to site. at the very least, what type of frus will you keep on-hand?
As a technician traveling between multiple customer sites, it is your responsibility to ensure that you have the necessary Field Replaceable Units (FRUs) to provide maintenance and support to the laptops that are used for configuring large storage disk arrays.
The type of Field Replaceable UnitsThe minimum types of FRUs that you should keep on-hand are as follows:
Power adapters
Batteries
Hard drives
RAM cards
NIC cards
USB cables
AC power cords
Video adapters.
Some additional types of FRUs that you may consider keeping on-hand include the following:
Keyboard and mouseExternal drivesExternal chargersAdapters for different countriesWhile traveling between customer sites, it is essential to keep a well-stocked toolkit of spare parts and tools, so you are not caught without the necessary components to perform the required maintenance and support operations. Also, the tools used to install these components should be specialized tools that are necessary to maintain the configuration of large storage disk arrays.
Learn more about FRUs at
https://brainly.com/question/30628957
#SPJ11
A cat who climbed the tree, looks down at a dog at a 28 degree angle of depression if the dog is 34 meters from the base of the tree how high up in the tree is the cat
To determine the height of the cat in the tree, we can use trigonometry and the concept of angle of depression.
Angle of depression = 28 degreesDistance from the dog to the base of the tree = 34 metersWe can visualize a right triangle where the height of the tree is the opposite side, and the distance from the dog to the base of the tree is the adjacent side. The tangent function can be used to relate these sides:(angle) = opposite/adjacentIn this case, we have:tan(28 degrees) = height/34 metersTo solve for the height, we can rearrange the equation:height = tan(28 degrees) * 34 metersCalculating the height using this equation, we find:height ≈ 18.27 metersTherefore, the cat is approximately 18.27 meters high up in the tree.
learn more about determine here :
https://brainly.com/question/29898039
#SPJ11
a systems administrator is trying to harden an external facing dns server and wants to disable every port except for dns. which port should they leave open?
Since the systems administrator is trying to harden an external facing DNS server and wants to disable every port except for dns. the port should they leave open is 802.1X
What DNS server do you use?A server known as the Domain Name System (DNS) Server is used primarily for mapping hostnames for websites, such as example.com, to their corresponding Internet Protocol or IP addresses.
With 802.1x, you can gain secure access to almost any network port (wired or wireless). Actually, the 802.1x protocol isn't even a wireless protocol. It describes a method for port authentication that can be applied to nearly any network connection, whether wired or wireless.
Learn more about systems administrator from
https://brainly.com/question/27129590
#SPJ1
The clock sets the pace for all operations within the CPU.
Group of answer choices
True
False
Answer:false
Explanation:
your client has hired you to troubleshoot a network error. on inspection, it can be seen that the client has a static ip address, subnet mask, and default gateway all configured correctly. you open a browser to check the connection, and you can't get to a web page. you open a powershell window, ping the gateway, and ping 's public dns server, and everything is working. but you still can't navigate to websites. what kind of problem are you most likely to be experiencing?
Answer: Incorrect DNS
Explanation:
13. the purpose of specifying a postcondition is to a. specify the types of objects the method accepts. b. explain the method's end result, whether it is a return value or change in an object's state d. set the method's expectations before the method is executed with respect to the parameters or c. state the ret
The purpose of specifying a postcondition is to: b. Explain the method's end result, whether it is a return value or change in an object's state.
Postconditions are used to describe the end state of a method, and what the method will return or change in the object's state. It is important to specify a postcondition as it allows for a clear understanding of the end result of the method and can be used as a reference for other developers when using the same method. Furthermore, postconditions can be used to verify that the code is working correctly and producing the expected results.
The Importance of Establishing Postconditions for MethodsWhen developing software, methods are integral components for building efficient and effective code. Methods are used to carry out specific tasks, and each task should be carefully designed with clear postconditions in order to ensure the desired result. Postconditions are used to describe the end state of a method, and what the method will return or change in the object's state. Establishing postconditions for methods is essential for providing a clear understanding of the end result, as well as for verifying that the code is working correctly and producing the expected results.
Learn more about Postconditions for Methods :
https://brainly.com/question/14350790
#SPJ4
Two popular feedback formulas are?____________________ and ____________________
Answer:
negative and positive
Explanation:
You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
Answer:
Nevermind, I didn't get that this was for a computer.
Explanation:
To unhide the worksheets in a workbook. Choose View > Unhide from the Ribbon. The PERSONAL XLSB workbook and the book are hidden. After selecting the worksheet to reveal it, click OK.
What is a worksheet?Created in Excel, a workbook is a spreadsheet programme file. One or more worksheets can be found in a workbook. Cells in a worksheet (sometimes referred to as a spreadsheet) can be used to enter and compute data. Columns and rows have been used to arrange the cells.
Choose the worksheets you want to conceal. How to choose a worksheet.Click Format > under Visibility > Hide & Unhide > Hide Sheet on the Home tab.The same procedures must be followed, except choose Unhide to reveal worksheets.Therefore, steps are written above for unhiding a workbook.
To learn more about the worksheet, refer to the link:
https://brainly.com/question/15843801
#SPJ2
to see if data is performing above or below the website average, which report visualization should you choose? pivot view comparison view table view pie view
A Comparison view is the best visualization to determine if data is performing above or below the website average.
A Comparison view is the best visualization to determine if data is performing above or below the website average. This view allows you to compare different values side-by-side, providing an easy-to-understand visual representation of how the data is performing relative to the website average. The comparison view also gives you the ability to see any outliers or trends, which can help you identify areas of success or areas that need improvement.
Therefore, the correct answer is option B.
Learn more about the website average here:
https://brainly.com/question/21120350.
#SPJ4
"Your question is incomplete, probably the complete question/missing part is:"
To see if data is performing above or below the website average, which report visualization should you choose?
A) Pivot view
B) Comparison view
C) Table view
D) Pie view
News sources occasionally have to issue retractions, which are statements saying that they have made an error in their reporting. Does this eliminate
then as reliable news sources?
A. Yes, reliable sources always get it right the first time.
B. No, by correcting mistakes they are striving for accuracy.
C. Yes, it is better to hope that no one notices your mistakes.
D. No, making mistakes is a standard part of reporting the news.
The response to if this eliminate then as reliable news sources is option B: B. No, by correcting mistakes they are striving for accuracy.
What characteristics make a news source dependable?Transparency: Reputable news sources explicitly label opinion pieces as such, identify conflicts of interest, state where and how information was gathered for stories, and include links to relevant sources.
Therefore, one need to publishes factually correct content, verifies information, and fixes any inaccuracies. Employs trustworthy sources (people, evidence) and validates those sources and Present headlines that accurately summarize the content of the article; headlines should not exploit readers' emotions.
Learn more about reliable news sources from
https://brainly.com/question/24308310
#SPJ1
in a database, columns in a table are called rows records fields primary keys T/F?
The statement that in a database, columns in a table are called rows records fields primary keys is false.
What is the correct naming?In a database, another way to refer to columns is fields while rows are referred to as records.
Rows or records hold the complete information about an observation while columns have several pieces of information about observed data. So, another name for columns is fields while rows are called records.
Learn more about columns and rows here:
https://brainly.com/question/30039670
#SPJ1
An electric spreadsheet can perform all of the following tasks, except
A. Display information visually
B. Calculate data accurately
C. Plan worksheet objectives
D. Recalculate updated information
Answer:
C. Plan worksheet objectives
Explanation:
One of the advantages of communicating using social media is that you can use it to
a create a fake website
b promote and share your ideas
c push someone to do something he or she doesn't want to do
dshare your personal information
Answer:
b is correct because you can promote your ides others
Case 3: Mia earns a generous salary as a professor of veterinary medicine. She is usually busy and spends very little time at home. Due to a recent grant opportunity, she will move to a larger university that is located several hours away, but her grant is only guaranteed for two years at that university.
This is a financial decision problem. Mia should Lease. Buying a home is a long-term investment, and a two-year commitment is not enough time to see a return on the investment.
What is the justification for the above response?Since Mia's grant is only guaranteed for two years, it would not be wise for her to purchase a home.
Buying a home is a long-term investment that requires more than a two-year commitment to see a return on the investment. Additionally, buying a home comes with additional expenses such as property taxes, maintenance costs, and closing fees.
Leasing a home or apartment would provide Mia with a more flexible and cost-effective solution since she may have to move again after the two-year grant period.
Learn more about Financial Decisions at:
https://brainly.com/question/28500235
#SPJ1
Full Question:
Mia earns a generous salary as a professor of veterinary medicine. She is usually busy and spends very little time at home. Due to a recent grant opportunity, she will move to a larger university that is located several hours away, but her grant is only guaranteed for two years at that university. Should she buy or lease a home?
studying the discipline of information technology may lead to a job in which field?
o. Web development
o. Computer support
o. Machine learning
o. Hardware design
Answer:computer support
Explanation:
What is the default view in a Word document? (5 points)
Copy View
Editing View
Paste View
Reading View
Answer:
EDITING VIEWExplanation:
Although Microsoft word has several different ways you can view or edit your documents.1. Ubuntu comes with a wide range of software programs,
including Firefox and ______, which contains a word processor,
spreadsheet, and presentation functions.
2. This question relates to Ubuntu: The
1.Ubuntu comes with a wide range of software programs, including Firefox and LibreOffice, which contains a word processor, spreadsheet, and presentation functions.
2. The dock which shows your file explorer, your favorite programs, as well as those currently running, is located on the taskbar of the desktop.
Ubuntu is a Debian-based Linux distribution that consists mostly of free and open-source software. The three official editions of Ubuntu are Desktop Gadgets, Server Gadgets, Core for Robotics, and Internet of Things.
Each edition can be used on a single computer or in a virtual machine. With OpenStack support, Ubuntu is a popular cloud computing operating system.
To learn more on Ubuntu, here:
https://brainly.com/question/28477629
#SPJ4
Your question is incomplete, but most probably the complete question was,
1. Ubuntu comes with a wide range of software programs, including Firefox and ______, which contains a word processor, spreadsheet, and presentation functions.
2. This question relates to Ubuntu: The dock which shows your file explorer, your favorite programs, as well as those currently running, is located on the ____ of the desktop.
one important result of using an abc system is more accurate product costing. what is another important result of using an abc system?
ABC System stands for Activity-Based Costing System. It is used to allocate costs to products and services based on their usage. Apart from accurate product costing, another important result of using an ABC system is improved cost control.
What is an Activity-Based Costing System?Activity-Based Costing System (ABC System) is a costing system that assigns overheads to products and services based on their usage.
The activity-based costing system is used in contrast to the traditional costing system. It recognizes that the production of some products requires more activities than others, hence, it will assign more overheads to that product. This method is also called the 'cost driver.'
What is Cost Control?Cost control is the method that is used to manage the expenses that are incurred during a business operation. The primary aim of cost control is to minimize the expenses that are incurred by a business to increase profitability.
By using an ABC system, a business can easily identify the areas of the company that have excessive costs and may cut back on them.
In conclusion, an important result of using an ABC system is more accurate product costing and improved cost control.
Read more about the ABC system at https://brainly.com/question/31064932
#SPJ11
The US government appropriates less than one million dollars in funding each year to STEM education programs. True False
Answer:
False.
Explanation:
A STEM course typically comprises of science, technology, engineering and mathematics.
The US government appropriates more than one million dollars in funding each year to STEM education programs. The government of the United States of America create scholarship opportunities for its citizens in order to assist students develop a career in STEM-related field.
Educate to Innovate campaign is an example of STEM education programs developed and established by the US government to fund STEM education programs.
Answer: False
Explanation:
I have this assignment
I will be thankful I’d you help
The information used to explain the graph is known as chart title. Hence option B is correct.
What are statistical graphs?Statistical graphs are defined as a graphic representation of applied mathematical knowledge. To make it simpler to understand and interpret statistical data, a set of data is represented by statistical graphs.
A table chart is just another type of information presentation. In boxes or columns of the table, there are words, numbers, or a mix of the two. It depicts a group of facts and how they relate to one another.
Thus, the information used to explain the graph is known as statistical graphs.
To learn more about statistical graphs, refer to the link below:
https://brainly.com/question/28790913
#SPJ1
The internet of things is made up of a growing number of devices that collect and transfer data over the internet without human involvement. True or false?.
In the use of the Internet of Things, is a device whose job is to collect and transfer data over the internet without the involvement of humans. The statement is True.
What is Internet of Things?Internet of Things (IoT) is a system of interconnected computing devices, mechanical and digital machines, objects, animals, or people, each equipped with a unique identifier (UID) and capable of transmitting data. We need people-to-people connections, interpersonal, or between humans and computers.
Internet of Things has humans with implanted heart monitors, farm animals with biochip transponders, cars with built-in sensors that alert drivers when tire pressure is low, or whatever, natural or man-made. An object that can be assigned an Internet Protocol (IP) address and that can send data over a network.
Learn more about What is the Internet of Things all about here https://brainly.ph/question/1145028
#SPJ4
Nonces can be used in ________. all applications client/server applications time-insensitive applications persistent applications
Nonces, or "numbers used once," can be used in all applications, including client/server applications, time-insensitive applications, and persistent applications.
Nonces are unique values that are generated for each execution of a protocol and are typically used to protect against replay attacks. In client/server applications, nonces can prevent an unauthorized replay of a request. In time-insensitive applications, they provide security irrespective of time factors. In persistent applications, nonces help maintain data integrity over long durations. Despite their type, nonces are often used in cryptographic protocols, where they ensure that old communications cannot be reused in replay attacks. They're also used in authentication protocols to ensure the freshness of each session and to prevent repetition in the encryption process.
Learn more about nonces here:
https://brainly.com/question/32730017
#SPJ11
hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.
What should Chris do?
Click the above image
Ask the user to enter two numbers. The first number is for the multiplication table. The second number is the number of rows to display.
Use a for loop to print the table.
Answer:
Follows are the cdo0de to this question:
import java.util.*;//package
public class Table //defining class Table
{
public static void main(String[] asx)//main method
{
int x,y,i;//defining integer variables
Scanner bg=new Scanner(System.in);//creating Scanner class object
System.out.print("Enter first number: ");//print message
x=bg.nextInt();//input value
System.out.print("Enter Second number: ");//print message
y=bg.nextInt();//input value
for(i = 1; i <= y; i++)//defining for loop for print Table
{
System.out.printf("%d * %d = %d \n", x, i, x * i);//calculate and print table
}
}
}
Output:
Enter first number: 5
Enter Second number: 3
5 * 1 = 5
5 * 2 = 10
5 * 3 = 15
Explanation:
In the above code, three integer variable "x,y, and i" is declared, in which "x,y" variable is used to input value from the user end, and after input, the value the for loop is used, in which the second variable "y" count the rows, and "i, x" variable is used for calculates the multiplication of the table.
in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4
Answer:
c)4
Explanation:
Hope it could helps you
When logging into a website that uses a directory service, what command authenticates your username and password?.
Answer: Bind
Explanation: When you log into a website that uses a directory service, the website will use LDAP to check if that user account is in the user directories and that the password is valid.