answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
2 years ago
15

Fiona is drawing polygons on a computer. She wants to map a regular 9-sided polygon back onto itself using a reflection. Which s

et of lines can Fiona choose from for her line of reflection?. A) any line passing through the center of the polygon
B) any perpendicular bisector of one of the sides

C) any line joining the midpoints of any two sides

D) any line parallel to a side of the polygon
Computers and Technology
2 answers:
Airida [17]1 year ago
8 0
The set of lines that Fiona can choose from for her line of reflection is B) any perpendicular bisector of one of the sides. 
Rus_ich [418]2 years ago
4 0
The answer is "<span>B) any perpendicular bisector of one of the sides".
</span>
We can define a line of reflection as the line in which a shape is reflected, or we can say that it is the mirror in which the shape is reflected. The line of reflection is the perpendicular bisector of any pair of corresponding points. If you want to join sets of corresponding points on the object and image, then the line of reflection will slice the lines framed down the middle.
You might be interested in
An author is preparing to send their book to a publisher as an email attachment. The file on their computer is 1000 bytes. When
Yakvenalex [24]

Answer:

See explanation

Explanation:

My explanation to the author is that:

The reduction in size of the attachment doesn't mean that some parts of the book (i.e. the attachment) has been deleted.

I'll also made him understand that the book will retain its original size and contents after downloading by the recipient of the mail.

6 0
2 years ago
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
2 years ago
It has been said that the quality of our relationships depends in large part on the quality of our
timurjin [86]

Answer:

people

Explanation:

6 0
2 years ago
In a survey of 7200 T.V. viewers, 40% said they watch network news programs. Find the margin of error for this survey if we want
olga_2 [115]

Answer:

Margin of Error=M.E= ± 0.0113

Explanation:

Margin of Error= M.E= ?

Probability that watched network news programs = p = 0.4

α= 95%

Margin of Error =M.E= zₐ/₂√p(1-p)/n

Margin of Error=M.E= ±1.96 √0.4(1-0.4)/7200

Margin of Error=M. E = ±1.96√0.24/7200

Margin of Error=M. E- ±1.96* 0.005773

Margin of Error=M.E= ±0.0113

The Margin of Error is the estimate of how much error is possible as a result of random sampling.

6 0
2 years ago
A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is loca
Damm [24]

Answer:

d)

Explanation:

The main limitation of simulations is that running a simulation requires a large number of observations to be collected before it can be used to explore a problem. In a real life situation there are thousands of variables to take into consideration which can drastically affect the way that the situation unfolds at any given time. Therefore, in order to replicate/simulate such a scenario all of these variables need to be taken into consideration. This data can take a large amount of time to observe and collect in order to implement into the simulation so that it provides an accurate depiction of the problem.

6 0
2 years ago
Other questions:
  • A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplic
    9·1 answer
  • Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
    15·2 answers
  • Which advertising medium has the widest reach on a global front?
    12·1 answer
  • With Voice over Internet Protocol (VoIP), _____. a. voicemails cannot be received on the computer b. call quality is significant
    6·1 answer
  • #Remember that Fibonacci's sequence is a sequence of numbers
    14·1 answer
  • Consider the following relationship involving two entities, students and classes:A student can take many classes. A class can be
    9·1 answer
  • __________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for part
    8·1 answer
  • If byte stuffing is used to transmit Data, what is the byte sequence of the frame (including framing characters)? Format answer
    6·1 answer
  • 3. Megan and her brother Marco have a side business where they shop at flea markets, garage sales, and estate
    9·1 answer
  • Arrays are described as immutable because they are two dimensional. are arranged sequentially. can be reordered. cannot be chang
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!