answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
1 year ago
15

Fiona is drawing polygons on a computer. She wants to map a regular 9-sided polygon back onto itself using a reflection. Which s

et of lines can Fiona choose from for her line of reflection?. A) any line passing through the center of the polygon
B) any perpendicular bisector of one of the sides

C) any line joining the midpoints of any two sides

D) any line parallel to a side of the polygon
Computers and Technology
2 answers:
Airida [17]1 year ago
8 0
The set of lines that Fiona can choose from for her line of reflection is B) any perpendicular bisector of one of the sides. 
Rus_ich [418]1 year ago
4 0
The answer is "<span>B) any perpendicular bisector of one of the sides".
</span>
We can define a line of reflection as the line in which a shape is reflected, or we can say that it is the mirror in which the shape is reflected. The line of reflection is the perpendicular bisector of any pair of corresponding points. If you want to join sets of corresponding points on the object and image, then the line of reflection will slice the lines framed down the middle.
You might be interested in
Match each function with its possible output.
mojhsa [17]
1.) B
2.) A
3.) D
4.) C
rand command returns a random number sqrt is going to return a decimal unless its a perfect square however the rand will not the now is quite obvious because it gives a time and date, while the other simply gives the date.
4 0
2 years ago
Read 2 more answers
Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and display them out t
Olin [163]

Answer:

A.  grep -E "(John|Bob)" salesemployees.csv

Explanation:

The grep command is used to search text. It searches the given file for lines containing a match to the given strings or words.

How to use Grep Command:

grep 'letter' filename – Search any line that contains word 'letter' in filename on Linux

grep -i 'Alphabet' file1 – A case-insensitive search for the word ‘Alphabet’ in Linux and Unix

grep -R 'root' . – Search all files in the current directory and in all of its subdirectories in Linux for the word ‘root’

8 0
2 years ago
Given an n-element array X, algorithm D calls algorithm E on each element X[i]. Algorithm E runs in O(i) time when it is called
krek1111 [17]

Answer:

O(n^2)

Explanation:

The number of elements in the array X is proportional to the algorithm E runs time:

For one element (i=1) -> O(1)

For two elements (i=2) -> O(2)

.

.

.

For n elements (i=n) -> O(n)

If the array has n elements the algorithm D will call the algorithm E n times, so we have a maximum time of n times n, therefore the worst-case running time of D is O(n^2)  

5 0
2 years ago
Mile markers appear as _____ green signs.
german

Answer:

A.Big,Rectangular

Explanation:

mile markers are sign on high ways they are green signs they are big and rectangular shape

6 0
1 year ago
Read 2 more answers
RFID tags are used in secure environments primarily due to the fact they are impossible to counterfeit.
denis23 [38]

Answer: True

Explanation:

 Yes, the given statement is true that the RFID tags are basically used in the secure system because it is impossible to counterfeit.

RFID basically stand for the radio frequency identification that provide a method to retrieve the data or information quickly from the system. It basically used as radio wave technology in which we can easily track the objects and people by using proper programmed data.

The tag is basically placed in the object for unique identification. There are basically two types of tags in the RFID that is active and passive.

4 0
1 year ago
Other questions:
  • Which of the following best describes the concept behind Web 2.0
    5·1 answer
  • Which of the following best defines the term cross-platform application?(A) A program used to coordinate data sharing among mult
    14·2 answers
  • Which one of the following is the best example of an authorization control? (a)- Biometric device (b)- Digital certificate (c)-A
    11·1 answer
  • In defining security implemention, what are the roles of the following committees. 1) gateway committee 2) project committee 3)
    8·1 answer
  • How would GIS, GPS, or remote sensing technology be used to evaluate the destruction caused by a tornado in Oklahoma?
    13·1 answer
  • A Color class has a method getColorName that returns a string corresponding to the common name for the color, e.g., yellow, blue
    11·1 answer
  • A bank in your town updates its customers’ accounts at the end of each month. The bank offers two types of accounts: savings and
    8·1 answer
  • The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is miss
    8·1 answer
  • In Python, parentheses are used in calculations where the order of operations affects the outcome. (5 points)
    9·1 answer
  • The hostel in which you plan to spend the night tonight offers very interesting rates, as long as you do not arrive too late. Ho
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!