1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
3 years ago
5

Thomas is using a drawing program to complete a construction. Which construction could he be completing? (5 points).

Computers and Technology
2 answers:
JulsSmile [24]3 years ago
8 0
Based on the image of a cartesian plane shown, that is a part of constructing a square inscribed in a circle. You can view the image attached to this answer to see the full construction. So that answer is B from the choices:
<span>a. An equilateral triangle inscribed in a polygon
b. A square inscribed in a circle
c. A regular pentagon inscribed in a polygon
d. A regular hexagon inscribed in a polygon</span>

Ksju [112]3 years ago
4 0

I had this question too, it was Inscribing a square in a circle

You might be interested in
Slide rule was the first mechanical calculator. true or false​
drek231 [11]

Answer:

False. Pascal's calculator was the first mechanical calculator invented by Blaise Pascal in the mid 17th century.

7 0
3 years ago
Read 2 more answers
_________ enables customers to combine basic computing services,such as number crunching and data storage,to build highly adapta
Ghella [55]

Answer:

The correct answer to the question is option A (IaaS)

Explanation:

IaaS (Infrastructure as a Service) can be used for data storage, backup, recovery, web hosting, and various other uses as it is cost-effective, and it also has secured data centers. It is a service delivery method by a provider for cloud computing as it enables customers to be offered the service the possibility to combine basic computing services to build and direct access to safe servers where networking can also be done. These services rendered by the providers allow users to install operating systems thereby making it possible to build highly adaptable computer systems.

SaaS (Software as a Service): Here, the service provider bears the responsibility of how the app will work as what the users do is to access the applications from running on cloud infrastructure without having to install the application on the computer.

The cloud provider (CP) as the name suggests is anybody or group of persons that provide services for operations within the cloud.

7 0
4 years ago
Sends a copy of the message and any additional comments to a different e-mail address
Debora [2.8K]

Answer:

Forward.

Explanation:

E-mail is an acronym for electronic mail and it can be defined as a set of written words, texts, characters used for conveying a message from one person to another. It is a channel or medium of communication between one person and the other.

Forward simply sends a copy of the message and any additional comments to a different e-mail address. The term forward is used in email to describe the process of sending a message.

3 0
4 years ago
ABC Corporation has decided to deploy their first Wi-Fi network in their corporate headquarters. ABC prepared for adding a Wi-Fi
inn [45]

Answer:

The answer is PoE+.

Explanation:

PoE (Power Of Ethernet) is a method that is widely used everywhere where there is an internet connection needed because of its ability of being able to deliver both power and the internet connection from the same line. The different PoE types are selected according to the amount of voltage that is needed to be delivered.

In the example given in the question, ABC is adding a Wi-Fi network through PoE Ethernet Switches in "wiring closets" which is where the power is added to the line. The type of PoE implementation used is PoE+ which provides higher power because it is going through the wiring closets.

I hope this answer helps.

6 0
3 years ago
Which family of controls included in the risk management Infrastructure is related to preventing the use of unauthorized codes?​
goldenfox [79]

Answer:

Operational Security Control

Explanation:

The family of controls included in the risk management Infrastructure that is related to preventing the use of unauthorized codes is known as "Operational Security Control."

This is because Operational Security Control defines potency of controls which involves the access controls, including the use of unauthorized codes, authentication, and security measures made to networks, systems, and applications.

3 0
3 years ago
Other questions:
  • What is authentication?
    8·1 answer
  • A(n) ______ notification is a message that initiates from the sending location without a request from the receiver. With a(n) __
    5·2 answers
  • ​ Search engines can perform date-filtered searches because, when web servers send a webpage to a ____, they include a header th
    11·1 answer
  • The original commercial version of Ethernet supported 10 Mbps bandwidth; the version introduced in the early 1990s supports 100
    13·1 answer
  • You are the systems administrator for a scientific research company that employs over 100 scientists who write and run Linux pro
    13·1 answer
  • Which function returns a valid value without any arguments?
    13·2 answers
  • The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make
    9·1 answer
  • Which of the following best describes the purpose of a design specification?
    11·1 answer
  • What is the term for a problem in your code
    15·2 answers
  • Meghan signs into zoom to attend a video call for her online class. what kind of cloud service is she using?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!