1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lena [83]
3 years ago
10

What is the volume of the prism?

Computers and Technology
1 answer:
qaws [65]3 years ago
8 0
I think 15 I'm not for sure..
You might be interested in
Do you remember your first 3D movie experience? What was the movie, what was the experience like, and why was it memorable? (If
maria [59]

Answer:

I went to my first 3d movie when I was 12. I remember thinking that it wouldnt look real or realistic but when I tried it out it was pleasantly surprised on how real it looked.

Explanation:

3 0
3 years ago
. Use one command to create a /sales directory with the permissions of 770
mars1129 [50]

Answer:

mkdir -m 770 sales

Explanation:

The command mkdir is used to create a directory and the attribute or flag

-m is used to  assign permissions on create a folder.

Example:

mkdir -m 770 sales

Create a folder with permissions 770 with name sales

7 0
3 years ago
I WILL GIVE BRAINIEST ANSWER AND THANKS IF YOU ANDWER THIS QUESTION!!!!
sesenic [268]
Access: full electronic participation in society.
Commerce: electronic buying and selling of goods.
Communication: electronic exchange of information.
Literacy: process of teaching and learning about technology and the use of technology.
Etiquette: electronic standards of conduct or procedure.
Law: electronic responsibility for actions and deeds.
Rights & Responsibilities: those freedoms extended to everyone in a digital world.
Health & Wellness: physical and psychological well-being in a digital technology world.
Security (self-protection): electronic precautions to guarantee safety.

IMPORTANT
Etiquette. Students need to understand how their technology use affects others. ...
Literacy. Learning happens everywhere. ...
Rights and responsibilities. Build trust so that if something happens online, students are willing to share their problems or concerns about what has happened.
6 0
3 years ago
taking small bits of information from the internet/web and using it as my own work or to complete an assignment is plagiarism.
lana66690 [7]
Not necessarily, if you are sourcing the information you have used to come to your own conclusion then that isn't plagiarism, however if you just copy paste completely and use it as your own work then yes it is plagiarism.  <span />
7 0
3 years ago
Two support services supervisors disagree about a position description for a new help desk position. One said, “The position des
Reptile [31]

I aggree with the one that says "The position description should be as specific as we can make it so applicants will know whether or not they meet our requirements.”

Note that when the  specific requirements about a position is made known, it makes the applicant to known if they are fit for that position or not

<h3>What is a position description?</h3>

The term  position description is also known as "PD" . This is known to be a fact or a statement that talks about the key duties, responsibilities, and role etc. of a position.

It helps to indicates the work to be carried out by the position and when it is specific, one can know if they can do the work or not.

Learn more about position description from

brainly.com/question/4677114

4 0
3 years ago
Other questions:
  • . Write a statement that throws an IllgalArgumentException with the error message Argument cannot be negative.
    11·1 answer
  • A(n) _________ website contains factual information, such as libraries, encyclopedias, dictionaries, guides, and other types of
    8·1 answer
  • Borrowers taking a balloon payment mortgage most likely plan to rent out their homes. must repay the loan in five to ten years.
    13·2 answers
  • Write an essay of at least 300 words explaining your position on a proposed ban of Wikipedia in your future college. You should
    12·1 answer
  • Why is redundancy of data undersirable?
    7·2 answers
  • Which computer network component connects two different networks together and allows them to communicate?
    8·2 answers
  • This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a windows co
    10·1 answer
  • If the executives for Office Max LLC, a chain of office supply stores, developed the chain's objectives by asking buyers and sto
    11·1 answer
  • How can you ensure that the website you are using is secured?
    8·1 answer
  • Which parts of a presentation should be the most general
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!