1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
3 years ago
8

NEED HELP(10 POINTS) PLEASE HELP MATH

Computers and Technology
2 answers:
DiKsa [7]3 years ago
6 0
78 ft. hope it helped
luda_lava [24]3 years ago
6 0
The answer is actually 10 feet because it is asking for the length, not the area.
You might be interested in
NO LINKS<br />Write a C program called velocity.c to do the following activities.<br />• The parent process should r
algol [13]

Answer:

uhm.....im confused a bit here

3 0
3 years ago
19 dollar fortnite gift card
Ann [662]
Who wants it? ........
3 0
3 years ago
Read 2 more answers
What is a decision tree
tigry1 [53]
A decision tree is a diagram or chart that people use to determine a course of action or show a statistical probability.
5 0
3 years ago
To what extent do preexisting personal biases affect representation in new media
dolphi86 [110]

Answer:

Below

Explanation:

I believe that it's a bit of a case by case scenario. However, personal biases will inevitably show throughout any sort of writing or other presenting within media. That's why you should always be careful about what you read and believe is true

6 0
2 years ago
is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticat
IrinaK [193]

Answer:

The right answer will be "Cross-Site Request Forgery (CSRF)".

Explanation:

  • CSRF would be an attack that causes an endpoint consumer to perform inappropriate activities throughout a website interface where they're already authenticated.
  • These attacks only threaten state-switching requests, never data manipulation because the intruder requires no means of knowing the answer to the demand fabricated.
7 0
3 years ago
Other questions:
  • The __________ is the continuity of control of evidence that makes it possible to account for all that has happened to evidence
    14·2 answers
  • Networking is the most effective search method for finding job leads.<br> a. True<br> b. False
    8·2 answers
  • What a true portrait reveal
    7·1 answer
  • Write a function named change() that has an integer parameter and six integers reference parameters named hundreds, fifties, twe
    7·1 answer
  • Identify and describe the kind of trouble ticket system you would recommend in the following scenario hey small marketing firm d
    9·1 answer
  • UserInp = input("Did you like the story?")
    7·1 answer
  • What sequence is used to create a brochure document from a template?
    5·1 answer
  • What is the best definition of a network?
    14·2 answers
  • What is the difference between windows 10 and windows 11
    13·1 answer
  • Which communication network pattern offers a fairly even flow of information, but two people interact with only one other?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!