1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
3 years ago
8

NEED HELP(10 POINTS) PLEASE HELP MATH

Computers and Technology
2 answers:
DiKsa [7]3 years ago
6 0
78 ft. hope it helped
luda_lava [24]3 years ago
6 0
The answer is actually 10 feet because it is asking for the length, not the area.
You might be interested in
Which is true about SSH and Telnet?
MaRussiya [10]

Answer:

Data is encrypted on SSH

Explanation:

Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.

In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.

So the true statement is that, SSH has data encryption.

8 0
3 years ago
An automatic door at a store has a sensor in front (A0) and behind (A1). The
yanalaym [24]

Answer:

whats the question?

Explanation:

4 0
3 years ago
Which of the following is least likely to be a scientific experiment
Dennis_Churaev [7]

Answer:

what causes gravity to have a amount of force on one object but not another

Explanation:

3 0
3 years ago
The theory of continental drift is supported by all of the following EXCEPT
Stels [109]
Climate seems like the correct answer
8 0
3 years ago
Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages. Tr
Ksju [112]

Answer:

True

Explanation:

The are two client-server architectures, they are, two-tier and three-tier client-server architectures. The two-tier has two layers of communication, they are the presentation and data processing layers. The three-tier architecture adds a third layer called application logic to the middle. The layers can also be called access, distribution and core layers respectively.

Hotmail is a web based emailing system that is designed following the three-tier client-server architecture. It was launched by Microsoft in 1996 and provides users with access to emails with segment core access.

7 0
3 years ago
Other questions:
  • A pointing device controls the movement of the ____.
    15·1 answer
  • You are working in the media industry, and you have created a web application where users will be able to upload photos they cre
    5·2 answers
  • A location in memory used for storing data and given a name in a computer program is called a because the data in the location c
    14·1 answer
  • How can an Excel table be added to a Word document? Check all that apply.
    15·1 answer
  • For the description below, develop an E-R diagram:
    9·1 answer
  • A digital designer might do computer animations for video games,<br> OA<br> True<br> OB<br> False
    12·2 answers
  • There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object o
    12·1 answer
  • What is the<br> binary code<br> for<br> "DMS"?
    8·1 answer
  • Write a simple Html structure and explain the meaning of each line
    8·1 answer
  • What is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages, many of which contain hoax
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!