1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qaws [65]
3 years ago
12

to the nearest millimeter a cell phone is 123 long and 54 mm wide what is the ratio of width to length

Computers and Technology
1 answer:
tigry1 [53]3 years ago
6 0
54 / 123 =

approximately

0.44:1
width:length
You might be interested in
Please help me please and thank you!
MaRussiya [10]

Answer:

1. a digital designer involves movement like animations, movies, etc. A graphic designer is static for an example logos pictures etc.

2. a ux is the interaction between humans and products

3.  a ui is the design of software and machines, for an example computers, electronic devices, etc.

4.  textures, color, value, and space

5. the basics are contrast, balance, emphasis, white space, hierarchy, movement, proportion, repetition, pattern, variety, unity, and rhythm

6. the basic fundamentals are images, color theory, lay-out, shapes, and typograph  

I hope this helped you and have a great rest of your day

7 0
3 years ago
A______ is a picture icon that is a direct link to a file or folder
Nat2105 [25]
A shortcut is a picture icon that is a direct link to a file or folder.
6 0
3 years ago
You are given a data set with information from 1,000 high school students (of which the following is a part of the data) and ask
serg [7]

Answer:

Classification

Explanation:

Building a machine learning solution that can predict the success of a student in completing a college degree is a binary problem. There are two possible answer: success or not success.  

This brings us to a supervised machine learning problem, where one trains the technique with labeled data whether it is a success or not. Since the target variable is discrete (not continuous), classification technique has to be used.  

3 0
3 years ago
In symmetric encryption the same key is used to encrypt and decrypt a message. in asymmetric encryption different keys are used
Brrunno [24]

A useful advantage of Asymmetric encryption over symmetric encryption is that there is no secret channel necessary for the exchange of the public key, unlike in the symmetric encryption which requires a secret channel to send the secret key.  

Another advantage of Asymmetric encryption is that is has increased security. Asymmetric uses two different keys (Public and private) for both encryption and decryption of data while symmetric uses one.

5 0
3 years ago
Read 2 more answers
How are the number of rows calculated.​
Eva8 [605]

Answer:

ROWS function

Explanation:

Hope this helped

6 0
2 years ago
Other questions:
  • Which is the output of the formula =AND(12>6;6>3;3>9)
    6·1 answer
  • Which of the following is an example of a good listening skill? A. Replying to the caller as "you" rather than using his or her
    9·2 answers
  • Write an original idiom that uses the word dog or dogs im in 4th
    5·2 answers
  • Sarah, a computer user, tells James, a computer technician, that the network she is connected to is running too slowly. Which of
    5·1 answer
  • PLZ HELP ME! What is a false statement about online time?
    9·1 answer
  • What is the internet ?
    11·2 answers
  • What is the purpose of the .NET Framework Class Library? a. it provides pre-written code that can be used by .NET applications b
    13·1 answer
  • When you send an email to your professor, a server holds that email until the professor requests it.
    8·1 answer
  • Only technical managers needs to know about programming, web view source code and about technology issues.
    12·1 answer
  • SINCE I CANT SEE IT KANG LOOK
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!