1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scilla [17]
3 years ago
5

Given the three side lengths, how can you tell if a triangleis a right triangle?​

Computers and Technology
1 answer:
Tatiana [17]3 years ago
8 0
<h3>Sample Response from Edge 2020:</h3>

Square all side lengths. If the longest side length squared is equal to the sum of the squares of the other two side lengths, then it is a right triangle.

You might be interested in
Which f the following is not a characteristic of igneous rock
Ne4ueva [31]

Answer:

There are no answers but here is how you classify one with these characteristics so if its not on here probably that one hope this helps :)!

Explanation:

Igneous rocks are formed when melted lava or magma cools and crystallizes, and their unique traits are based on this process. They are strong because their mineral grains grow together tightly as they cool, and their minerals are usually black, white, or gray. They have a texture similar to something baked in an oven, like black bread or peanut brittle.  Some of the main minerals in igneous rocks are feldspar, quartz, olivine and mica. The size of the minerals depends on the depth of the magma that formed the rock. Deeper magma cools more slowly and forms larger crystals. Rocks that cool over a few months have microscopic mineral grains and are called extrusive. Rocks that cool over thousands of years have small to medium grains and are called intrusive. Rocks that cool over millions of years have large pebble sized grains and are called plutonic.  Granite and basalt make up the majority of igneous rocks. Basalt is dark and fine-grained with minerals rich in magnesium and iron. It is either extrusive or intrusive and is the primary rock on the ocean floor. Granite is light and coarse-grained and rich in feldspar and quartz. It is plutonic and less dense than basalt. Granite is found nearly everywhere beneath the continents.  The word "igneous" comes from the Latin word "fire" and is related to the melting process that forms these rocks.

3 0
2 years ago
WHAT IS ONE WAY A PIVOTTABLE COULD COMBINE THE FOLLOWING DATA
Gemiola [76]

Answer: You sort table data with commands that are displayed when you click a header arrow button. Hope it help's :D

7 0
3 years ago
Your network employs basic authentication that centers on usernames and passwords. However, you have two ongoing problems. The f
Agata [3.3K]

Answer:

Using a one time password OTP and using a three factor authentication.

Explanation:

Social engineering is a form system and network attack, drafted by an attacker, to steal user credentials needed for accessing their accounts, to steal information.

Social engineering attacks like phishing, spear phishing, baiting and quid quo pro are used to fool users to giving out their user details.

One time password is an implied use of a password just once and a new password his generated to boost security. In a three factor authentication, OTP can be used as well as biometrics of a user which can not be giving away by a user to an attacker.

8 0
3 years ago
In a linked chain implementation of a queue, the performance of the enqueue operation
alexdok [17]

Answer:

A.O(1)

Explanation:

In the implementation of queue by using linked chain the performance of  the enqueue operation is O(1).We have to  maintain  two pointers one  head and the other tailand  for  enqueue operation  we have to insert element  to the next of the tail and then  make that element  tail.Which takes O(1) time.

4 0
3 years ago
To locate all locations in a document with the word "employer" and replace it with "company," you should use the _____ function.
grandymaker [24]
That should be the replace function which performs word replacements in documents.
6 0
3 years ago
Other questions:
  • What is the f(n) runtime of the following pseudocode: sum-0 for A = N/2 downto 1 for B-1 t increment sum by B Explain: exactly w
    13·1 answer
  • Which of the following is NOT an example of input?
    8·1 answer
  • What does limited access to a document mean?
    14·2 answers
  • Smart art can be used to create _____that highlights relationships betweeen two items
    8·2 answers
  • What are the advantages and disadvantages of fortran?
    13·1 answer
  • Please help! would appreciate it very much!
    13·1 answer
  • . public members are accessible from ________________ where the object is visible
    9·1 answer
  • What are the top ten alternative songs of the 2000's?
    7·1 answer
  • Which method is used for resolving data dependency conflict by the compiler itself?
    6·1 answer
  • Describe the method used by operating systems to differentiate between TCP connections.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!