1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
3 years ago
9

A triangle is an example of __________ .

Computers and Technology
1 answer:
inna [77]3 years ago
7 0
 CONVEX polygon. 
An equilateral triangle is a triangle that has the same side length and same angles.

It is identified as a convex polygon because it does not have a reflex angle. 
A reflex angle is an angle that is greater than 180° but lesser than 360°. Interior angles of a triangle sum up to 180°.
You might be interested in
I really need help with this question, I can’t fail this please :) tysm
Maurinko [17]

Answer:

i think its the third one, i hope this helps

Explanation:

4 0
3 years ago
What sorts of items can be
Bumek [7]

Answer:

A router connects multiple computers to the Internet through a single connection. The router manages the flow of data, delivering the right information to each computer on the network. Routers may also be used to connect multiple networks. A managed router is a router that is owned and managed by a third-party.

6 0
4 years ago
Consider the operation of deleting the root of a binary search tree. if the root has one child, then ________.
PSYCHO15rus [73]

The reference to the root of the tree should be set to null

<h3>Can the root of a binary tree be null?</h3>
  • Only the subtrees are nulled out, the root always remains and will never be set to null.
<h3>What is null root?</h3>
  • null-, root. -null- comes from Latin, where it has the meaning "none; not one.
  • '' This meaning is found in such words as: annul, null, nullify.

To learn more about it, refer

to brainly.com/question/24448358

#SPJ4

4 0
2 years ago
What classes should I take in high-school for majoring in computer science?
Gala2k [10]

Answer:

Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.

Explanation:

6 0
3 years ago
Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
konstantin123 [22]

Answer:

- Transform binary or unary M:N relationship or associative entity with its own key.

Explanation:

Transform binary relation is described as the method through which a decimal can easily be converted into binary while the unary relationship is described as a relationship in which both the two participants occurs from the same entity.

In the given case, 'transform binary or unary M:N relationship' can be created using 'the primary key linked with the relationship plus any non-key aspects of the relationship and the primary keys of the related entities' as it displays the existence of a relationship between the occurrences of a similar set of the entity i.e. associative entity here.

5 0
4 years ago
Other questions:
  • After Intel faced strong shifts in technologies, such as cloud services, social networking, mobile devices, etc., Intel realized
    11·1 answer
  • If the test statistic for a small sample difference of means test is t* = 2.045, we could reject the Null Hypothesis at alpha =
    9·1 answer
  • The scope of a variable declared within a for() loop is:
    6·1 answer
  • A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9? A. '=A1+B2 B. '=A2+B3 C
    8·2 answers
  • Quien invento el primer vehiculo con motor?
    15·2 answers
  • Which of the following software programs provides for e-mail communication?
    5·1 answer
  • With a DUI charge on a driver’s record A. the price of his/her insurance greatly increases. B. he/she may drive only during day
    5·2 answers
  • Consider the scenario below. Will the solution attempted by the technician fix the problem or make it worse? Defend your answer.
    5·1 answer
  • _____ are labels for data, while _____ tie values together into one entity.
    15·1 answer
  • 7. Suppose that a RISC machine uses 5 register windows. a. How deep can the procedure calls go before registers must be saved in
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!