1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
3 years ago
7

Why did latex replace wax?

Computers and Technology
1 answer:
andrezito [222]3 years ago
3 0

Answer:

Latex replaced wax because it did the same thing and was used for the same things that wax would be used for

Explanation:

You might be interested in
Decision trees are onlyapplicable to problems under certainty.<br> True<br> False
lions [1.4K]

Answer: False

Explanation:Decision tree is the tree like structured flowchart which is used for the evaluation of the possible outcomes or result of the particular problem. It usually has two or more branches as the the result node . Decision tree are applicable to many problems for solving it. So, decision trees is not only applicable on certainty problems but also on other problems as well. Therefore the given statement is false.

6 0
3 years ago
What is this on G00gel Documents , how do I fix it?
mylen [45]

Answer:

Sorry but it donest show the picture

Explanation:

7 0
2 years ago
What data does Bittorrenting uses? Explain.
amid [387]

Answer:

A BitTorrent software consumer utilizes that data into the torrent data to communicate special tracker and support shifting of that data among networks including either complete or incomplete representations about the data-set.

Explanation:

BitTorrent is based at the thought of any torrent, which is a smallish data that includes metadata regarding a host, specific tracker, that organizes the data sharing and data that is distributed. A peer that wants to advance data available need first attain a tracker for the data, generate a torrent and later share the torrent data. Different peers can next use the information included in the torrent file support all other in downloading that data. That download is organized by that tracker.

5 0
3 years ago
1. Write a Python code to:
Ksenya-84 [330]

Answer:

hope this help and do consider giving brainliest

Explanation:

1)

a)

import numpy as np

A=np.array([[1,4,3,2],[1,7,4,5],[2,5,3,1],[1,3,2,9]]);

print("Inverse is");

B=np.linalg.inv(A);

print(B);

print("A*A^-1=");

print(np.dot(A,B));

print("A^-1*A=");

print(np.dot(B,A));

2)

import numpy as np

A=np.array([[4,3,2],[5,6,3],[3,5,2]]);

B=np.array([[3,-1,2,6],[7,4,1,5],[5,2,4,1]]);

X=np.dot(np.linalg.inv(A),B);

print("X=");

print(X);

5 0
3 years ago
Which of the following would be considered the highest risk portfolio?
sashaice [31]

The best option is (C) A portfolio made up of 60% stocks, 30% mutual funds, and 10% Treasury bonds.

There are a lot of risks involved when investing in almost anything. You may end up paying a lot for something that may not be worthwhile and at the end of it all end up losing a lot more than you get. In this case, more than half of the money has been invested in stocks and the prices of stocks change daily. Investing in stocks may give a good return but remains high risk to involve yourself in and should be avoided as much as possible.






4 0
3 years ago
Other questions:
  • Where is the risk of someone intercepting another person’s online activity the greatest?
    11·1 answer
  • In the excerpt above, what can be inferred by the statement, “The Dillingham had been flung to the breeze during a former period
    13·2 answers
  • By applying styles formats are being applied ?
    14·2 answers
  • List three tacos there are several from the opening page of the help and support center.
    5·1 answer
  • A store owner keeps a record of daily transactions in a text file. Each line contains three items: The invoice number, the cash
    7·1 answer
  • I can’t unblock brainly from my computer, I think a robot has the same IP address .
    10·2 answers
  • 7. Little Big Planet advanced the platforming genre of games by __________.
    14·1 answer
  • Question 5 of 10
    10·1 answer
  • What must your motherboard have to use bitlocker encryption in windows 7 which will ensure that your hard drive cannot be used i
    15·1 answer
  • Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It s
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!