1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
13

Is this free? do i have to pay to use this app??

Computers and Technology
1 answer:
Virty [35]3 years ago
3 0
No i don’t have to pay but there is additional stuff if you pay but i don’t pay for anything
You might be interested in
the term that is used to describe how many bits are used in each pixel to show the number of colours used
Korolek [52]
Colour depth?????????????????????                              .
8 0
4 years ago
If Nancy receives an encrypted message from Matthew, which key does she use to read it? Nancy’s private key Nancy’s public key M
Juliette [100K]

Answer:

Nancy's private key

Explanation:

She's receiving it.  That means Matthew used her public key to encrypt it.  She should decrypt it using her private key.  Watch this video for clarification :)

Watch The Internet: Encryption & Public Keys on the big video site which cannot be named on brainly :p

7 0
4 years ago
What will you better be prepared for by learning about the animals you photograph
krek1111 [17]

D. All of the above.

Makes the most sense! :3

6 0
3 years ago
Create the following matrix M: 1 7 13 19 25 ?-3 9 15 21 27 5 11 17 2329By writing one command and using the colon to address ran
zimovet [89]

Answer:

Matlab code is:

>> M=reshape(1:2:29, 3,5)

>> \%  (a)

>> Va=M(3,:)

>> \% (b)

>> Vb=M(:,4)

>> \% (c)

>> Vc=[M(2,:) M(:,3)']

Explanation:

>>\% \ Making\ the\ Matrix\ With\ required\ terms\ 1\ to\ 29\ with\ spaces\ of\ 5\ in\ three\ rows

>> M=reshape(1:2:29, 3,5)

M =

              1   7  13  19  25

              3  9  15  21  27

              5  11  17  23  29

>> \%  (a)

>>\%\ Slicing\ M\ \ from\ third\ row\ till\ end

>> Va=M(3,:)

Va =\\\ 5\ 11\ 17\ 23\ 29

>> \% (b)

>>\% \ Slicing\ the\4th\ column\ of\  M\ matrix\

>> Vb=M(:,4)

Vb =\\ 19\\ 21\\ 23\\

>> \% (c)

>>\% \ slicing\ the\ 2nd\ row\ and\ 3rd\ column\ of\ M\ Matrix\ and\ combining\ them\ to\ make\ a\ row\ matrix

>> Vc=[M(2,:) M(:,3)']

Vc =\\ 3\ 9\ 15\ 21\ 27\ 13\ 15\ 17

>>

The code is tested and is correct. If you put a semi colon ' ; ' at the end of every statement then your answer will be calculated but matlab doesn't show it until you ask i.e. typing the variable (Va, Vb, Vc )and press enter.

6 0
3 years ago
Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
erma4kov [3.2K]

Treasury bond − Diversified mutual fund - Stocks.

An investment is an asset or item that is purchased with the hope that it will generate income or will appreciate in value. All investments involve some degree of risk. In finance, risk refers to the degree of uncertainty or potential financial loss that could happen in an investment decision.

In general, as investment risks rise, investors seek higher returns to compensate themselves for taking such risks. Relying on personal resources has more risk than relying on public resources of producers.

Usually, a portfolio made up of 60% stocks, 30% mutual funds, and 10% Treasury bonds would be considered to be the highest risk portfolio.

3 0
3 years ago
Other questions:
  • When did Kodak introduce film photography to the commercial market?
    10·2 answers
  • What is the maximum number of hosts you can have on a network if the first decimal value of the ip address is between 192 and 22
    10·1 answer
  • Which tabs are expandable and collapsible? Check all that apply.
    7·2 answers
  • An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect t
    10·1 answer
  • William found out that someone used his report on american culture without his permission. what is william a victim of?
    11·1 answer
  • Which of the following statements is correct?
    11·1 answer
  • Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
    11·1 answer
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • How exactly do you find the circumference by using C++ Programming? I really need a specific answer.
    14·1 answer
  • Who is the monst important person and why
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!