1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
satela [25.4K]
3 years ago
12

The ____ developed numerical methods for generating square roots, multiplication tables, and trigonometric tables used by early

sailors.
Computers and Technology
1 answer:
Marysya12 [62]3 years ago
3 0

Answer:

The answer is "Egyptians"

Explanation:

To support the process of development, the Egyptians created and used several easy engines, including the runway and lever. The rope trusses have been used to improve the ships ' beam.

  • In this, the Method of Finite Element was developed to produce square root, reproductive and trigonometric tables for early navigators.
  • Energy-produced and shipped throughout the Mediterranean basin were Egyptian paper, papyrus, pottery, and other products.
You might be interested in
Computer-aided design software is used primarily by:
guapka [62]
Is used primarily by Students and Engineers.
4 0
4 years ago
What's a False statement about online time? A. Blue light from devices can make it hard to sleep. B. It's a good way to connect
mylen [45]

Answer:C

Explanation: This has no basis while the others have studied behind them.

4 0
4 years ago
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?.
algol [13]
A VPN. i believe what you’re referring to is called a vpn. it protects your data when you’re working online.
8 0
2 years ago
In a mobile phone network, how many times as strong would
steposvetlana [31]

Answer:

how many times as strong would what?

put your question in the replies to this answer and I'll gladly answer it

Explanation:

May I have brainliest please? :)

6 0
3 years ago
CPT (Current Procedural Terminology) codes consist of 3-4 numbers representing a unique service. True False
xz_007 [3.2K]
This is in fact false to my knowledge
4 0
3 years ago
Other questions:
  • Why would Google combining information from separate accounts across its services and sites have privacy implications for its us
    11·1 answer
  • Your computer is once again out of hard drive and you want to see which folders are consuming the most space on your drive. Whic
    15·1 answer
  • ________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
    14·1 answer
  • The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
    15·1 answer
  • Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
    13·1 answer
  • So I bought a mechanical keyboard with cherry mx red switches. you're called "linear and silent" they are linear but they aren't
    10·1 answer
  • Use the drop-down menus to match each description to its corresponding term.
    7·1 answer
  • SHORT ANSWERS:
    7·1 answer
  • If the middle number is lesser than the candidates then u eliminate the ___ half of the data​
    5·1 answer
  • What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!