1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
3 years ago
8

Which transformation(s) can be used to map ARST onto

Computers and Technology
1 answer:
xenn [34]3 years ago
6 0

Answer:

The last line i.e "rotation, then translation​ " is the correct answer .

Explanation:

Missing information :

In this question some information is missing The triangles are congruent by the SSS and HL. This line is missing in the given question .

The triangles that are the exactly similar sides and the angles.is known as congruent triangles .In the congruent  triangle  One's three sides are exactly similar in way of measuring to someone else's three sides also each of the three angles has almost the same angle as another.

  • In the congruent triangles firstly the reflection will applied then after the translation process is applied in the SSS and HL.
  • The other options are incorrect because they are not used for the mapping of RST into AWWX that's why these are incorrect option .  
You might be interested in
Two forms of compression are lossy and lossless. State giving reasons which
Helen [10]

Answer:

(i) When transmitting a draft manuscript for a book, the lossless compression technique is most suitable because after decompression, the data is rebuilt and restored in its form as it was from where it originated

(ii) When transmitting a video recording which you have made of the school play, a lossy compression technique is most suitable because the large size of video files require the increased data carrying capacity which is provided by the lossy transmission technique. The quality of the video can be reduced without affecting the message intended to be delivered

Explanation:

4 0
3 years ago
3.4 lesson practice quiz edhesive
Marina86 [1]

3.4 lesson practice quiz edhesive :

Write a program to check if user inputs "yellow"

Answer:

In Python:

col = input("Enter Color: ")

if col == "yellow":

   print("True")

else:

   print("False")

Explanation:

This prompts the user for color

col = input("Enter Color: ")

This checks if color is yellow

if col == "yellow":

If true, this prints true

   print("True")

If otherwise, this prints false

else:

   print("False")

5 0
3 years ago
A(n) ________ software installation enables you to decide which features you want to install on the hard drive
Mazyrski [523]
<span>An element in the Excel window that displays the value or formula contained ... which you can specify the type of calculation you want to perform in an Excel formula are: ..... installs all the most commonly used files to your computer's hard drive. Full. A(n) ______ software installation enables you to decide which features you ...</span><span>
</span>
5 0
3 years ago
____ is the use of networking technology to provide medical information and services.
Cerrena [4.2K]
Answer: WebMD

WebMD, with the URL https://www.webmd.com, provides credible health and medical information on the web.
3 0
3 years ago
What term is defined as software that allows users to use and adapt it for any purpose, often allowing the public to participate
Alex787 [66]

Answer:

The answer is open source

Explanation:

hope this helps

# look it up on google

6 0
3 years ago
Other questions:
  • If you receive an increase in pay, how will that affect your payroll deductions?
    8·1 answer
  • The operations planning practice of inputting sales forecasts into computer software that accurately predicts the amount and tim
    6·1 answer
  • You listened to a song on your computer. Did you use hardware or software? Explain.
    11·2 answers
  • Which of the following is a unique feature of Object-oriented programming?
    6·2 answers
  • Explain briefly the purpose of the Computer Management Console in Microsoft Windows.
    12·1 answer
  • What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
    7·1 answer
  • Software is nothing but a piece of code or set of instructions written in a chip to run a hardware device on the Computer. O Tru
    14·1 answer
  • Pleasee help meeeeeeeeee I’m stuckk!!!!
    14·2 answers
  • A ……………………………is used to verify the identity of a website and is issued to the owner of the website by an independent and recogni
    7·2 answers
  • Write a program that takes a string as an input. If the string entered is equal to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!