1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
3 years ago
8

Which transformation(s) can be used to map ARST onto

Computers and Technology
1 answer:
xenn [34]3 years ago
6 0

Answer:

The last line i.e "rotation, then translation​ " is the correct answer .

Explanation:

Missing information :

In this question some information is missing The triangles are congruent by the SSS and HL. This line is missing in the given question .

The triangles that are the exactly similar sides and the angles.is known as congruent triangles .In the congruent  triangle  One's three sides are exactly similar in way of measuring to someone else's three sides also each of the three angles has almost the same angle as another.

  • In the congruent triangles firstly the reflection will applied then after the translation process is applied in the SSS and HL.
  • The other options are incorrect because they are not used for the mapping of RST into AWWX that's why these are incorrect option .  
You might be interested in
Consider the language S*, where S = {a ab ba}.
Nezavi [6.7K]

Answer:

Check Explanation

Explanation:

A) the string (abbba) is not a word in this language because in this language, each b must preceded or followed by an a. Three consecutive b's are just not possible.

B) All the words with 3 letters in this language

aaa

aab

aba

baa

C) 5 words with four letters from this language. I'll write as many as possible to make things as easy as possible.

aaaa

aaab

aaba

baab

baba

baaa

abaa

abab

abba

D) This is the language of words without bbb, with every bb preceded and followed by an a (that is, no word can start or end wilth bb). All non-empty strings contain at least one a (so b and bb together are not allowed!).

Hope this Helps!!!

6 0
3 years ago
What must be done before using ArrayLists?<br><br> (This is Java Programming btw)
Viktor [21]

Answer:

to create an ArrayList , you declare an Arraylist variable and call the ArrayList constructor to instantiate and ArrayList object and assign it to the variable

5 0
3 years ago
In a single statement: declare, create and initialize an array named a of ten elements of type int with the values of the elemen
Verizon [17]

Answer:

int[] a = {10, 20, 30, 40, 50, 60, 70, 80, 90, 100};

Explanation:

//written in java

The left side <u>int[] a</u> Declare a variable(a) which is of type Integer array(<u>int[]</u>).

The equal sign(=) assign the right side to the left side.

The right side initialize the integer array(a) with ten element.

6 0
3 years ago
Knowledge and experience help you
Zarrin [17]

Answer:

yes it can it shows u what you did wrong or what you did right

Explanation:

brainlet me please

8 0
3 years ago
In terms of computer networking. what is PING?
Andrew [12]
Ping means how much of a delay there is in your connection. The lower the ping, the smaller the delay. This plays an important role in online gaming. If your ping is 350, then your delay is 350ths of a second.

3 0
3 years ago
Other questions:
  • What is the number one drug used by teens?
    7·2 answers
  • Ascending and descending are examples of
    5·2 answers
  • When designing a suitable and safe flexibility training program, you should set reasonable and appropriate goals depending on wh
    15·1 answer
  • In Microsoft word when you highlight existing text you want to replace , you're in?
    15·1 answer
  • A blog is Group of answer choices a character in Lineage,
    15·1 answer
  • What were thomas edison's contributions to advances in technology?
    9·1 answer
  • Discuss advantages and disadvantages of operating system
    8·2 answers
  • Will creates an entry in his calendar and marks it as an all-day instance. Which item has he created?
    10·1 answer
  • of the choices listed, which is the correct protocol to access a remote computer and execute commands?
    11·1 answer
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!