1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
3 years ago
8

Which transformation(s) can be used to map ARST onto

Computers and Technology
1 answer:
xenn [34]3 years ago
6 0

Answer:

The last line i.e "rotation, then translation​ " is the correct answer .

Explanation:

Missing information :

In this question some information is missing The triangles are congruent by the SSS and HL. This line is missing in the given question .

The triangles that are the exactly similar sides and the angles.is known as congruent triangles .In the congruent  triangle  One's three sides are exactly similar in way of measuring to someone else's three sides also each of the three angles has almost the same angle as another.

  • In the congruent triangles firstly the reflection will applied then after the translation process is applied in the SSS and HL.
  • The other options are incorrect because they are not used for the mapping of RST into AWWX that's why these are incorrect option .  
You might be interested in
a_____________ may have its value change during program execution. options. flowchart,counter, Algorithm,None of them​
Amiraneli [1.4K]

Answer:

i think is "none of them"

5 0
3 years ago
What is the correct sequence of the phases in the systems development life cycle?
HACTEHA [7]
1. Requirements gathering/analysis.
2. Design.
3. Development.
4. Testing.
5. Maintenance.
7 0
3 years ago
CAPTCHAs can be used as a form of signature to create a valid contract in e-commerce. True False
Len [333]
Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
The statement "CAPTCHAs can be used as a form of signature to create a valid contract in e-commerce. " is true. It is <span>a program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites.</span>
4 0
3 years ago
Read 2 more answers
A major advantage of a method is that it is easily reusable. What does it mean to reuse a method and what are the advantages of
JulijaS [17]

Answer: To reuse a method means to use a code which has been done or prepared already and just we need to change some of the functionalities.

This helps a great deal of saving time as well as helps in making the code manageable.

Explanation:

This has been practiced since long that methods can be reused. for example we need to build a calculator in c. then we can simply reuse the same method  just we need to change the sign of the operator. So in this process we can speed up our operations and work and also can make the code easy to understand and manage it when we have have to deal with large lines of code.

8 0
3 years ago
What are the differences between a slate PC, ultrabook, and a tablet?
Vinvika [58]

Answer: The differences between ultra-book, tablet and slate PC  are mentioned as follows:-

  • Ultra-book is the notebook structure thin and slim device whereas tablets are type of computer shaped laptops in small size and slate PC has detachable display screen and is a replacement of tablet .
  • Ultra-books have large and handy keyboards, tablets have touchscreen and no keyboard presence whereas slate PC has the touchscreen operated through stylus or fingers.
  • Ultra-book have good storage space while tablets and slate PC's have less storage space in comparison.
4 0
3 years ago
Other questions:
  • We have to calculate the percentage of marks obtained in three subjects (each out of 100) by student A and in four subjects (eac
    11·1 answer
  • Can anybody answer this for me
    13·2 answers
  • Your friends know that you understand a lot about computers, both the technical details of how they operate as well as informati
    12·1 answer
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • What term describes data actions being performed by endpoint devices, such as printing a report from a desktop computer?
    7·1 answer
  • How is marketing related to the other functions of a business
    14·1 answer
  • A circuit rated at 6600 watts and 240 volts will draw what ampers.
    6·1 answer
  • Explain why it is not necessary for a program to Explain why it is not necessary for a program to be completely free of defects
    13·1 answer
  • Of the following online activities, identify the TWO that are most likely to be affected by bandwidth quality
    11·1 answer
  • If you anticipate running a particular query often, you can improve overall performance by saving the query in a special file ca
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!