1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashcka [7]
4 years ago
9

The composer pictured above is best known for taking older forms and styles and redefining them in modern ways. Antonin Dvorak w

as inspired by his Hungarian Dance No. 1. What is this composer's name?
Computers and Technology
1 answer:
vfiekz [6]4 years ago
7 0

Answer:

The composer pictured above is Johannes Brahms (1833-1897), who were born in the German city of Hamburg. Several musicians from his time and also later composers consider him as a traditionalist but an innovator too. Some his work inspired the great composer Arnold Schoenberg.

He met Antonin Dvorak in 1877. The Czech composer dedicated his String Quartet, Op. 44 to Brahms.

His Hungarian Dances are a total of 21 dance tunes inspired by Hungarian themes. This compositions are among the most known works by Brahms.

Explanation:

You might be interested in
What classes should I take in high-school for majoring in computer science?
Gala2k [10]

Answer:

Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.

Explanation:

6 0
3 years ago
ethics and internal control are important applications in accounting . Provide FIVE code of ethics and five internal control mea
IceJOKER [234]
Ethics:
- to ensure that privacy will not be lost.
-ensuring personal information is not lost
-information in the accountings will not be submitted or shared with anyone
-information will be saved and viewed by the business.
- The business will not falsely make the accountings.
6 0
3 years ago
Rosa is a high school freshman with no savings. She wants to buy a new smartphone in a few months for $300. Which account type b
Iteru [2.4K]
Simple savings account
6 0
3 years ago
Read 2 more answers
A program that will accept the ages of girls and boys and calculate the total and average age​
Firdavs [7]

Answer:..

hmmm...... i dont any programs that can do that

8 0
3 years ago
Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
sashaice [31]

Answer:

D) polymorphism

7 0
4 years ago
Other questions:
  • Heatsinks used to protect cpus in computers from overheating, are shaped so that their surface area is very large. why is that?
    5·1 answer
  • What part of the boot-up process initializes hardware and finds an operating system to load?
    14·1 answer
  • Pressing the e key while in edit mode will exit the interaction mode<br><br> true<br><br> false
    7·1 answer
  • Privacy settings allow account owners to decide who can ........
    12·2 answers
  • which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that ha
    9·1 answer
  • Who is a software engineer
    8·2 answers
  • Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
    6·1 answer
  • The amount of data that can be stored on a disk depends in part on_____.
    13·1 answer
  • Which phrase is the best definition of sparklines in Excel 2016?
    8·2 answers
  • What is the most common knowledge computer programmers need in order
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!