1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
7

why is the disk method a special case of the general slicing​ method? choose the correct answer below. a. the cross sections of

the slices are disks with holes through them. b. the functions that generate the solids are all lines. c. the functions that generate the solids are all parabolas. d. the cross sections of the slices are disks.
Computers and Technology
1 answer:
Pie3 years ago
8 0

Answer: d)The cross sections of the slices are disks.

Explanation:The slicing method deals with the elimination of the horizontal layer of the solid body .It is considered that disk method is the special case of the slicing method.

Disk method consist of the slices that are used for the estimated volume of the solid body of revolution that are known as disk.The solid body revolving around a line and its volume is estimated.Thus, the correct option is option (d).

You might be interested in
No spamming or links
Hitman42 [59]
I think the answer is true,
8 0
3 years ago
Read 2 more answers
Please I need help with this !!!! <br> Complete the table given below.
UkoKoshka [18]

Answer:

  • DBMS , function - include concurrency, security, backup and recovery, integrity and data descriptions.
  • Software calculator , category - calculator
  • DTP , function - Creating, editing, saving and printing documents.
8 0
4 years ago
3. Which of the following is a single piece of information related to the person, place,
stepan [7]
I think the answer is field
8 0
3 years ago
Read 2 more answers
Laura is the first person in her SDLC team to detect and predict security vulnerabilities in the software. In which phase is Lau
Eddi Din [679]

Answer:

answer is c

if my answer is wrong than sorry

7 0
3 years ago
A router has a valid operating system and a configuration file stored in nvram. the configuration file contains an enable secret
Makovka662 [10]
The answer is user EXEC mode. This is for setting, viewing, and testing system processes. In common, the user EXEC commands let you to link to remote devices, modify terminal line settings on a temporary basis, perform basic tests, and list system information. This also used by common system administrators, while the privileged EXEC mode is used by the root administrator. Use the enable and disable instructions to shift between the two levels. Access to the user-level EXEC command line needs a valid password.
8 0
3 years ago
Other questions:
  • What are the advantages and disadvantages of the simulated link strategy?
    11·1 answer
  • A type of bridge that relies on a curved, semi-circular structure for support
    5·1 answer
  • Why do contour lines never cross?
    5·1 answer
  • How to cite a website, like asha.org?
    6·1 answer
  • Audiovisual means that a presentation combines film and photos.<br> true or false?
    6·2 answers
  • Define a function compute gas volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the
    7·2 answers
  • What is the best programing language to use for building video games?
    10·1 answer
  • Convert the given for loop to while loop and find the output of the program assuming the
    14·1 answer
  • Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _
    13·1 answer
  • Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!