1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anettt [7]
3 years ago
15

Parallelogram RSTU is rotated 45° clockwise using the origin as the center of rotation. On a coordinate plane, parallelogram R S

T U has points (2, 3), (5, 3), (7, 1), (4, 1). Which graph shows the image of RSTU? On a coordinate plane, parallelogram R prime S prime T prime U prime has points (negative 1, 4), (1, 6), (4, 6), (2, 4). On a coordinate plane, parallelogram R prime S prime T prime U prime has points (3.5, 1), (5.5, negative 1), (5.5, negative 4), (3.5, negative 2). On a coordinate plane, parallelogram R prime S prime T prime U prime has points (2, negative 3), (5, negative 3), (7, negative 1), (4, negative 1). On a coordinate plane, parallelogram R prime S prime T prime U prime has points (3.2, 4.8), (5.5, 2.5), (5.5, negative 0.5), (3.2, 1.8).
Computers and Technology
1 answer:
sesenic [268]3 years ago
6 1
Hola me han dado un teléfono y que no se pueda ver el problema y me ha dado un teléfono y a la policía y le han dicho a las dos a las ido al médico a la gente que no han dado un paso de nada y a ver si se puede ver a las puertas del teléfono no me ha
You might be interested in
Microsoft PowerPoint is popular software that allows you tocreate slides, handouts, notes, and outlines.
gtnhenbr [62]

Answer:

The statement is true. Microsoft PowerPoint is a popular software that allows you tocreate slides, handouts, notes, and outlines.

Explanation:

Microsoft PowerPoint is a presentation program developed by Microsoft for Windows, macOS and lately for Android and iOS operating systems. It comes integrated in the office package called Microsoft Office as one more element, which can take advantage of the advantages offered by the other components of the computer to obtain an optimal result.

It is a program designed to make presentations with schematized text, as well as slide shows, text animations and clip art or imported from computer images. Different font, template and animation designs can be applied. These types of presentations are usually more practical than those of Microsoft Word.

5 0
3 years ago
What technology changes led to industrialization?
qwelly [4]
Factors, also this is the wrong place to post this question
7 0
3 years ago
A school’s administration stores the following data for each student in an online system: name, class, and five electives. Selec
aleksandr82 [10.1K]

Answer:

Array of Strings

Explanation:

I believe the best data type for this information would be an Array of Strings. This array would have a fixed size of 5 elements. One for each one of the five electives that the student will have. Then the individual electives will be String elements that are saved in the 5 indexes of the Array. This would allow all of the electives to be bundled into a single variable and accessed together or individually by the user. This would be the best and most efficient data type to store this information.

5 0
3 years ago
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
18) What is masking in Flash?
sammy [17]

Answer:

Ok thanks, I guess?

..............

6 0
3 years ago
Other questions:
  • The compare_strings function is supposed to compare just the alphanumeric content of two strings, ignoring upper vs lower case a
    15·1 answer
  • Tom scheduled a meeting at a nearby convention center. He provided directions to all of the attendees. When Jenny read Tom's mes
    13·1 answer
  • Which button is used to open the Start menu in Windows Vista?
    14·1 answer
  • To prevent injury when pulling a nail be sure the material holding the nail is
    14·1 answer
  • When backing up a database server to LTO tape drives, the following schedule is used. Backups take one hour to complete.
    12·1 answer
  • Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time li
    7·1 answer
  • The system requirements for software include the
    5·1 answer
  • If you have defined a class named SavingsAccount with a public static data member named numberOfAccounts, and created a SavingsA
    7·1 answer
  • How to identify mistakes in a html code??​
    14·1 answer
  • List resource you can utilize if you are experiencing technology issued
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!