1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olya-2409 [2.1K]
3 years ago
12

Which of the following are the lines defining the borders of a shape? (1 point)

Computers and Technology
1 answer:
shtirl [24]3 years ago
3 0

Answer:

no I is edges

2 is gaming

3 is creativity

You might be interested in
The following statement calls a function named half, which returns a value that is half
nadezda [96]

Answer:

function half(number) {

     let result = number/2;

     return result;

}

Explanation:

4 0
3 years ago
What can you do if brainstorming only gives you a small or incomplete idea?
Grace [21]

Answer:

D. All of the above

Explanation:

5 0
2 years ago
The formatting option functions like space bar. However instead of moving one space at a time, it allows you to move your text i
Schach [20]
What are the options???
4 0
3 years ago
When does personal information often need to be entered online?
soldi70 [24.7K]

Answer:

Like when your doing an application for a job or anything important lol

Explanation:

3 0
3 years ago
Back in the mid-1800s, who was one of the first artists to retouch negatives to reduce or eliminate any imperfections in the sho
tia_tia [17]

Answer:

Calvert Richard Jones

Explanation:

Just five years later, in 1846, the first known act of photographic retouching was performed by a Welsh colleague of Talbot's named Calvert Richard Jones, or perhaps by one of Jones's associates

6 0
2 years ago
Read 2 more answers
Other questions:
  • Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of _____ for doing wel
    5·2 answers
  • You are a network security administrator for a bank and you have noticed that an attacker has exploited a flaw in OpenSSL and fo
    9·1 answer
  • ?Which programmer designs programs for applications executed on the Internet?
    11·2 answers
  • How to get out of compatibility mode in word?
    15·1 answer
  • In the Unified Process (UP), related activities are grouped into UP ____. a. Services b. Disciplines c. Cycles d. Practices
    11·1 answer
  • Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by usi
    8·1 answer
  • Search engines use indexes created by web _________ to provide fast searches.
    7·1 answer
  • The stub: transmits the message to the server where the server side stub receives the message and invokes procedure on the serve
    8·1 answer
  • How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.
    15·1 answer
  • Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!