1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Y_Kistochka [10]
3 years ago
8

Viết chương trình hoàn chỉnh các yêu cầu sau:

Computers and Technology
1 answer:
Blababa [14]3 years ago
4 0

Explanation:

the perimeter of an aluminium sheet is 120 CM if its length is reduced by 10% and its breadth is increased by 20% the perimeter does not change find the measure of the length and the breadth of the sheet

You might be interested in
One last question
BlackZzzverrR [31]

Answer:

I love Chipotle!

Explanation:

I don't know, maybe because the food there is really good.

8 0
3 years ago
Read 2 more answers
I have been trying to use brainly recently but i cant because everytime i watch an ad to get an answer, its an interactive ad, s
Troyanec [42]

Answer:

remove ads

Explanation:

by buying a no ad pack

5 0
2 years ago
18. The push rod connects to the _______, which is designed to pivot back and forth to open and close the valve.
spin [16.1K]
In an overhead valve engine, pushrods connect to A. rocker arm which pivots and opens valves
6 0
3 years ago
Read 2 more answers
In a word processing program, under which tab or menu option can you adjust the picture brightness?
dlinn [17]

Explanation:

<h3>You must have selected a picture in order the tab format to be available. you should click the picture then you want to change the brightness for and u under picture tools, on the format tab,in the adjust group, click corrections.</h3>
5 0
2 years ago
A computer user is listening to an audio broadcast on the internet through an ssl vpn. the type of encryption cipher used in thi
Step2247 [10]
The answer is <span>Block cipher.  </span><span>A </span>block cipher<span> is a method of </span>encrypting<span> text </span><span>in which a cryptographic key and algorithm are applied to a </span>block of data at once as a group rather than to one bit at a time.  They<span> split the input text into fixed-size chunks called  </span>blocks<span>. The operation of a </span>block cipher<span> is to take a </span>block<span> of input text and a </span>block<span> of key to produce a </span>block<span> of output text.</span>
5 0
3 years ago
Other questions:
  • 4. When you're working with a word processing document and you press the Del key, what happens?
    8·2 answers
  • System Architecture: Describe the system architecture. Specifically, be sure to address the corporate organization and culture,
    10·1 answer
  • Provide the instruction type, assembly language instruction, and binary representation of instruction described by the following
    7·1 answer
  • Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe
    12·1 answer
  • What was your learning target for today
    9·2 answers
  • NEED FIVE QUESTIONS ANSWERED!!!
    7·1 answer
  • Match each with the correct answer.
    7·1 answer
  • A swimming pool has a length of 28 feet, a width of 17 feet, and a depth of 6 feet. How much water can the swimming pool hold?
    10·1 answer
  • Write an algorithm to find the average of three numbers: 10, 20, 30
    7·1 answer
  • Explain any two types of board band connection​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!