1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Y_Kistochka [10]
3 years ago
8

Viết chương trình hoàn chỉnh các yêu cầu sau:

Computers and Technology
1 answer:
Blababa [14]3 years ago
4 0

Explanation:

the perimeter of an aluminium sheet is 120 CM if its length is reduced by 10% and its breadth is increased by 20% the perimeter does not change find the measure of the length and the breadth of the sheet

You might be interested in
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
erica [24]

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that <u>byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.</u>

8 0
2 years ago
Circuitry can be either basic or ___________.
Sonja [21]
I think it would be A. Ohm's law.
hope this helps.
6 0
3 years ago
Read 2 more answers
how can i stop this stupid thing from sending me emails because my school decides to not give you a block option
tekilochka [14]

Answer:

If it on g mail you go to the spam box and then press the spammers to account and then press block and then you will block them.

5 0
3 years ago
Read 2 more answers
To enter data from the keyboard, what command do we use?
jolli1 [7]
Type the numbers or text that you want to enter, and then press ENTER or TAB. To enter data on a new line within a cell, enter a line break by pressing ALT+ENTER.
4 0
2 years ago
What makes creating business cards difficult?
Gre4nikov [31]
Lots of information must fit in a small space is the correct answer
7 0
3 years ago
Other questions:
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    5·1 answer
  • Which of these expressions evaluates to 4.0?
    12·2 answers
  • . Two or more functions may have the same name, as long as their _________ are different.
    9·1 answer
  • According to the Bureau of Labor Statistics, how
    14·1 answer
  • Select the correct answer. What has enabled engineers to design slim and sleek television sets? A. using Nipkow disks B. increas
    7·1 answer
  • Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alpha
    7·1 answer
  • Which is an aspect of structural-level design?
    6·2 answers
  • What invention in the past do you think had a significant impact on our culture/ lifestyle? What do you think will be invented/
    11·1 answer
  • Heather writes an essay for language arts and receives a poor grade. To figure out why she gets a poor grade, Heather looks at t
    14·2 answers
  • Aniyah is setting up a group of computers in her office that will share several devices. Which type of operating system should s
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!