1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faust18 [17]
3 years ago
12

Can a result that contains road maps for European countries have a highly meets rating

Computers and Technology
1 answer:
Mice21 [21]3 years ago
8 0

Đápán3e

Explanation:

You might be interested in
Ontext clues can be used to determine the _____ of an unfamiliar word
Solnce55 [7]
Meaning of the word.

6 0
3 years ago
Research and describe a recent development in theater and film lighting and explain how the technology can be used. (Maybe limit
Hunter-Best [27]

Answer:

A computerized light dimmer is one helpful development in lighting equipment. Computerized light dimmers help to control the brightness of light. These dimmers lower or increase the intensity of light. I first noticed light dimmers in a scene from the movie Children of Men. In a war scene, innocent people are shown running helter-skelter to save their lives. Artificial lights are used in scene to create that dark appearance in broad daylight, which makes the scene look gloomy and scary. It helped to generate the feeling of uncertainty and suspense through the proper use of lights. Light dimmers help light designers to create the exact atmosphere that the director demands for a scene. Also, because of dimmers, a light designer need not use extra accessories to diffuse light or make the scene brighter.

Explanation:

This is Plato's sample answer so take pieces out.

6 0
3 years ago
Read 2 more answers
What does the word tolerance mean in textiles?
Firdavs [7]
It means the willingness to respect or except thecustoms, beliefs, or opinions of others
4 0
3 years ago
Write a class named Taxicab that has three **private** data members: one that holds the current x-coordinate, one that holds the
Licemer1 [7]

Answer:

See explaination

Explanation:

class Taxicab():

def __init__(self, x, y):

self.x_coordinate = x

self.y_coordinate = y

self.odometer = 0

def get_x_coord(self):

return self.x_coordinate

def get_y_coord(self):

return self.y_coordinate

def get_odometer(self):

return self.odometer

def move_x(self, distance):

self.x_coordinate += distance

# add the absolute distance to odometer

self.odometer += abs(distance)

def move_y(self, distance):

self.y_coordinate += distance

# add the absolute distance to odometer

self.odometer += abs(distance)

cab = Taxicab(5,-8)

cab.move_x(3)

cab.move_y(-4)

cab.move_x(-1)

print(cab.odometer) # will print 8 3+4+1 = 8

7 0
2 years ago
What are the letter that go under each note?
gladu [14]

Answer:

A, B, C, D, E, F, G pls mark me brainliest see explanation below

Explanation:

those are the letters if you search up letters for music you can find them way easier than me explaining and you will also learn faster. please mark me brainliest

5 0
2 years ago
Read 2 more answers
Other questions:
  • 32.
    11·1 answer
  • What guidelines should you follow when adding graphics to your presentations?
    14·2 answers
  • What is this tool called?
    5·2 answers
  • The mutt software is an example of what type of mail service software on Linux? a. Mail Delivery Agent b. Mail Transport Agent c
    5·1 answer
  • Which sentences in the passage correctly describe a function?
    11·1 answer
  • Design and write a class that implements an ordered list type using a linked list, and a program that exercises and tests the cl
    7·1 answer
  • In fixed-width files, each record is on a separate line and the fields are separated by a special character.
    7·1 answer
  • If your computer won't connect to the internet, which of these is most likely to be the problem?
    8·1 answer
  • Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t
    14·1 answer
  • An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!