1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
14

Under which reflection(s) is the image of line m also a line?

Computers and Technology
2 answers:
lubasha [3.4K]3 years ago
5 0

Answer:

c

Explanation:

NeTakaya3 years ago
5 0
The answer is c lol hope it helps
You might be interested in
A bastion host allows the firewall to connect to the internal network and the perimeter network.TrueFalse
Delicious77 [7]

Answer: True

Explanation:

 Yes, the given statement is true, as the bastion host basically require two individual firewall that connect with the internal network and perimeter network by using the perimeter configuration.

Perimeter network basically isolate the the bastion host from the internal network. Bastion host is the serve as the host that connect with the external world. As, perimeter network is one of the type of the firewall network system.

Therefore, the internal network and the perimeter network basically connect with the firewall by using bastion host.

3 0
3 years ago
________ is a set of rules for exchanging files such as text, graphic images, sound, video, and other multimedia files on the we
Soloha48 [4]
<span> HYPERTEXT TRANSFER PROTOCOL  (HTTP)</span>
3 0
3 years ago
What setting in Blender allows you to see the Graph Editor?
Brut [27]

The answer is b It allows you to modify the animation for any properties using F-Curves. The Graph editor has two modes, F-Curve for Actions, and Drivers for Drivers. Both are very similar in function.

3 0
3 years ago
A paradigm innovation occurs when:
Viktor [21]
B. Because major shifts in thinking can cause change.
4 0
3 years ago
Which three options below describe typographic hierarchy?
Korvikt [17]

The three options that describe the typographic hierarchy are given below:

  • The importance of information is shown through the text.
  • The presentation of the text in terms of structure.
  • The placement of the text defines its flow and hierarchy.

Thus, the correct options are A, B, and C.

<h3>What is Typographic hierarchy?</h3>

Typographic hierarchy may be characterized as an approach that utilizes typography: the size, font, and layout of distinct text components to produce a hierarchical division that can authenticate users where to look for specific information.

The purpose of using this methodology is to focus on the main points of the article accordingly. It increases the sense of understanding of the readers with focus.

Therefore, it is well described above.

To learn more about Typographic hierarchy, refer to the link:

brainly.com/question/12076206

#SPJ1

3 0
1 year ago
Other questions:
  • Launched in 1995, ________ has become the most popular web browser.
    6·1 answer
  • The two variables causing the point of difference between the time codes are the frequency and the count
    6·1 answer
  • Words that have a special meaning in a programming language are called
    13·1 answer
  • What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
    15·1 answer
  • Which key should you press and hold to select multiple cells?
    8·2 answers
  • Choose the best type of loop for each situation.
    6·1 answer
  • How can a classroom be more effective by the use of multimedia? ​
    12·1 answer
  • Differenciate between foreign key and primary key in database.
    8·1 answer
  • Select the correct answer.
    15·1 answer
  • How does xm satellite deter nonsubscribers from listening to its transmissions? Does this make the radio programing a private go
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!