1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
3 years ago
9

¿Qué es lo contrario a frágil?

Computers and Technology
1 answer:
Pepsi [2]3 years ago
7 0

Answer:

frágil

Explanation:

You might be interested in
I need the full code for 6.1.3 code hs circles and squares please answer please help
Sloan [31]

In this exercise we have to use the knowledge in computational language in python  to write a code with circles and squares.

<h3>how to draw geometric figures in python?</h3>

<em>inputs = 100</em>

<em>radius</em>

<em>    draw_circle(radius);</em>

<em>    pendown()</em>

<em>    begin_fill()</em>

<em>    circle(radius)</em>

<em>    end_fill()</em>

<em>    penup()</em>

<em>left(90)</em>

<em>forward(radius*2)</em>

<em>right(90)  </em>

<em>penup()</em>

<em>setposition(0,-200)</em>

<em>color("gray")</em>

<em>bottom_radius = int(input("What should the radius of the bottom circle be?: "))</em>

<em>draw_circle(bottom_radius)</em>

<em>draw_circle(bottom_radius)</em>

See more about python at brainly.com/question/18502436

7 0
2 years ago
I used a walmart MoneyCard and now it says its prepaid. Its my dad's card.
Scorpion4ik [409]

Answer:

oh- Did he find out-

Explanation:

8 0
3 years ago
Which of the following is not a benefit of normalization?
mixer [17]

Answer:

The answer is option (4) Maximize redundancy as normalization minimizes redundancy of data.

Explanation:

Normalization of databases leads to minimization of data redundancy in databases. It doesn't maximize data redundancy. Data redundancy leads to wastage of resources. Normalization of databases minimizes insertion anomolies. Normalization of databases minimizes deletion anomolies. Normalization of databases minimizes updation anomolies.  So , the answer to the question is option (4) maximize redundancy.

8 0
3 years ago
"what is the problem with using challenge handshake authentication protocol (chap) as an authentication protocol?"
Alexxandr [17]

Its use of the message digest 5 (MD5) hash algorithm for security.

CHAP uses a combination of MD5 hashing and a challenge-response mechanism, and authenticates without sending passwords as plaintext over the network. The security of the MD5 hash function is severely compromised.

5 0
3 years ago
Suppose you want to delete an existing file from within word. What would you do?
Oksana_A [137]
Go in to ur files and find the file and delete it
5 0
3 years ago
Other questions:
  • Peak download rate for a 4g network is __________. select one:
    12·2 answers
  • ______ includes websites that encourage interaction and connection among people, businesses, and organizations.
    9·2 answers
  • In this exercise, use the following variables : i,lo, hi, and result. Assume that lo and hi each are associated with an int and
    9·1 answer
  • What takes information entered into a given system and sends it automatically to all upstream systems and processes?
    6·2 answers
  • William found out that someone used his report on american culture without his permission. what is william a victim of?
    11·1 answer
  • When mapping a drive, you can type in the path to the shared folder on the host computer. what is the syntax for the path?
    7·1 answer
  • While the Internet is used to share many useful services and information, there are growing concerns about the way that the Inte
    8·1 answer
  • What do you understand by the term polysome?​
    14·1 answer
  • Which of the following is a type of input device?
    5·1 answer
  • 1. The letters that appear after the dot after a file name are called the:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!