1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
3 years ago
7

What is the alogarithm for solving the perimeter of a triangle

Computers and Technology
1 answer:
Murljashka [212]3 years ago
6 0
The answer is 11 cm
You might be interested in
?An active card, which contains an internal battery, can provide a usable range of up to what distance
lianna [129]
An active card is used in relation to computers and technology, it has the component of an internal battery and wouldn't be used without it. The active card can provide a usable range of up to 150 m distance. And this is the distance of how far that it could get.
6 0
3 years ago
________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate progr
Natasha2012 [34]

Answer:

Usurpation

Explanation:

In context of CIBS-210 it is known as Usurpation

6 0
3 years ago
Ite the technical terms for the following:
mars1129 [50]

Answer:

  • Hardware
  • Operating system software
  • Application system software
  • Computer
5 0
3 years ago
The name of the unique identifier assigned to a personal computer
My name is Ann [436]
That would be your username example: makastor.pc.home
6 0
4 years ago
Eli has 7 games on his phone. His sister has 6 more than him. Which ratio compares the number of games on Eli’s phone to the num
Ulleksa [173]

Answer:

7:13

Explanation:

First figure out how many his sister has so 6+7=13 so the ratio is 7:13 because of how its worded since it says Eli's games first then thats how you get 7 then his sisters 13 so final answer 7:13 There is you answer

6 0
2 years ago
Read 2 more answers
Other questions:
  • Section: Friction
    10·1 answer
  • Which of these is a biotic factor in an aquatic ecosystem?
    10·1 answer
  • A(n) ___________________ process is initiated by individuals who are subjected to forensic techniques with the intention of hidi
    6·1 answer
  • What is the output of the following program?
    5·1 answer
  • Consider a classful IPv4 address 200.200.200.200? What is its implied subnet mask? If we take the same address and append the CI
    12·1 answer
  • What are the values of A[K] and A[K+1] after code correspopnding to the following pseudocode is run?
    10·2 answers
  • Compute series multiplier resistors RM = 100Ω:
    8·1 answer
  • The main work area of the computer is the
    14·2 answers
  • What are the fundamental activities that are common to all software processes?
    9·1 answer
  • 36 points!!
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!