1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
15

How do you make a triangle on art.kano.com

Computers and Technology
2 answers:
blsea [12.9K]3 years ago
7 0

Umm, I guess you just try to do one? I don't know.. Sorry if I couldn't help out.

I believe you can do it!

mario62 [17]3 years ago
3 0

Answer: I would watch a YouT-ube video on a tutorial on doing that

But i am pretty sure it involves coding

Explanation:

You might be interested in
How can you check an orthographic drawing to be sure there are no missing lines
pochemuha
Here is the correct answer of the given question above. You can check an orthographic drawing to be sure that there are no missing lines by using each view. The views in the orthographic drawing include top view, side view and front view. 
4 0
4 years ago
Read 2 more answers
. Linux servers are typically stored in a locked server closet to prevent physical access by unauthorized persons. Describe why
IrinaVladis [17]

Answer:

Following are the solution to this question:

Explanation:

Physical Access to Linux Servers:

Unauthorized staff is denied access to windows server due to various reasonable factors which might damage databases and then all database depends.

Linux distributions handle their servers but it is almost important that they will be protected or hackproof to safeguards their organizations' networks.

Guess if an unwanted staff has access to the server, he/she can be using the device by just placing a simple USB or dragging the information of the database to study it even further. Here that the results stay throughout the possession of even an unauthorized person, whom no organization wants to confront.

Its attacker may also damage that server by installing a virus or any virus mostly on the server. User security can allow unauthorized staff to go on a search and retrieve the database to disc inside the database.

Warranted physical limitations:

All such physical constraints are assured because the company cannot manage a minor error in physical security.

Because conflicts with both the physical limitation will damage its database so much but leave all loopholes free to that same protection of attackers and operators.

Its physical safety guarantee should be maintained by routine server room checks and ensure that every step of safety is undertaken and results are achieved.

6 0
3 years ago
3
Charra [1.4K]

Answer:

A) Microsoft Windows is an example of system utility software. Spreadsheet software, such as Excel, is an example of application software.

Explanation:

System utility software is designed to analyse, configure, optimise or mantain a device. Eg : Operating Software (Android, IOS) & Microsoft Windows

Application Software is a program or group of programs, designed for some utility work for end users. Eg : Word processor, MS Paint,  & spreadsheet excel etc

6 0
3 years ago
Anyone from qls<br><br>or grax here<br><br>in bs​
PIT_PIT [208]

Answer:

No, I don't think I've ever heard of DLS or Grax either if I'm being honest.

May I have brainliest please? :)

7 0
3 years ago
What's a frameborder?
Brilliant_brown [7]

Answer:

The frameborder attribute specifies whether or not to display a border around an <iframe>

7 0
3 years ago
Other questions:
  • When you use the Bing Image Search for online pictures, you will be searching the Internet for pictures that have been filtered
    13·2 answers
  • Write a program that prompts the user to input two numbers—a numerator and a divisor. Your program should then divide the numera
    9·1 answer
  • Insurance can help you:
    10·1 answer
  • In a submarine battle simulation, you know all the locations the enemy units can move to. Anticipating these moves, you call for
    13·2 answers
  • What is the output of the second println statement in the main method, public class foo { int i ; static int s ; public sttic vo
    15·1 answer
  • __________ is software that comes hidden in free downloadable software that tracks online movements, mines the information store
    14·1 answer
  • A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at
    5·1 answer
  • When Kristy recently started a photography business, she downloaded Photoshop to her computer to edit her photos. She notices he
    7·1 answer
  • 5.6 Look carefully at how messages and mailboxes are represented in the email system that you use. Model the object classes that
    14·1 answer
  • Which of the statements below is true?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!