1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
2 years ago
9

What is meant by reflection?​

Computers and Technology
2 answers:
lana66690 [7]2 years ago
6 0
It’s something that reflects off something
Elis [28]2 years ago
4 0

Answer:

It means the throwing back by a body or surface of light, heat, or sound without absorbing it.

Explanation:

That's the definition. Hope that helps :D

You might be interested in
To add a pattern to a page, navigate to the _____ feature.
vfiekz [6]

Answer:

Pattern adding feature

7 0
3 years ago
True or false for a given set of input values, a nand
Katen [24]
Nand stands for "not and". The truth table for a nand is:

a b | a nand b
0 0 |      1
0 1 |      1
1 0 |      1
1 1 |      0

Hopefully this helps you answer your question.
6 0
3 years ago
2. Which of the following is not one of the guidelines for using instant messaging?A.You can use in place of all face-to-face co
Alexxandr [17]

Answer:

A. You can use in place of all face-to-face communication.

Explanation:

Hope this helps

6 0
3 years ago
Jim has excellent oral and written communication skills. He enjoys public speaking and wants a job in which he will interact wit
fredd [130]
The best job for Jim would be public relations specialist.
7 0
3 years ago
Read 2 more answers
The matrix theory is used in the ___ technique
wlad13 [49]

Answer:

The matrix theory is used by hill cipher.

Explanation:

Th technique which uses matrix theory is hill cipher technique.

Hill cipher technique is a polygraphic substitution cipher and it is based on linear algebra.

For encrypting a message in Hill Cipher technique each block of n letters is multiplied by an invertible matrix of nxn and that to against modulus 26 and  for the decryption of the message, every block is multiplied by the inverse of the matrix that was used for encryption.

3 0
3 years ago
Other questions:
  • The house had a wonderful pool of ... (his/its/our) own.​
    5·1 answer
  • ____ are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its par
    8·1 answer
  • The following outline is used to plan a program. What is the name for this type of plan?
    7·2 answers
  • If one breakfast meal of banana lacatan, scrambled egg, plain rice, and hot milk contains 58 grams carbohydrate, 12 grams protei
    11·1 answer
  • What are the factors affecting the purchasing decision for dbms software?
    7·2 answers
  • After a suspected identity fraud case has been resolved, you should:
    10·2 answers
  • . Some countries lack physical resources, like computers or network connections, making it difficult to keep up with the technol
    8·2 answers
  • You are driving on expressway with three lanes in your direction at a speed lower then
    8·2 answers
  • URLs are the global ______ of resources on the Internet.
    12·2 answers
  • Which of the following is normally mutually exclusive<br> Read only files<br> Printer<br> WIFI
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!