1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
12

What is alphabet symmetry

Computers and Technology
2 answers:
Advocard [28]3 years ago
6 0
Alphabet symmetry is when you can fold a letter or anything in 2 or more or less
Nataly [62]3 years ago
3 0
A line of symmetry creates two congruent figures that are mirror images of each other
You might be interested in
Long Answer Questions: a. Briefly explain the types of Control Structures in QBASIC.​
Alexus [3.1K]

Answer:

The three basic types of control structures are sequential, selection and iteration. They can be combined in any way to solve a specified problem. Sequential is the default control structure, statements are executed line by line in the order in which they appear.

7 0
3 years ago
Which function can you perform on a word processor but not on a typewriter?
AnnZ [28]
Deleting a character when you make a mistake and the print it without errors
4 0
3 years ago
75,15,25,5,15 what's next
Fittoniya [83]

Answer:

3

Explanation:

The sequence seems to follow a 2-step pattern.

1)Divide the first number by 5 to get the second number.

2)Add 10 to the second number to get the third number.

75/5 = 15

15 + 10 = 25

25/5 = 5

5 + 10 = 15

---> 15/5 = [3] (Answer)

3 0
3 years ago
In what tab can a user find the workspace option?
Sidana [21]
D. View.
You can find the workspace and preview of the file in View.
4 0
3 years ago
In Revit, BIM provides a variety of model information. Which piece of information is not offered by BIM? Select Answer A) Payrol
gizmo_the_mogwai [7]

Answer:

yeet my points into my wallet i need brainliest for points plzz

i actually think scheduling im 11 so i dont know dude

4 0
4 years ago
Other questions:
  • 1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
    6·1 answer
  • Which type of operating system is usually used in personal computers?
    11·1 answer
  • How can ascii be used to represent characters in computer system
    7·1 answer
  • What is the output of the following Java code?int x = 1;do{System.out.print(x + " ");x--;}while (x > 0);System.out.println();
    14·1 answer
  • Plz answer me will mark as brainliest picture included ​
    15·1 answer
  • Explain why there is an overlap of skills and qualities in design professions​
    14·1 answer
  • In a systems development life cycle (SDLC) model, the purpose of the _____ is to create a physical model that will satisfy all d
    10·1 answer
  • 5. What are some situations where you might find it useful to use the “!” symbol in a program?
    9·2 answers
  • 7. A(n) is the address of a document or other file accessible on the Internet.
    15·1 answer
  • Array bounds checking should be directly coded into a system rather than assumed.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!