1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
3 years ago
13

Can you prove that the bleu areas are the same please?

Computers and Technology
2 answers:
Nookie1986 [14]3 years ago
8 0

\huge\color{darkred}{ \tt{NO!!}}

Brilliant_brown [7]3 years ago
3 0

Answer:

no

Explanation:

A vertex of one square is pegged to the centre of an identical square, and the overlapping  area is blue. One of the square is the rotated about the vertex and the resulting overlap is red.

<h3>hope it's help u</h3>
You might be interested in
What is an online recommendation engine?
Nataly_w [17]

it is software that analyzes available data to make suggestions for something that a website user might be interested in, such as a book, a video or a job, among other possibilities.

6 0
3 years ago
Anybody know this question???
vlada-n [284]

i believe the choice you are ooking fo

4 0
4 years ago
What steps should you take if your harassed online​
AURORKA [14]
Tell an adult and report the person harassing you
8 0
3 years ago
Read 2 more answers
Every brand of computer has its own binary language, called
Kaylis [27]
Machine language.

Hope this helps
6 0
3 years ago
Anyone wanna join a supercar/hypercar enthusiast's club?
stellarik [79]

Answer:

I have Lamborghini Centenario as my profile pic. :)

Explanation:

7 0
4 years ago
Other questions:
  • Which term defines a star system with two stars?
    13·2 answers
  • Document creation is a key business function because:
    6·2 answers
  • The process of sending ping requests to a series of devices or to the entire range of networked devices is called a:
    9·1 answer
  • Assume the input data is structured as follows: first there is a non-negative integer specifying the number of employee timeshee
    9·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    10·1 answer
  • Within a Microsoft Windows environment, who has access rights to the Encrypting File System (EFS) features and functions?
    7·1 answer
  • Anyone wanna play Bloons tower defense 5 im rank 52
    5·2 answers
  • This innovator created “honeypots” in which fake accounts are set-up in order to catch cybercriminals: Jeremiah Onaolapo
    6·1 answer
  • Power point presentation make use of pages known as
    9·2 answers
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!