1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djyliett [7]
3 years ago
12

Reflection image and design

Computers and Technology
1 answer:
Tpy6a [65]3 years ago
8 0

Explanation:

It is the image and design

You might be interested in
When searching for an image on your computer, you should look for a file with which of the following extensions?
posledela
Images use the extension "jpg"
8 0
3 years ago
Feistel proposed that we can approximate the ideal block cipher by utilizing the concept of a __________ cipher, which is the ex
sweet-ann [11.9K]

Answer:

product cipher Is the answer

5 0
2 years ago
Read 2 more answers
Answer the following questions:
Alika [10]

Answer:

nasaan po yung tanongkkkkk

8 0
3 years ago
Which data type is also called a binary object?
Leno4ka [110]
For Plato users it's 
2. BLOb
4 0
3 years ago
Bioengineering can be defined as biological or medical application of engineering principles or engineering
Licemer1 [7]
I think the answer is true
3 0
3 years ago
Other questions:
  • Ucf the ability to connect data in different tables in a database through a common field is sometimes referred to as a ____.
    9·1 answer
  • How can I get a refund of my money back
    12·2 answers
  • Which of the following tasks is an interactive media professional most likely to do? Check all of the boxes that apply. 1. decid
    11·1 answer
  • Which type of computer operating system would be best for a large corporation?
    7·2 answers
  • AT&T reacted to the popularity of the cellular phone by adding several cellular models to its line of regular phones. Availa
    8·1 answer
  • What permission do users have by default regarding printer access and the ability to manage documents?
    14·1 answer
  • Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can
    5·1 answer
  • To simplify input management, you are asked, neglecting the handling of exceptions, to write a keyboard class so that the input
    11·1 answer
  • James root lol ........................
    12·1 answer
  • (2 points) starting from the root node, we want to populate a bst with the keys in a given list without altering the key order.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!