Fiona is drawing polygons on a computer. She wants to map a regular 9-sided polygon back onto itself using a reflection. Which set of lines can Fiona choose from for her line of reflection?. A) any line passing through the center of the polygonB) any perpendicular bisector of one of the sides

C) any line joining the midpoints of any two sides

D) any line parallel to a side of the polygon

Answers

Answer 1
Answer: The answer is "B) any perpendicular bisector of one of the sides".

We can define a line of reflection as the line in which a shape is reflected, or we can say that it is the mirror in which the shape is reflected. The line of reflection is the perpendicular bisector of any pair of corresponding points. If you want to join sets of corresponding points on the object and image, then the line of reflection will slice the lines framed down the middle.
Answer 2
Answer: The set of lines that Fiona can choose from for her line of reflection is B) any perpendicular bisector of one of the sides. 

Related Questions

What do we do with our "points" on this site?
I'm having trouble using my NetMeeting software. In order to use the software, it tells me I need to enter my IP address, but I don't know what it is. Can you tell me where to find it? a) Check your computer's network settings b) Contact your internet service provider (ISP) c) Look on the NetMeeting software interface d) Restart your computer
How does object-oriented programming work in Python?
Which technique will you use to make listening to audio a pleasant experience?Audio _____ is the smooth shift of one audio file into another.
Why do we use the internet so much?​

Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of a _____________, ____________-based IDS/IPS.

Answers

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


The correct answer for this question is this one: "anomaly, network." Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of an Anomaly, Network-based IDS/IPS.

What is the result when you run the following program?

print(“2 + 7”)
print(3 + 1)

Answers

Answer:

line 1 = 2+7 (you added quote marks)

line 2 = 4 (you did not add quote marks, which adds both nums together)

Explanation:

Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the information-processing system are referred to as _____.

Answers

Answer:

control processes.

Explanation:

Mechanisms that combine memory, processing speed, and knowledge to regulate the analysis and flow of information within the information-processing system are referred to as executive/control processes.

Whats in a computer?

Answers

A lot of things are in a computer there a motherboard, A cpu, A hard drive etc. A motherboard is the computer system  bascilly its the heart for a computer. The cpu is the the brain of a computer it controls on your computer and keeps it going good. finally a hard rive is the memory of your computer it stores all the data including files, photos, etc
CPU/processor,Motherboard, and Power supply unit.

To recover a deleted document, what would you choose in the Info window?a. Uninstall
b. Retrieve
c. Manage Versions
d. Undelete

Answers

Retrive you can restart your computer press f8 it will takr you to a menu were you can choos recover lost files then go from there

Electronic cover letters should still follow a business letter format, even though e-mail is a less formal type of communication.a. True
b. False

Answers

True. First, E-mail means Electronic mail. It is basically a way to send mails electronically. So apart from the transport method, nothing else really changes. Second, it helps in removing ambiguities. Third, businesses try to keep things formal. It helps in organisation.

true just took the test on engenuity